Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/11/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
sec-checker v1 By SECURITY ALSHAAB.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sec-checker v1 By SECURITY ALSHAAB.exe
Resource
win10v2004-20241007-en
General
-
Target
sec-checker v1 By SECURITY ALSHAAB.exe
-
Size
1020KB
-
MD5
333c9b031872ecad95a227cb504c62ae
-
SHA1
2cde63d3c03fd8d7b138232492ee7b7fbe1683aa
-
SHA256
adaee5abda04e7cf460f707a2cfbea01a550bda20204cdcb1df2da194551a681
-
SHA512
887e1a1e92c6d0542e9e226f7441ef55bd0e698d4f6c61e7b7fcb90c28cadcee24d96af56ccdb7ed0c2f5dace7ca929cfb0302d05fa07975621c186fc4ea48ba
-
SSDEEP
12288:RfziWJL5SZaSCDaRze4Yl4fRCVhBwvQlebZBUwFt:RfLwOp4Yl6IwvQlebZzt
Malware Config
Extracted
njrat
0.6.4
حمودي الواسطي كان هنا
moha.no-ip.biz:9933
0834daba34fc76fcb705a66b2338d64f
-
reg_key
0834daba34fc76fcb705a66b2338d64f
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2652 netsh.exe -
Executes dropped EXE 3 IoCs
pid Process 2100 Tempserver.exe 2316 Tempprogram.exe 3032 exploer.exe -
Loads dropped DLL 3 IoCs
pid Process 3064 sec-checker v1 By SECURITY ALSHAAB.exe 3064 sec-checker v1 By SECURITY ALSHAAB.exe 2100 Tempserver.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\0834daba34fc76fcb705a66b2338d64f = "\"C:\\Users\\Admin\\AppData\\Roaming\\exploer.exe\" .." exploer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\0834daba34fc76fcb705a66b2338d64f = "\"C:\\Users\\Admin\\AppData\\Roaming\\exploer.exe\" .." exploer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exploer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sec-checker v1 By SECURITY ALSHAAB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tempserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tempprogram.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main Tempprogram.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Tempprogram.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Tempprogram.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Tempprogram.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Tempprogram.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Tempprogram.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Tempprogram.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe 3032 exploer.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2100 Tempserver.exe Token: 33 2100 Tempserver.exe Token: SeIncBasePriorityPrivilege 2100 Tempserver.exe Token: SeDebugPrivilege 3032 exploer.exe Token: 33 3032 exploer.exe Token: SeIncBasePriorityPrivilege 3032 exploer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2316 Tempprogram.exe 2316 Tempprogram.