Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
81s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/03/2023, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
r.msi
Resource
win7-20230220-en
General
-
Target
r.msi
-
Size
270.5MB
-
MD5
522c0b0d445c62cdeb0a80bcce645d57
-
SHA1
5dad52c67d114f7a3a5a1e7ae5b15b581054d468
-
SHA256
957639998125a31c998b0104dba7f463d0659716a0a5b62fcc82eb28a0c0477b
-
SHA512
97da31389ca0986c5f63244573ad0edd6c83feb7e9c44557acfb51832db308c6165cdd390d1555ee8dec941cc0cb896fa1ccc59cbf7b9de9610003f0bd2e8a48
-
SSDEEP
6291456:FTUNwNgD8hhlK4sCC90uWHgnNfTSeHRAod2da0Dmq75UpY21DYJ5HI:1UN5DqKnCULtnlnAM2kE5Gco
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 920 msiexec.exe 4 920 msiexec.exe 7 1628 msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 1532 CitrixWorkspaceApp.exe 292 TrolleyExpress.exe -
Loads dropped DLL 8 IoCs
pid Process 1532 CitrixWorkspaceApp.exe 1532 CitrixWorkspaceApp.exe 1532 CitrixWorkspaceApp.exe 1532 CitrixWorkspaceApp.exe 292 TrolleyExpress.exe 292 TrolleyExpress.exe 292 TrolleyExpress.exe 292 TrolleyExpress.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe -
Checks system information in the registry 2 TTPs 1 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName TrolleyExpress.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Citrix\Logs\CTXReceiverInstallLogs-20230313-091124\TrolleyExpress-20230313-091124.log TrolleyExpress.exe File created C:\Program Files (x86)\Citrix\ClientID.txt TrolleyExpress.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\Installer\6cc478.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID9AA.tmp msiexec.exe File opened for modification C:\Windows\Installer\6cc479.ipi msiexec.exe File opened for modification C:\Windows\WindowsUpdate.log TrolleyExpress.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\6cc478.msi msiexec.exe File created C:\Windows\Installer\6cc479.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\6cc47b.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1628 msiexec.exe 1628 msiexec.exe 392 powershell.exe 392 powershell.exe 1532 CitrixWorkspaceApp.exe 292 TrolleyExpress.exe 292 TrolleyExpress.exe 292 TrolleyExpress.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 920 msiexec.exe Token: SeIncreaseQuotaPrivilege 920 msiexec.exe Token: SeRestorePrivilege 1628 msiexec.exe Token: SeTakeOwnershipPrivilege 1628 msiexec.exe Token: SeSecurityPrivilege 1628 msiexec.exe Token: SeCreateTokenPrivilege 920 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 920 msiexec.exe Token: SeLockMemoryPrivilege 920 msiexec.exe Token: SeIncreaseQuotaPrivilege 920 msiexec.exe Token: SeMachineAccountPrivilege 920 msiexec.exe Token: SeTcbPrivilege 920 msiexec.exe Token: SeSecurityPrivilege 920 msiexec.exe Token: SeTakeOwnershipPrivilege 920 msiexec.exe Token: