Resubmissions
05-10-2024 19:24
241005-x4rgzsvelc 1005-10-2024 19:24
241005-x4mh2azenj 405-10-2024 19:20
241005-x2klnazdrq 1005-10-2024 19:18
241005-xz4xhsvdkh 4Analysis
-
max time kernel
55s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
Ratio-Linking-Ratio-to-Formula-New-GCSE-Questions(Bt).docx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ratio-Linking-Ratio-to-Formula-New-GCSE-Questions(Bt).docx
Resource
win10v2004-20240802-en
General
-
Target
Ratio-Linking-Ratio-to-Formula-New-GCSE-Questions(Bt).docx
-
Size
13KB
-
MD5
a61f3089b7e993c2cfb425125cb4bcae
-
SHA1
05c8401b0c572ab98423770ccf39a394815a3a99
-
SHA256
815dfa5f4d592f76301a5f0f8ea7ecc53db9057e91b61292aee006337a17386e
-
SHA512
22ee0a814016a50dd32db06989544d5809652271b85b21729db976930ca9f51c9c2b22ff7948c27cd1d2a31799e0b2c4cd5c8a9ce94ab1dd20f4e99754873e31
-
SSDEEP
384:aN4F06wSpn0i13LU9FiKkDb3E+cLwoetwx02:kLqv13o3iVv3E+cLwoetc
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 548 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 548 WINWORD.EXE 548 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 548 wrote to memory of 1944 548 WINWORD.EXE 32 PID 548 wrote to memory of 1944 548 WINWORD.EXE 32 PID 548 wrote to memory of 1944 548 WINWORD.EXE 32 PID 548 wrote to memory of 1944 548 WINWORD.EXE 32 PID 1992 wrote to memory of 2704 1992 chrome.exe 34 PID 1992 wrote to memory of 2704 1992 chrome.exe 34 PID 1992 wrote to memory of 2704 1992 chrome.exe 34 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 1800 1992 chrome.exe 36 PID 1992 wrote to memory of 2844 1992 chrome.exe 37 PID 1992 wrote to memory of 2844 1992 chrome.exe 37 PID 1992 wrote to memory of 2844 1992 chrome.exe 37 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38 PID 1992 wrote to memory of 1920 1992 chrome.exe 38
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Ratio-Linking-Ratio-to-Formula-New-GCSE-Questions(Bt).docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef66e9758,0x7fef66e9768,0x7fef66e97782⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:22⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1444 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2280 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:12⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2292 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:12⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1580 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:22⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1324 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:12⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3416 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:82⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3424 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:82⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:82⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1132 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:12⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1764 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:82⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3500 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:12⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3492 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3888 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:12⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2524 --field-trial-handle=1380,i,5161137938030403186,3029738283112898224,131072 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