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2100 3064 sec-checker v1 By SECURITY ALSHAAB.exe 30 PID 3064 wrote to memory of 2100 3064 sec-checker v1 By SECURITY ALSHAAB.exe 30 PID 3064 wrote to memory of 2100 3064 sec-checker v1 By SECURITY ALSHAAB.exe 30 PID 3064 wrote to memory of 2100 3064 sec-checker v1 By SECURITY ALSHAAB.exe 30 PID 3064 wrote to memory of 2316 3064 sec-checker v1 By SECURITY ALSHAAB.exe 31 PID 3064 wrote to memory of 2316 3064 sec-checker v1 By SECURITY ALSHAAB.exe 31 PID 3064 wrote to memory of 2316 3064 sec-checker v1 By SECURITY ALSHAAB.exe 31 PID 3064 wrote to memory of 2316 3064 sec-checker v1 By SECURITY ALSHAAB.exe 31 PID 2100 wrote to memory of 3032 2100 Tempserver.exe 32 PID 2100 wrote to memory of 3032 2100 Tempserver.exe 32 PID 2100 wrote to memory of 3032 2100 Tempserver.exe 32 PID 2100 wrote to memory of 3032 2100 Tempserver.exe 32 PID 3032 wrote to memory of 2652 3032 exploer.exe 33 PID 3032 wrote to memory of 2652 3032 exploer.exe 33 PID 3032 wrote to memory of 2652 3032 exploer.exe 33 PID 3032 wrote to memory of 2652 3032 exploer.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\sec-checker v1 By SECURITY ALSHAAB.exe"C:\Users\Admin\AppData\Local\Temp\sec-checker v1 By SECURITY ALSHAAB.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Tempserver.exe"C:\Users\Admin\AppData\Local\Tempserver.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Roaming\exploer.exe"C:\Users\Admin\AppData\Roaming\exploer.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\exploer.exe" "exploer.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2652
-
-
-
-
C:\Users\Admin\AppData\Local\Tempprogram.exe"C:\Users\Admin\AppData\Local\Tempprogram.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f805ff422ec0f1ecee4a4daf65d6f7
SHA195824aa32d8bb9a4d9aaad8e15f84a0877fd592e
SHA2565204cdc8cd73a2f6653d4a638974d3d72f4a9a1acb2c9b3af407e60896d8abe3
SHA512e8b10f2973037b40b8d7c42e289442dde50914532e574fc4c14df0334acab8fc08986f9a94f16d73dc59e33b1baccbe8a87094f683a3ce064da58bfbb0b75688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594dcef012ac47d0e0ff1361b5650bd76
SHA1a99a2db6dfe3c540e38432b4f42b21d1eff7d281
SHA256b03c34ea1cccf26682eec8a201eb14704b36482b10eb4b1e0cc846ce2c3cb0fe
SHA512681154b536daac056e22381ef206e84e3cef24e2356004e95a2bfaa402db0638d3a0b94dfa0bb1f03ed1217400e4f470e43897d143ce84c9a35155ce436383f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db05cf8737a3097074a71a8364a5f35b
SHA1e92e81bd4266b67372c9c0c2b9c0c8e4b4321a60
SHA2563628910b74a0d53db61afd74c2c205d41606b606935edf9838f4dc1a45b8fb80
SHA512c78547a34bccc3e502675925f9f7a2f1ecb1a8707aca38310acfe993c651d7fd95601d00cc540887f6c35c7ba9a22ee41a0f5acff9ab0969b6051647f6f553b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5040c629b99b071326cdb97a697a49e1b
SHA1cc5ff6d2501202c7fbe5438d620af6eb76e0cccf
SHA25699bb273979fc08e95df9109923ee18abe9e54e408744070eebc9219effd749a1
SHA512827095776539222af74e4a529a15a5569bff051d6186a34480fc0071e651582ae180219d1d05be5e975b5999f2f1e6f1c9752634cd6336aff53cd36b3b187da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81b92825b7d2511dcadd289181cbbb1