SeLoadDriverPrivilege 920 msiexec.exe Token: SeSystemProfilePrivilege 920 msiexec.exe Token: SeSystemtimePrivilege 920 msiexec.exe Token: SeProfSingleProcessPrivilege 920 msiexec.exe Token: SeIncBasePriorityPrivilege 920 msiexec.exe Token: SeCreatePagefilePrivilege 920 msiexec.exe Token: SeCreatePermanentPrivilege 920 msiexec.exe Token: SeBackupPrivilege 920 msiexec.exe Token: SeRestorePrivilege 920 msiexec.exe Token: SeShutdownPrivilege 920 msiexec.exe Token: SeDebugPrivilege 920 msiexec.exe Token: SeAuditPrivilege 920 msiexec.exe Token: SeSystemEnvironmentPrivilege 920 msiexec.exe Token: SeChangeNotifyPrivilege 920 msiexec.exe Token: SeRemoteShutdownPrivilege 920 msiexec.exe Token: SeUndockPrivilege 920 msiexec.exe Token: SeSyncAgentPrivilege 920 msiexec.exe Token: SeEnableDelegationPrivilege 920 msiexec.exe Token: SeManageVolumePrivilege 920 msiexec.exe Token: SeImpersonatePrivilege 920 msiexec.exe Token: SeCreateGlobalPrivilege 920 msiexec.exe Token: SeBackupPrivilege 796 vssvc.exe Token: SeRestorePrivilege 796 vssvc.exe Token: SeAuditPrivilege 796 vssvc.exe Token: SeBackupPrivilege 1628 msiexec.exe Token: SeRestorePrivilege 1628 msiexec.exe Token: SeRestorePrivilege 272 DrvInst.exe Token: SeRestorePrivilege 272 DrvInst.exe Token: SeRestorePrivilege 272 DrvInst.exe Token: SeRestorePrivilege 272 DrvInst.exe Token: SeRestorePrivilege 272 DrvInst.exe Token: SeRestorePrivilege 272 DrvInst.exe Token: SeRestorePrivilege 272 DrvInst.exe Token: SeLoadDriverPrivilege 272 DrvInst.exe Token: SeLoadDriverPrivilege 272 DrvInst.exe Token: SeLoadDriverPrivilege 272 DrvInst.exe Token: SeRestorePrivilege 1628 msiexec.exe Token: SeTakeOwnershipPrivilege 1628 msiexec.exe Token: SeRestorePrivilege 1628 msiexec.exe Token: SeTakeOwnershipPrivilege 1628 msiexec.exe Token: SeRestorePrivilege 1628 msiexec.exe Token: SeTakeOwnershipPrivilege 1628 msiexec.exe Token: SeRestorePrivilege 1628 msiexec.exe Token: SeTakeOwnershipPrivilege 1628 msiexec.exe Token: SeDebugPrivilege 392 powershell.exe Token: SeRestorePrivilege 1628 msiexec.exe Token: SeTakeOwnershipPrivilege 1628 msiexec.exe Token: SeRestorePrivilege 1628 msiexec.exe Token: SeTakeOwnershipPrivilege 1628 msiexec.exe Token: SeRestorePrivilege 1628 msiexec.exe Token: SeTakeOwnershipPrivilege 1628 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 920 msiexec.exe 920 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 292 TrolleyExpress.