579B
MD5f55da450a5fb287e1e0f0dcc965756ca
SHA17e04de896a3e666d00e687d33ffad93be83d349e
SHA25631ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0
SHA51219bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C
Filesize252B
MD5041a6663bc0ebe537fe7decbf702f445
SHA108e98d4330b018bddb45851b8fb166a57f77db4f
SHA256f6baca6c5e8cd39df0ea24496106299e08767adb1ed09417e31b13fc97657959
SHA512b42bb9747484814f7a1c5bef7eb29c222a9f453d50736682951b9f838b6470ace1efa0ad3841af6129e2c6ce00bf02ba9a0645e98a7bc67ba1d4e0f8d0f2598c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad69f52ca4677afc8b77cd7ffbf1e148
SHA123441afef0bfb036bf03e5d9bb96f190db37958a
SHA2564d5a3242cbaaaf21585a2145bfb8438e8da22727c6de1291b2e2cfc8ebc582ea
SHA512713cb6031c093396547ed79ccc5e310d2d97f914fad8d661eaa4c63aa74b2261e2014925b65b6617c74fc8b39d3d2fb13fe0dc81f1091b0f34f7b6b16ee4dc21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb379770ba52cc684d3460f298abbccf
SHA1d8c8f13d43a4d8010eaeaf26dbdad8b59573aae5
SHA2568ce5ebebadfd15b65467b6353c090121de4b9fefcb7c0595175cad45e0bb0717
SHA512503b73f708b047e805adb17d422ec2f7e9a82360a91d67ba4e152bebc2ee0c935cf330e84419888a53dafd6565acc2f9fe58910d8085aa2676dfa3beaa5d7b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc8ee78a80d07f3c0cc83b2512590d71
SHA1330c905634a201abdc4e8769c2185fe4a554da10
SHA256b964b517f88e0ae24e9ec2cc1bf5e7f312dd7a8cf3d8248bf2b40388cf1ff354
SHA51249339bfdfdd6dc2834ac3ea50e475271dd4f6cf5a1baed0155876dc16414bddfa061e7df7a89ba3768717c214a49746a26f03ff4ad1b1a0eb2f10b535f2e6c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c7ba8cb37271f7281252a944f81afc
SHA14efebe0f2c731b77c1b76f35fdc94c176772025f
SHA256e97ca4678e9b14fe096b76b6ec4eaaadf8a90bea55e92de4c655e41fbdadea2c
SHA5125329ca9ff8d64d7818cf2cc971ce11e8d1d7d25521bfc6095303ccd996756b2e80e235771b635e6bcc6e07871f6366b97193a498d54f5c7aa2ccba3a84aa423c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad9ec120e31cb739fba5426fa8b1f176
SHA11362254a33d2c257119935467580c2df545a92a6
SHA2561e1f2140c24f6729de3bed695d19f672b3edb770b9770caca59a6bb9cbe2d5b4
SHA512e16f549976441226dfbf54be1cf5b04ee6225ed6f4b34f23ebbabf72b8614f5b5dc796ebd747eb0dde44d12b5622005c52742d92feb9c0e6f96a065c8d510be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa7ebb29946e303ee0714bd2e528140d
SHA17326ce9ffca218754d4b0a7cf1dcff1ee9459292
SHA256a2933e2e14929f0f71dea05d9b6653e2ed85b6a648f42c9f8087aa2454df675b
SHA512b090944c035f399a1459fd853e0b7f20cbcf7400a732ffab1c2605bd2c8fcc7fff510224aaac05b5ee47e4c5a2b9d89d905478f46d801f11f3fc90b87812cddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3fb736f04c02f17c472421d41a551e9
SHA18d12799724c94e8155a787ef836895d26782c489
SHA25698e7f40dbb5d8e6b8f0e379268d2b7eeae52ef730fe617db896e551297cb5df9
SHA5122e14bda45a30b9869066baf6281193c57bf99f47aca0f3f334681cd078b3a4eeef1fa3a0223c397c390b55d9ac8edacf554afd9f1745242e3e4ec493de054ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4555b4e883cfa92cd535f891e9dc09c
SHA19de8da87e93058db7d9f61a892487c7a3be07fe6
SHA2561db00e63d7e0d5acb09d7b8952d0a50586f453765ac0655340a168263384ef70
SHA512770dba478a8fb8afdb43427eb7b56e8c7d904651f94a2a09c1a39be42168b0e43c2b48c19034b181dd1b7f2259bb81b85afaa49aeea3c8046b771dade317cf5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c6a32b40b7cf376609f49cf6f5ec654
SHA141a251406f8be166ef4628a2a1418750499ac66a