SHA156130700a6dfe3a9a2af333323dbe537eefb2988
SHA256cfadfa8500d0e6e2ded2dc7637dd9e3312c1486251999de2e0fadcf20e445dfb
SHA512fb4c9c7e5162b9ac639e4ec1abc8f265d449a91260d9541ac345388cb7b6762b7d436c6f73ee5837a4893369ebc6cd069e624b14ea9102e4da69809f946f72a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572602337bafe3b85775ca52a219abdd5
SHA16e709da577432e46cc3fd480492ce4f8b769f99e
SHA2560a592f171839f1647f14ec0ce44ee87fc8ab72a61df1a055d9a496bf4194fb30
SHA5123aaddf40597328a66fdb8332c71248aac4c3d53d0f239538053dfafba0a6456ed97684832d15f80ec81b7dbc45f189abfa1d3a7748355aa79f152a5934bac8b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5f77c0bed5e75de42bc871b17ea2a3
SHA167b75f899d3a4a9d9eb6421500014bcbb9055dec
SHA2565094120d09854692a75c41b0d815bf4ed7bdfb23d100ca794ab4b4f0b3ba4e5b
SHA51242e04621cc6402fe0b960017ec398d4d52b9029ca515cb77e451a02dabe50be6d48f7f9de7d2ae70b47c4b23b6b0e6c341509a909204795ff29ed23e17ae2ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68edaec762ff68dde0a1106b3a463cc
SHA1d1fbccda340a5b93ece0bfc67722f19b509b8f6c
SHA2569655b12e0b906e36149119911b52ad7ebae59af3fa574ea66546e0bd1f9e2ab0
SHA5126042ccae7c150030cf8f6e41e18c2fd1b15fcb9b43d4cb9bf229421e01f3ccdde6222ff78d57abf618dd26340f65dceee35011366495b06c3476c1ee227af890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65984eb8ba6cfe3ed0d829152bb2d44
SHA1b9c3c2db2be4fe48f6be564c30e20c33da09295a
SHA2565d29fef337050432f46d38534dd6fbfc7f8ffdb694a6ea70d29fe8c39bc8b53e
SHA512b998b290aa623ddf3d5f1d4ad8bbac6fdb60906f1c6020d95d6cc999444059b78bf13d55bfe896029bee509233c3e04332c81e9cec9b93cd05d7a76a46fa17d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebfa8e7a2eb2a5422316c583aaae4429
SHA159ca4330dd654eb4bee476a38bbfec7bee440ca0
SHA2567d8e7ff30a6c557c4606fab0162df8414dcc80f9d63b9e31a0a5035cfb6cced6
SHA5121afaae1fe6c25a215e0053a3d6527755198fe5aa45824405391bdfcd0da3a39248dbdb2f32d385de0a1a6e967e908d4ee8ef7f3fb96d88f765891fa28523a226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561fe48ce943aae1b591cfd821bbfc1fc
SHA11e8cae6d4785af594b3975bd5e4d9ff86c457894
SHA256a7325591bf28343eb8365083cb512a2261b2e935c9f8c75843e02ea73ff79550
SHA512a818f87aa524cf6108312e331fd374ba9059f66b4b02d7bfe2db5246a3d2d23eb56ac6e663c126095642362ef200eca766b868a8c5df01d235e36712546486c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526bb7438db05af538f745edc6e75160f
SHA1a894ac2aa2eced1b10f29f0c82b33d37fc06d623
SHA2561e0226e84ecd20f1ad866d6fe5d0a95d2109a92b62b82f7b9eb4d68348ada7c3
SHA5123da8abfaa40521a6e7e724ad413dd7c6eae78a6d3e8bbb03338045d7f209dc6ebdcb61bee97f20fa86e36fee0650280069665a078572991fade6658f525a5235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b77e76c8415f7160c29da55ac0e8a265
SHA1b9dbf8a4411daa5d510dc4c0b1037ecc6af5ac95
SHA2566e62eab21cfbf95f13bc2966c702207c7ec62655de7b05e6c2097bc8d0405bd5
SHA5121ad48c6ef5edf5643f6f2ae4432358ccf2fe350c9de5449af39702b1ac0f07309f25c6d31b6f5320f4481f1c8764ead2427c1df0d9f81da454aedd06bc1fbf20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55856b127848b808a911e4b5ca8b0ff75
