Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 02:22
Static task
static1
Behavioral task
behavioral1
Sample
7be5b51fcb204a9ecfbfc6756d3914eb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7be5b51fcb204a9ecfbfc6756d3914eb.exe
Resource
win10v2004-20231215-en
General
-
Target
7be5b51fcb204a9ecfbfc6756d3914eb.exe
-
Size
146KB
-
MD5
7be5b51fcb204a9ecfbfc6756d3914eb
-
SHA1
af03c7e483eda95fd6b8e13bd3e36800603c1748
-
SHA256
980970e24b7a2f0df9b56bbcf7f83643133a383893d13cfad11c3207687dc723
-
SHA512
16ba1a2460f362eb415ca7b88e429724ef356fde0785390623d9aa795ae11f178f25d70e1430fbb0ad1b5be5120a3370701af970574ad3652729e291534fb567
-
SSDEEP
3072:7SkdI1piGkg0OTLvbQEAV53NjnlBr2sYoBOlljOaG5+4:Wk0ir92jbnwlB4oQO1Q4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412570438" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000066f7b631471b5fda317996ffeae480a5c490e11508376ebf5d0340fea880798e000000000e800000000200002000000005b447aaf3ffac988235865b4e28761f24a421f66ed0d883535695513b95933c9000000002cf61489a5bd0e49c258ba206fe532952866344667d5b4524d7b5809139f8be47da8eb4d21f17e913d839b271de53a04fe501de8a86fa7cd26378da844e5e368eebc41f3c076233ac83b7a6ac793b3ad0481342644aacc3723ebaa19cad504deb504a8f6c0befe76249aa9b9330e08fb92329e00ace1255beeb9c0f8f66c04d4a7b16bdba6e72218339d5b7dbb4461c40000000ef35ea156d9a6766971bf6fc8f04bdf818b34d84ffd0361096fe927c9a63915bfab7043ea679adb1d5e8b0985c68d14cf9b3061efe0cd1907809233eaca44e93 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f120000000000200000000001066000000010000200000007070080a74b2caea1012008812dab04a6ab9105b36c01c0078b15a4f842ff8aa000000000e8000000002000020000000c9121267a4dc2f89e2e712a99cf8bddda5ebf68650ffbc19d5ffe8960b21d692200000005959b52a5ac9e1295f78d808e89681984c9ea851dbfd7b493243559602f914f840000000d8ca234aa877f739fb4f0070a1a1ea93fc9d03f93d64750395e05b366495d2c6d63dee5054dbd42de2710723c2bb7ebe5021de504b055d8128ba26cb3a2c9690 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506a87fa9051da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22F28561-BD84-11EE-9CB1-72CCAFC2F3F6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 7be5b51fcb204a9ecfbfc6756d3914eb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 7be5b51fcb204a9ecfbfc6756d3914eb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 7be5b51fcb204a9ecfbfc6756d3914eb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 7be5b51fcb204a9ecfbfc6756d3914eb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 7be5b51fcb204a9ecfbfc6756d3914eb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 7be5b51fcb204a9ecfbfc6756d3914eb.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2372 2980 7be5b51fcb204a9ecfbfc6756d3914eb.exe 28 PID 2980 wrote to memory of 2372 2980 7be5b51fcb204a9ecfbfc6756d3914eb.exe 28 PID 2980 wrote to memory of 2372 2980 7be5b51fcb204a9ecfbfc6756d3914eb.exe 28 PID 2980 wrote to memory of 2372 2980 7be5b51fcb204a9ecfbfc6756d3914eb.exe 28 PID 2372 wrote to memory of 2796 2372 iexplore.exe 29 PID 2372 wrote to memory of 2796 2372 iexplore.exe 29 PID 2372 wrote to memory of 2796 2372 iexplore.exe 29 PID 2372 wrote to memory of 2796 2372 iexplore.exe 29 PID 2372 wrote to memory of 2796 2372 iexplore.exe 29 PID 2372 wrote to memory of 2796 2372 iexplore.exe 29 PID 2372 wrote to memory of 2796 2372 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7be5b51fcb204a9ecfbfc6756d3914eb.exe"C:\Users\Admin\AppData\Local\Temp\7be5b51fcb204a9ecfbfc6756d3914eb.exe"1⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://br.youtube.com/watch?v=0U2mZ536UzQ2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5bbf5a7264d3a07f47d409c029070d8ab
SHA124c37d25dec24c0831c00e7500f758c1ee6ef658
SHA2568c3d25ad2598eeec69ed74c6f4e27c5c1cf5290bbe668728429b81b48ff6c6d8
SHA512ccb79747cf8dbf0fea9ae9a88d404ec84d076a3036695ecf904c7ba13321a8ea4413d9cdd629037d35b36606baebff9eb9d9c39c83a4f16ae14d726dd75c158a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f019aea89c43829dc82b00ed9afb6d88
SHA1c5eabb3138711979292ee9343dec98d1411ecaa9
SHA25607b23c7712c22b8c7b81043a824dbde8338838d8da42557777ebeaf35f9dd314