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1628 wrote to memory of 392 1628 msiexec.exe 32 PID 1628 wrote to memory of 392 1628 msiexec.exe 32 PID 1628 wrote to memory of 392 1628 msiexec.exe 32 PID 1628 wrote to memory of 1532 1628 msiexec.exe 34 PID 1628 wrote to memory of 1532 1628 msiexec.exe 34 PID 1628 wrote to memory of 1532 1628 msiexec.exe 34 PID 1628 wrote to memory of 1532 1628 msiexec.exe 34 PID 392 wrote to memory of 1796 392 powershell.exe 35 PID 392 wrote to memory of 1796 392 powershell.exe 35 PID 392 wrote to memory of 1796 392 powershell.exe 35 PID 1796 wrote to memory of 1880 1796 csc.exe 36 PID 1796 wrote to memory of 1880 1796 csc.exe 36 PID 1796 wrote to memory of 1880 1796 csc.exe 36 PID 1532 wrote to memory of 292 1532 CitrixWorkspaceApp.exe 37 PID 1532 wrote to memory of 292 1532 CitrixWorkspaceApp.exe 37 PID 1532 wrote to memory of 292 1532 CitrixWorkspaceApp.exe 37 PID 1532 wrote to memory of 292 1532 CitrixWorkspaceApp.exe 37 PID 1532 wrote to memory of 292 1532 CitrixWorkspaceApp.exe 37 PID 1532 wrote to memory of 292 1532 CitrixWorkspaceApp.exe 37 PID 1532 wrote to memory of 292 1532 CitrixWorkspaceApp.exe 37 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\r.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:920
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\citr.ps1"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1eijkopt.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES15A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC149.tmp"4⤵PID:1880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CitrixWorkspaceApp.exe"C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CitrixWorkspaceApp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Ctx-FCD29BBA-6447-4894-AC85-7062F622C9C4\Extract\TrolleyExpress.exe"C:\Users\Admin\AppData\Local\Temp\Ctx-FCD29BBA-6447-4894-AC85-7062F622C9C4\Extract\TrolleyExpress.exe" "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CitrixWorkspaceApp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:292
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:796
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000520" "00000000000004B0"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5ddf411762e0293a8c89215df10a24e47
SHA16a54cc945aa90b75f0ad1f694770d950f0cd8e25
SHA2561ed50fbb4b6b2ce06a7ad175625e3b655211c1a515666bfcd92d31c712778e84
SHA51299caf80f1e4b67aaeca7d76b8d79ca7db7cbdc6324689dbd9f2a0a163ef705a64539a9e2870715533843e8b9a0c85ae55434fa6eb12185d0d21118ae90b4fc65
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
1KB
MD5e94fb54871208c00df70f708ac47085b
SHA14efc31460c619ecae59c1bce2c008036d94c84b8
SHA2567b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df86
SHA5122e15b76e16264abb9f5ef417752a1cbb75f29c11f96ac7d73793172bd0864db65f2d2b7be0f16bbbe686068f0c368815525f1e39db5a0d6ca3ab18be6923b898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560bd73540c135f27f14936570eec89bc
SHA1ffdd186d71645c56ec80a189ebbaade57042d67a
SHA25626c7cd834b6ae5e695a9340e2396001be2a206a1829594f319c8bf6c436749a0
SHA512d28554ed17872e86ad99efccfafdb9ad58c290e8521545a009df872b120ce8034d6075e1d41e359988bce76b76bee758017a3eae58cd46133f4ae2dc140de1d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560