SHA1dc8ce933870df17d75013e1fcf6be737e6b253ad
SHA256f394500da393ca1a7e497ad8caaae62bacbf3c6ea721c5782302d34e71991196
SHA51221cf7dabd6b4ecac4ba6ed310e3c89e3c0e4ec6d0050e87625dfd4e3ce37ede35155708e156b5142cbd0ed428538545c61460f9bb0be3e5aefbf42ffa4ec484d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539eb8dab608f30fe247a783382fa290a
SHA14ba9b9d89fd6d02c37063472791bceef5b8718c3
SHA256215777ccc1d7b53daea9d7a25391a0d5391159764c9b2e1b23db1399686d4ab7
SHA51288746eb6c0e0b0ca3bb0d5a7d0d588166cd8584451a28cdac5666c71ff846eea90600fb180defd30e6be78a4a5f12c3e0b1a82a91ce9d9a61b52091c56ac7a18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d4d23947c83f624e66ffbd381faa013
SHA168a80d9628bf3d1f2e85b1bdde5248a438240ae8
SHA2568baf1cc374f6ee41d87e7cc31791f3ac758a1c7133059f5c47b89375129041e7
SHA512fe2aaa46e3d7f63fca35bd63f9a38adc9b93707866926d312bbe6e0ea586072055f779464e2fe574ae24a822a3dfe2ed298aabd4ef99c53dc7936a633ff43b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b60b4bae5d32f3cc3bab90504ac4e44
SHA1579ebc78accfd8f5c197341db6c45e3484a06357
SHA2564cb0ea5fd2692bb2078a04cb762a1b4b097d908ad199d211b707789b707d208b
SHA5120ce55db9ed08116956c9c3e08b31507e74dbcbb251db358c71d3b6f8c5ac5d6522aacb8aed6ece88d09a861377a9a89a0a7bb20c0168f9a9c141a1d4b438bebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5601b8e3991771166fb3e7d55776c121d
SHA15fcb6ab6d5fe68763bab699ece02cc445cba7d50
SHA256e369777867da942b1f9c2058eae11cdb067dbc679745939ffebba9532ba45827
SHA512fd5ac08963025e903df7f28e4a446b5e2dd26323442ad70c82c79cc966d858075f8495d2a13f8cf906f5a1fc5f2299154ca8bbdcdd835c73cda291f87c44d564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b25ec2d145c322cc0f160885934323
SHA1008b78ea7c7bd9e3e81172ddbb08e0bc833177c7
SHA256e326e0bda7de798ec718fdc20718b4bdf0a3ba3fa5f8fd163585cb8ecd702cff
SHA512649d399e10842d5aa0b87bb2d107d1d6afba2c0b16448fb50930f74ce3a616cd763a7fc697d98f792c53269fcb2a23aa40fd862709388d6de05d0cdb0e65b925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50283563c2d5e72cbdd9058b69aa16293
SHA1bf98881b33af4123445e422d4d08f8bac6d6af60
SHA2560ee971e7a50b0b44867a11316a9b4730199410f42bc8cdbb8dcd39706a8d52ce
SHA512d5432fa94cf2f1bf078dfc29a2ddfd46eceab4428c9777a2552d06fae9c566920ef8367d3f7b7a137262ff98e3fbba6d16891f3b971b21cf1c16362df2ec3574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5727a28fd2241e054aecff2f9e473502b
SHA100cf467bbcb9519d89321eb166fd200e005f80ff
SHA2564a60816db82f8948f13997ce827f5629f83da8d7db4ceb95845da0872de5340b
SHA512121b6a117b516131f3717f3a262eea49b5ea77aea446f2e45f2f9734858dcec1cd0f84bfa8bdca71b3876f9489df4e1bccc5f1ff98ba9551cae9c8335b126556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c93d39b1b595fba8642f0493a9bf9a0d
SHA1c2edeed5c70897432da21edbf743297abe5e2f59
SHA256b2394a1ce3c69b88cfe443677165d95a1cf9b798af41b13023f9caadd5d748ab