SHA2564aba25dc61682338f2c4ebb75a3efcd9ceb8c88bfe8121614cc1047900028251
SHA512d241e32cb1303af7e9b9381a494bd12da95b0ba8e8b53e6d9a49f4e2b33d3681f343e9b44879b0e2d649f9ec617080cbf7117e44059b68a839b87d4aeeb85d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57b2b800822bffa02deb424deb57de8
SHA15c59c06dbccb3d7f8c298d34221a8e6cc6be122a
SHA2562539f9662754cde2b64a61e487c0a5f35d70f5ea99cc07ee4cef8dd94382cc1a
SHA512769f6bbfeada5f3293693b819b5760f804a0e755f002e726aedfa5fe83fef21cd4d52d048390525787c1d685e1152cfdc2e52b65db6775458b564b8559be16bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcaf22ed9f004be0fb3442121ced5ea7
SHA1d700cdc837629bc1a9a3f1ef1efb1ebdcae0c535
SHA2565fadd1a6517e85a60bef7d2db6e8cad59faab23fdb904c731e0e4f635f062367
SHA51280c0eb33572c773b3348ad7beb6fe61cc7bcca50e2071788b905b80ecb1f16a47c702a647c86118274f0bdd83c429d3f1bda98223b1c2cb5ee0eb0618b4de68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19f41d688420e6d31299be4512d00e6
SHA19e9c1b1c46a1daf0c62d8d960677d15e7a9df5d2
SHA256ef740534400298ebe8823c13c47a1a3f259b548df42a364982ffd44bafced477
SHA5123e6fff6ea5c9fd81402684060c9cd61447c3e960ee5f3de3106b37198f7696c62b9555d954894ce9a96665e9ec4ebc06f111e2b6aa927aa63769b71a51bff7c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296067be07f535518c05a6bd78038850
SHA10fa1334faeb345ee1256e369bba36560c14c06f4
SHA256d5bd68ad5606ff5bd5f8bdbeccc41648629f600969ea8d154e13b8552f278cf9
SHA5124d4981670383d5f92b3a6acf766c823f181f98e42622b415457b330a8b6e5bd0f4492aa013f6cb74749a172e1aeb7e9d6a365fe31380361694a2ca1f1785c0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53263f521870b6fbb48f5f5c059c0ca1b
SHA12861537bbe51c204f5ebadc757f5e16dc9c7ca60
SHA25649d7864af85c1a8a3ba45051a219cb8ad39af9de1f754646ad5c04818335c18d
SHA5124f8a3707ae0b4734e86d6777c830bc7f6e0ca7c4c152001df423c8f2e4a25a4457063b4d197937f01e16fc38c495cb339c95da6cf0ad4f7d233cef1899cf3e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56037d0ec014c4f3df616367ffbb73a8e
SHA1c63b1441dacff42e990d14ca85658ec278c9ef48
SHA25627c895709c34a85ab5379e0f7a506a193a44fcd84afbe5a799c299f4031af6dd
SHA512d32e4ebeed2c05d7ce6abc4329318fa26ac1762e5a576b8951ac05b639c5df6c19af19ada582272b1fdce997ff55eebc0e543f58c3c33961ce5b640f2b5acaa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fccb12ef97ca0b411b423cb8b9480584
SHA14ddfaa2b8b9de5c4bd21e7927efdde06c70f85c7
SHA256ec6e913672750fa3d5f0a1bff0542bbf62a4f2ca0bebbfe3e80ff4353dd138b1
SHA5122ce8c8384fbd74c296ef8daa16b52868e352636b20fa5d217e928ce7a15fd2eb01597315df970e66ba433548f96984480023e033f1ae0de6362be75a855d10bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecfc15fd234448cffefd3cacdef4f700
SHA181cdcc2d9ba440ede3117afa4b1de8babf5b36a8
SHA2565219274a7a689d1daabd3da3e4b1c357f3b1b42008b6d7bf4f2d5dc6ecdcdb0a
SHA5122f113abd56c7e49d3ecc0d19feaccc00c60902df8be2749a3f8f4a041a1ff7e4431fe0992a5c0f0bd7ac3022f197261dbb094b5ae3aff84ca6b9698542d6b7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7d995b85c83ca179f23105da6de5341
SHA14c2e5bd787da129ead8006ed6fbe0f90cfa50460
SHA2564f3845df2ee9bfce83939f9f7c26536563d453a6930f7e7d347204c3907b7e64
SHA512a5ac2858e9d0d7aba41b5ad57cb85f53d18442538a5712005aaf1cc4582d213bfe88ce96707e70ca4506a6a5c7b2810bcec866ca74f489dc84399ebb129efd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eef7ad677bcc4d91aba2d563b14ed62
SHA1444c3c092285fb705421e8c12f346feaaa9a343b
SHA256b8861b24e19ad749ace0b4f6a3053cd2cd5dbecccc8c14e63458fcc55d96704a