Filesize264B
MD5acb354500d456eeadc7523ab5e2d2c10
SHA15a906d33fb31f08901dc26060ea186a1a59dd5a4
SHA256d556bdfb5be080c02eafcc5ce3cc2dc922f9f13a02c518767cb7298e44a5e62f
SHA5125ec1f150db922ecd8b91e69a8822d6152a62f014ed1e3ab1d022a50886d87e679578ebe3e6bf6b3616a525a1b1fa0d63b11d14d040404d37f5d011054fe308d5
-
Filesize
3KB
MD59f6d73634000b45d0bfe33965949536d
SHA18cbc7edeeba5af9bd353894eac7700f039075ac3
SHA25622883ffa30b6919f627c97992b412c43c8a7dfa6595dafc8a9fb60282b57fc9d
SHA512a572dfb3fce78df019757941440372c06e512a150bf918de894dbb6a83f8428ea36ec2c69267dd6664a047ebf03cf71ac0b6322dd40061e46da3d7ab5acfd1e5
-
Filesize
7KB
MD5994fba99c81d81035b1f50d560ef6ad1
SHA19bb6a4113bd39c1b8dc025e52817fa6120f57281
SHA2566d761353385ebd139220d7040fcd10ad2ee4098f6b119a69713fe1389bc48d8a
SHA5121bc39a47e61c925ba7a7bbde71086243850dd8ba095d461e51f35ec390b81b3c880b0c8f1256bd65b74fd88876c4d8dc74dcac46f134779221a6e858ffce8112
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Local\Temp\Ctx-FCD29BBA-6447-4894-AC85-7062F622C9C4\Extract\AnalyticsInterface.dll
Filesize994KB
MD54bff4cc33f8ab15c1ac720b6699865e2
SHA12696dd32299ef75fec43c4807b56a71c4c277af4
SHA256be31bb68f16d8cc98f46e7257bc49f26ad79c0bb2103e3ceceddd4ca1ac4f590
SHA51207d7b2fcd18da018b81c102495d37eaf1221f8d9829fe483b7523ef0d73e820b038a12f63e37f1a513bc7090cb55fdecddc1adbdbff020c1479967b3df000a87
-
C:\Users\Admin\AppData\Local\Temp\Ctx-FCD29BBA-6447-4894-AC85-7062F622C9C4\Extract\CitrixBrandingHelper.dll
Filesize2.0MB
MD59492de748b5febc6c13b766842bf0a08
SHA12766bf3beef833de76998455dc08d5867bfbe57a
SHA25605b74d3260f319b746907a4e57fd0e66b1b9b2082ac802830022c642935b0509
SHA5122c102153694d6118d19ef5db5e11effe0dce5e937e4010cc6ad87578ea68776ae41f45d7f3c771a47ebe0dec30b2bd36c2201b8597b60e4a90ad6d3d7b1fe341
-
Filesize
264KB
MD5aa1d501f4eb554413e2bcc3a2cb8cde3
SHA114757a2d8dcc8da22abf4a9d14cb6cbcd071282f
SHA256e45cad74493df15b604449e27b3932c01e345f16e19ab8767a6fa23d50707764
SHA512b718de474018b4c8d0da83c531c917b513234a386ba2aec839369988768e78a1bad9773e100fe89496c3f87dd3b6a99211ad3c0d211e8b108a7a2a10951e4305
-
C:\Users\Admin\AppData\Local\Temp\Ctx-FCD29BBA-6447-4894-AC85-7062F622C9C4\Extract\TrolleyExpress.exe
Filesize5.9MB
MD5b1fb983c2fbb56c5954cb32f63b81ebe
SHA1dbea158f714d4a8ee525f9c8a3de0c859f9ea1fe
SHA256d5388d1cec333cb1fe008f4226c341a4209b291b8264fd7f8f6c4196257702a9
SHA5126ceeff10a02262a8367249eca3f1b57b247e10745e9ee2b265f1c119e15dbf4441cfc5941125fbb7833eb7a78da1a60465ab1f5addd4f22659987fb73190a122
-
C:\Users\Admin\AppData\Local\Temp\Ctx-FCD29BBA-6447-4894-AC85-7062F622C9C4\Extract\TrolleyExpress.exe
Filesize5.9MB
MD5b1fb983c2fbb56c5954cb32f63b81ebe
SHA1dbea158f714d4a8ee525f9c8a3de0c859f9ea1fe
SHA256d5388d1cec333cb1fe008f4226c341a4209b291b8264fd7f8f6c4196257702a9