SHA51293cc384389c6e090778a92478eec94a75e8217e99412c225244fe1a2f19361c0daa80bcfc41b3e0a089328125be7cb60a35d09f74b4e1de3008deb7abf44e7d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c370e3115d05c98f37ffaa6f159ad5
SHA1b608a074d0c74c1a8d9a22a401521af13abe66ee
SHA256e4b1c0e092a53b4b3b31ad0138ad534fa196f3717a8acf65bea9a6c299d1f276
SHA512fa070848fff9956fd838195d836cd24ddc37b1ab730e7dbdc734c7a7a613f5aa425603f3b1c96df4eceaed219f9d26f2e96743b71d6a333111ec98b88ce702e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56185da94fa8f12487cd3c8e2255241ea
SHA185be38ece567c304796db70f7b7a24c5d8029bd2
SHA256793caee585f47bc84b216090f720d1c5de1953b712a56d26bc843f5af1e926dd
SHA51205d32e7f89bb5305bce365b16b6d9a2095e86c81503bc5d29dcce2eaf84850576964d57c26c0174bb8844edb8d71f4213bc59ed8190bc4ec642afff67f2f1617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158bc88affe433f755440892b27c5b78
SHA16cd308c2b4cfcee0a02a832703f3e7703afb42c4
SHA2561e83858124d5bcc6ce93bb51dea7dff15a1b946b47fad08478424332c430ba81
SHA5123206272049d48c3fe4e929460aedc855a3533c54107742514678a63df942b7cf97804f005be6357447f914924091350f63d1fa2fd6cfb9465fe54c1ed3454070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a90e81a5ad75b8b76d2ea5cf6184940
SHA16ba138eea11911ad328804787b00dcb86a86876c
SHA256fc5b4074f49057493f779d3d05f1132575302a8ef05b4c23e08a770f75efd2e3
SHA5127071943f1d6ac13e9f818641ad1406bc25fc73f08a1e0682b5f22dc83ede535b4e8a28cf55ae517958cdb81409ad6441e4a4f354588ddae7128ec196c12d0d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e8ccc1913397a3d217e9f4cf6b3673
SHA1d6c49f80d41c7fa3eadf542d5f4cd95ccf0c27fc
SHA256db742aed4d5f44b89c822d759964b96860fdd6be51b7e69bf0bf1b6452f4155e
SHA5127034d75e978e4f8728ab59db210204606e4cead49ca6b7b1f0666697012489162a1b49861bc97cdef6bc15f2ac0af2f1e0896f031b0d54bec2c534c91ecbd27f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d4fc7ba019c0c7e1da93e801eb3ec7
SHA1a14d83554063e03d47c18fd2bdadf752d6fc82ee
SHA256bccc63c191a0d9b6b48d0fe53b73eca3f953af87b73286791231e40672da138e
SHA51209bc531aa3eef54794a8d696afc64482caca9b64e5f18083c3b3a2c325f0054849b61b58622d4b8e25db9d805b628b7d8adebf8174297dd7cae55c9c260ffda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9cc24f592d60c2bb774028fa7380495
SHA1c271a92aa068efe07b8ab87253036919e7806ee3
SHA256af8d53558206a0089bb6db5cc81c5ae68ae185c8905f77e87ad25842dbe48e9a
SHA512627e56154a61c52ace4516fd7c11be46960fb22aa785b797f26bb97374d50091878cea64032727ba3b3c4b9e8e72b546173ace50e7f9f35052feb1830c569f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efcc59465b236fcecf442345a1a8bc68
SHA15f9f6bbd4364ee6fdabe236aedaacbea73a990f0
SHA2567229e9ba3c188a22fe9f7bb4a9544c259f3ac1e7d5126744623a5529390c4fb6
SHA512d91cbcc588d2a006a934a7e530416238993db66d650585e842c83cee0043de0cf2c01cc1fabf7dfc3ba77b32f037d9b2bbbef308d3dfa2b5d899715cf191d944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56608e91e0f7ba6913dad833670578125