SHA51254174c134e11931a9d6eedffab232a86747570e9d903770faf48ebf442202e977c399f53f0ac16087d47e81067db321081565db90007dcab7d75df273f831dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eabe5cc93017fa5f88452dc0e8ac384
SHA1b8d7d329900bd85766ea19b99fffdbe461f7dcc6
SHA2568b2cd0426eca9e240f1ae3c6d23966b8747e59264c72cecf18afe6069086cae5
SHA5129c5809eeaf321948a8740b373d3cf1f6ddfbb358e3758f707f74aae67a012c6b9abd3b98bdf14724235381d69a20e4b409efc538de09a37dbde340ba88ff28b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6b3590d59f5424023db99aaa37ab584
SHA1869e5feccbabf9f43fb6574f213900ed9fcd7f71
SHA2569e37ee37176a9001a0878e9230d67ccac3d0d6b2390adffa23c1e9822fa5d4a4
SHA51290e0628e82583d2fc9aa5acb1d174984d2ebf5582dec550c8c1cb35d0f02d297779f082afc142ff5e00716c8ef16b27fc17b857b17bdca829d81fd20cfb40cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567815d620d3347827b211c1ad7329eba
SHA186d080e54103352d1c0daaf4efd599b416834ea8
SHA2561547b1ff4148c3e89985d134d65d8f82cdcba9a18a3036709050aef9eb2847f3
SHA51216c66b0090fe17027d571f721f065e9d17a756ddfb2bbd621b4e8de5e37af48d4cee79c8dd3fd636b6d481ea846f002dbe23d63a4b03267d5baff3abf68ddd40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d4179eebbd35946af35075c98aeb68
SHA18ce5312fccd8144a85cd65a4c94d96a284c92f07
SHA256cf5fe96299f4167893d5e76a4e4940c32e5556032caadca41e547ed2c4690460
SHA5129c73765fe6c3a64fccb7927a5b69e9d412ee95a62866e3caf104d9e73507a88a3e94535a9b680d564092a906748cf17317cbe2a8bd79dc799bbe000b25fa20f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3357be7a21bb9c30cf7fe6492f5359c
SHA1b66b1e422a64e368587e5a73242571eddfd401ee
SHA2564f50186709f14cc1410384c83f70b15afd15c22efdb66d657373bba904740c9d
SHA512c70c60df97b8a7477247fa1528fd66a6df27719eb4d3dcf503aeb68f02e27e29d96ef8604f2a9a80fe99d2d29170b033dea8379b9d471d70f44a09afb1d65da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5c31940bbc16a8dd93530b9bee7a27
SHA15b454009f530b3d408ab7c2831931e4607f1540a
SHA25604bb717e23d15265aef6fd1ef6bfdb5227f88dfe49ed3413df953dad56d36bc3
SHA51279bd83c7aa5875ca154bb1779eebabaa4aed6a77c83f3ae681f710448c3af5470100a81168c26ced169718e54197482185c01de0dd613fe925679906f3064cbc
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5fb1520f720a2cc9bfa19ac9d806d3347
SHA182c71f41f2c305e7c9082d6757b7d338d874973e
SHA2560e034fdd2a048f64e22ecbacd88e0457e21b38ada38cd3d21385c48750876c62
SHA512fa3502d5900f7ef534672034979a9ea97fc185671eb32abac2fa177db0961baf7d11ad38c6fcf8d591a7964fa7974a621fde42b7bf325f8791be458965c31b6e
-
Filesize
5KB
MD5a5e313614dd72a1f7ab95bf283c16d44
SHA1f4ebbd5cc33203fefe497a740d237a87cfba32bb
SHA256d0a2a61b7d509d5cff7dbf952945103d1954e20af336815561e9b845156f1bdb
SHA51230cae0945713f29603ea0a11b6b7f2fb954f01540d76cfa6c5dc0152cf7f598b3c0c40f693625e61636db2f0ae9e97ee51909862cc047cc9e0993809fd3b7a45
-
Filesize
5KB
MD558fa64cd57a68b8519aa0bf24c159710
SHA1f6eb2bb5500b202acd0a8ea061f6725a6b610016
SHA256cc52349ab6f94ce0b9c17f76c12268a05053764ca31a60260b3f2ae8fcbeb44d
SHA5128aef33c0eb37ce6f74c7c3bb9ffd1cc5904c795a9728019d11a54e2cdde7d4c75b7bd9e376c52c4b75ae137825fb197b2aebf55d9e952a8acbcb272d5689ee6c
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
19KB
MD51a01d0120754837dc86dae2ae2313116
SHA17a77917a65f5728af3c2195c85836622fee6bb7d
SHA256c0e3a1a02edb82005e7f97e832f6022514a4765d547e4d82ee8a82b0cf81e476
SHA51238ee9ac2ed0f1139a3ab056b68271d0a72974925508e059fe20f9355174204c23b49c725c953bb36c6e678001945b1d49befad8b413f32b47c7addd124a45904