SHA5126ceeff10a02262a8367249eca3f1b57b247e10745e9ee2b265f1c119e15dbf4441cfc5941125fbb7833eb7a78da1a60465ab1f5addd4f22659987fb73190a122
-
C:\Users\Admin\AppData\Local\Temp\Ctx-FCD29BBA-6447-4894-AC85-7062F622C9C4\Extract\TrolleyExpressUI_en.dll
Filesize3.1MB
MD5748674a3f4fb964b774c9df13c10e145
SHA12e115ca53fabcab37ca12177042e2b89794ee787
SHA256b2a7f96b3c6345b1815e018fdebf122439deda71d715779644fd661a39b370af
SHA51224d4fe341957af2b50de33abbe7c3f2e7fc33ad1507079141f96ae990d35ce74c8640cff274f00e76e839b06ccfaedea30222c44047cd494c2f8f4c7ed46b884
-
Filesize
48KB
MD56a159a4511565020a725cdb2ed22755c
SHA13ea8ac65b1787ce006df7f9158646aaaac236459
SHA2560a320d86ccaa9a2f43f8cc7a503eb4121078a84607360c6c4e13e0ce62d805df
SHA512a595b23d879e3bc3cc52379a20182736d02c6bb5568fbd3270ad629d0f2069e2f8068483f550fe8e0ba2727902d563a70ee6cdafccac552bddfd40e852cf3213
-
Filesize
269.4MB
MD59fc9236fd9fc3fede8a6b2c64965696b
SHA10b090e64f788cd5ebf1a5afdd402d533facf2415
SHA256046fc29661664bbc1e8c560c76bca11ef2386b0537ebb4369799f92e81e05dc2
SHA5127d1b435a7d57c91ad766f8cca55545c7f2decf13427bbbaf21eb23ae498791ca469a1739419b1c8e4774e1c0b700b8257ef57ef14bd6f95db22eb63c3ef24d1b
-
Filesize
2.2MB
MD56f255f7dfc19b858d78285ea03ec8f1e
SHA14e03cfe945f403360d560f402cfeec8a4da51017
SHA25623fab0dc1bdc6e0cfa3e3365b286d03382c495e7a5ccc9f9a5a01bbf86bc0b3a
SHA512ec66c8ec98a9872dff89abfbe06057cc6dc9ce1199be021ef32201dcfe87e473cfe69c5db7fa61f6d09b19cef541af03344532833e37faeb2a3989c8bffd291a
-
Filesize
1KB
MD5901766cb7a2920d24820d61fc8c7120e
SHA134c28e54ce3f3cbaaaac530396ff9019f9c61094
SHA25686066ae7aaa3d970f217e6ed53c8cf91c9b547c02e75e9a0d395be09fc6013ec
SHA512b9e8fac4dfdd0a47bfe9d57f16cc1f3480f6893419f977b69b69aec131f7e9d748c1fc8fbe22c6ed0a5c4306190baa37f68aabf1a95fc1a9de0797fed77b8a9f
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
270.5MB
MD5522c0b0d445c62cdeb0a80bcce645d57
SHA15dad52c67d114f7a3a5a1e7ae5b15b581054d468
SHA256957639998125a31c998b0104dba7f463d0659716a0a5b62fcc82eb28a0c0477b
SHA51297da31389ca0986c5f63244573ad0edd6c83feb7e9c44557acfb51832db308c6165cdd390d1555ee8dec941cc0cb896fa1ccc59cbf7b9de9610003f0bd2e8a48
-
Filesize
203B
MD5b611be9282deb44eed731f72bcbb2b82
SHA1cc1d606d853bbabd5fef87255356a0d54381c289
SHA256ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6
SHA51263b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4
-
Filesize
309B
MD57ff43fd6a016e1d4dedc031a69fa4a3a
SHA14a6beb45248f49189be39b9975fe7fbf67479d22
SHA25686b8cf79746e94ff1ffa48c93fb1c8e410b7d8286a8115da217accc3c8ec1aec
SHA51214a750e246c7626bfd9c4c2b40de72c91fe60e94760e941eb18cc3c50103c57cb96563e45abd9c1bcf7579ea3ded1ebc20e35c09ece0a4e8309b3c554531c0c8
-
Filesize
652B
MD5f69d027f0aff303876eba0cc2538f327
SHA14b8f04129dd38b5f037d415f1b6cc204801047aa
SHA256fc7e91e08a723acacb7b104d12091c940a4a8eb0626626cc82b89e076884a577