SHA1cc0edb1cfffe51c399d49cf10eb209f2fa840886
SHA2562ba34bc03bdf7a851a4891ea96cb08c2fdb6c6d5a1015ab3fd42e4f0d3e0936d
SHA51260fa17786ba01c7deda3df1f5a8424712dae51dacea1d14394ffc26298100a2542cd7957962aa462f61b1a3b06cf4b43866cec20504d8432cb7cf1e7debef218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d2f77945115db1008114304dd2c93f6
SHA1ec2e5ca8a86f3bb416a62a3fb39d8b0dfb5ec3ae
SHA2565f981f97722df1b0293d7e2c83389e48923f49653d32fe2cb2bd2fdf48453847
SHA5124fb8f70b433a51ff35512a5283341871c754a74eaacb3256f22834b727172c8da641489668cf1a294ff285ccbf1dddca490e229f773bff9226024784cee9e691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305dede14c86141b6e98b5c650c15074
SHA15ae3393e8e446ed14c989fefa6e8a01444646bbd
SHA256f0798768ca4e5f6a33b106a9c718d29e3b1c6f382f309757ce4fcd1aa1062c1a
SHA512b4d52c79fea17a2faabaeaa3711dbb0f3c34ee84df853454eb2ebd66a7e890ff10f8b6252c7ae21a6e1b88e6e8fe3f2c411d7583cb71fccacc0e4366f25389f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d4e693ad9eb91aaae453ccbfe90792
SHA16cf20594bcf34a7091cdc258f59ed1723d3b8232
SHA2564b7356ae1b555298ed39e3852f603e4b77010b9bbea10962d871e93c07cf2897
SHA5123454817bea2345964c3ee2add5cb30c867dc7e52ed2e1cf33422b5d30c749e7e78e98ae2396f995d68b60df02955ab24009bbc277280d6e18a85d39d4ad08895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d48ccddf025d2572cedbf77c7f4cd08
SHA12c9a6749e5ca807f039555c5de1c522b986b9b76
SHA25607be0c2243b3fe14296f3f5ae6706e2ab9ff12f816fd88de3e75673356b5c0a4
SHA512e5324a0e978d96640f0ffe8369c5eb54b7fb3cf9fc64532aff8a1a28342af22068c9782f6c3ac954dcae1df0950f6df15fa48ca9cb534fc15989bd681d69d69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509094f53881b4844fb5569f59873058c
SHA12c25473961e9f0313a93a0012ac830bbf892de5b
SHA256e22c1374955a8794cd0ae253a818ee9b2c7388eab1cd27478d28d11aef7b400e
SHA5122bdd1d5ed7f95b9bb758c024af0f7e07eeb35375421f6d9e67768e229178c8436a166bd5a49dd3e31ce947f4a9e5b6b493ed4393db01628cca16d1165afe3c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587da31830133ddadde40c905740adfd5
SHA1dc7877deb3bb6a48b7cbfd79f195cacff78eb0e7
SHA256c7613067c84dc93cfc54408a280bbb6ede90776429852f1741463b6323717d9e
SHA51275a3592fb38b965ae13679b3ae23605fe310e00e88a80d842ddf20eef01fa7ce75ee49088b913804687fd0186f2fa8d8343b0884eca53e4adc457fd667a219dd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
86KB
MD5d0cc98952fe0aaccb7474a3f9ab8bd32
SHA16852686803eceaa19713fc0120276a39624a7d9e
SHA256056d72244c40fa4c913058e3b0ec96edf87f17755086d4536fea9706ca2aec8f
SHA512813100ac7828df5e3f415c22aac0358dfda5c53b0a66e19beb587dbe762d4ff11074f419a7bac0280d351fd4277839af41050ca1dd4253688183ee90169a9ef5
-
Filesize
752KB
MD54c48b2d17ed19bc9a8d528dc2b6bda5c
SHA19f54ab3839e04c98544ac83fc1a3b70f5329a631
SHA256fdfbefb60fe0c8c134c048abf1882ac0930c03f0be4870f12ce8abdeb1e2d8ee
SHA512bb1f3c743a87b44ae40ce961eaf2ebdba6902bc9782da9f42dbac82fec7355ed977ebc5235cf07af9c6ede511c8d50bbd4d0e3bd60907c1dac7c80652c57806b