SHA5123afc98d8cedf034f9258e6fec7a69a0c62ad450681c6f851e611471d2b7a87fe90c677fe099f8f000d4f4b1ac32e44c9b08811775f5b534b903fe66587ccbaae
-
\Users\Admin\AppData\Local\Temp\Ctx-FCD29BBA-6447-4894-AC85-7062F622C9C4\Extract\AnalyticsInterface.dll
Filesize994KB
MD54bff4cc33f8ab15c1ac720b6699865e2
SHA12696dd32299ef75fec43c4807b56a71c4c277af4
SHA256be31bb68f16d8cc98f46e7257bc49f26ad79c0bb2103e3ceceddd4ca1ac4f590
SHA51207d7b2fcd18da018b81c102495d37eaf1221f8d9829fe483b7523ef0d73e820b038a12f63e37f1a513bc7090cb55fdecddc1adbdbff020c1479967b3df000a87
-
\Users\Admin\AppData\Local\Temp\Ctx-FCD29BBA-6447-4894-AC85-7062F622C9C4\Extract\CitrixBrandingHelper.dll
Filesize2.0MB
MD59492de748b5febc6c13b766842bf0a08
SHA12766bf3beef833de76998455dc08d5867bfbe57a
SHA25605b74d3260f319b746907a4e57fd0e66b1b9b2082ac802830022c642935b0509
SHA5122c102153694d6118d19ef5db5e11effe0dce5e937e4010cc6ad87578ea68776ae41f45d7f3c771a47ebe0dec30b2bd36c2201b8597b60e4a90ad6d3d7b1fe341
-
Filesize
5.9MB
MD5b1fb983c2fbb56c5954cb32f63b81ebe
SHA1dbea158f714d4a8ee525f9c8a3de0c859f9ea1fe
SHA256d5388d1cec333cb1fe008f4226c341a4209b291b8264fd7f8f6c4196257702a9
SHA5126ceeff10a02262a8367249eca3f1b57b247e10745e9ee2b265f1c119e15dbf4441cfc5941125fbb7833eb7a78da1a60465ab1f5addd4f22659987fb73190a122
-
Filesize
5.9MB
MD5b1fb983c2fbb56c5954cb32f63b81ebe
SHA1dbea158f714d4a8ee525f9c8a3de0c859f9ea1fe
SHA256d5388d1cec333cb1fe008f4226c341a4209b291b8264fd7f8f6c4196257702a9
SHA5126ceeff10a02262a8367249eca3f1b57b247e10745e9ee2b265f1c119e15dbf4441cfc5941125fbb7833eb7a78da1a60465ab1f5addd4f22659987fb73190a122
-
Filesize
5.9MB
MD5b1fb983c2fbb56c5954cb32f63b81ebe
SHA1dbea158f714d4a8ee525f9c8a3de0c859f9ea1fe
SHA256d5388d1cec333cb1fe008f4226c341a4209b291b8264fd7f8f6c4196257702a9
SHA5126ceeff10a02262a8367249eca3f1b57b247e10745e9ee2b265f1c119e15dbf4441cfc5941125fbb7833eb7a78da1a60465ab1f5addd4f22659987fb73190a122
-
Filesize
5.9MB
MD5b1fb983c2fbb56c5954cb32f63b81ebe
SHA1dbea158f714d4a8ee525f9c8a3de0c859f9ea1fe
SHA256d5388d1cec333cb1fe008f4226c341a4209b291b8264fd7f8f6c4196257702a9
SHA5126ceeff10a02262a8367249eca3f1b57b247e10745e9ee2b265f1c119e15dbf4441cfc5941125fbb7833eb7a78da1a60465ab1f5addd4f22659987fb73190a122
-
\Users\Admin\AppData\Local\Temp\Ctx-FCD29BBA-6447-4894-AC85-7062F622C9C4\Extract\TrolleyExpressUI_en.dll
Filesize3.1MB
MD5748674a3f4fb964b774c9df13c10e145
SHA12e115ca53fabcab37ca12177042e2b89794ee787
SHA256b2a7f96b3c6345b1815e018fdebf122439deda71d715779644fd661a39b370af
SHA51224d4fe341957af2b50de33abbe7c3f2e7fc33ad1507079141f96ae990d35ce74c8640cff274f00e76e839b06ccfaedea30222c44047cd494c2f8f4c7ed46b884
-
Filesize
48KB
MD56a159a4511565020a725cdb2ed22755c
SHA13ea8ac65b1787ce006df7f9158646aaaac236459
SHA2560a320d86ccaa9a2f43f8cc7a503eb4121078a84607360c6c4e13e0ce62d805df
SHA512a595b23d879e3bc3cc52379a20182736d02c6bb5568fbd3270ad629d0f2069e2f8068483f550fe8e0ba2727902d563a70ee6cdafccac552bddfd40e852cf3213