SHA5120ae9fa87f1a2c149777bad05c99779e57b80a528ef3244a4a4cb7899e9dd607e9b3d3349671359de22943fac84f3aec675ea60d6f50dc58c23961b3ceef827a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a268027a1e6a82d582a2ef4f33cca94
SHA17b2acfda211f276a4bf461ca76d43de01d6ce658
SHA25635df9bd6923feefc6c24d8c7976f877354fe8b0b76b3dd993c2cf9223a7f4078
SHA512adb4569c844f2b1f4932bc982d9cb4a614a5dbba1883c4817ece7a81edf5ec25f6f835ff4837fc755b81e476d71dce68dcc84b12945d834e85232c07cc7f2193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b06643337a759c9d738941d810961250
SHA11b23974ccae8bb4ea09ae797b0d78aac29d16ba6
SHA2568a0a613393d428c7aff831442ffdfeb0c122fbf363a21e8bcd33896d7f4f8cf2
SHA5129ef544c6611db28f6ef416b2d77a761f9f1f99794ee910d9af89092a5e1ae4f0cec30e2016f1de0b05d8de6a714d0cba2ed5daeba9ed1f6725c410e50f6fe9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e29b1cf055f561f9f11c73d4a90b508
SHA1985a8bee328d1332edc4c69ff986d0a4613f22c3
SHA256ef4e8067e4c6427b3495f46b40753415e01ad6777be429d627e62a832d628064
SHA5124e0d26f1880bed395efb37caa0da2e4661db2935ccb9ac8e37a0939d3fcdde98bb029de66ad74da72ab027da048cabf46c6c9b58aadfcc560f7a48394d225d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b57a8fcfe8c24d95696fe2941e371640
SHA120d8bf0e2b73dc0c78a7da27d83bbab402de3acf
SHA256e30980740002000a19d9a147c3bc26306c39a124b558a7280016e9ca584b14e0
SHA512929134ca08cacf49a0e62eadf9f0bfc9e922c772ccfe64782afa685a1b901de9ff00baf70e03d132f3350d8b3faf7a409a80e424f2217b467141cd9ed37751aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e355476a353bccb5e474d9f5da6b1117
SHA184a2d12896f38a63df55dfa2373f384603004964
SHA256c82dc737b9f543ac78551d0ec7e337bb45da0781a15c83da05ee884c092f98b8
SHA5125471456a9055820939e4c64c913010d59a6ff8369ea54ce83be95280ea693e5102c27b51eb8826015d8c631de71f5f5f6d27104c8cc6d15f5c16e4ce46854bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5819b0a27064f1df883cdb799ac2b642f
SHA1961b5b08333ef4b4a6ff10b7a68cfcfd3e269dce
SHA256ca8fd067dff21923b6374c762b3b4064ee62b0e2cd9cef403aa62f5a5b956f64
SHA512523a564b46dcba8186848af332e9f69b5be2dc7f049fc2c95faf207c3f8085021d2473ae35477700ab59b70b0ef433e200ac380a18b4fec60ab6263c29f2b2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f461dbaf7ccb956d2738407b149b72d8
SHA17b9d577584da799055e2981760c99e5f37685e2d
SHA2561e9059fd82cf7ddb8ebbb6baaf92f087407f17331e0aab3bee200b653a74b0ac
SHA5122309d6e1d1674afa68de6094bd4eda5e455934f33543dbe2a56d3bfb99fad985fdd6e63ac8bffe1a659b6ddc295b6023f62d71750fe8a44b0c6429a5e1afc576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bf5d04d794106fa96bfbe07344f4bb7
SHA1998fc03c1484b145d2b636867cd5de7d3d7a92e2
SHA25626bab7718fc0f784396a000578de78fbf1ed7e170568903cf4e4f616419782ca
SHA5125cfe6b6f9c1a50b57bf8f0ff405878509cfbb93ae0e2b181c0f9ea7a5687184211ab24807dbd71d8e78df0d302235b6359adb5f5708b4d62c33af5be10b37fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7dcb479ea1836f2698bc242003e90ea
SHA1f0172d015031aa822106c0afe254f7c585395b76
SHA256dc212de31e6cf21f7ec55957f30e89b3cdcbe3d1641a50ea09ef3d86b8212400
SHA5120777c0b928654c1c10fab19e61c6dbe7e2eb559ac1863f708131efafd2c168922e88811fd3a407ed7e9a23f63d8c169874feb31f5dec25ffc97cfc8f19c3ea7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e956476a4c98cba73e80f07671e2b49
SHA1bd7b463951909ba8e47f6416bf0bd53e7d0cf027
SHA25697dbb536f08244039fb1ab1b40e9c22301c06c0f7a15c7d2a02200b50ed35ff7
SHA512775f6680c67bbf9eb0faed750fa975e16935f8100cc91a54f0eeb7d588a4a027e5913fe8fa89a10665c688c6a47f817fa0e60bba59bec93800aa75002044eb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59da3f8b3de17f4393e7ff0e296d19f1b
SHA1dd4781476e24eda979cfc04326ccc682c6432fae
SHA2569848fab77f487fc133ca3edcd12d0ac6db23c5f32d02f2fea33c1739cae2dd92
SHA5122b7a5cfd4156dcfd80b5a23a1d9a065f8b73e4c14e2f0d834124349a300944aa24ae034e92c0a11f3509dc586078c99321d243f0cdb72e73ebf6db564fc6da9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab9fb73e969ccee5440a013aef5d2712
SHA1d604fe7a47274701e87e56d6175a0bde2664f491
SHA256485557f4e02812262c1eb9b52ea4d7a864f6acb86c2c673419467967e8086aaf
SHA512e9f70117d4cbf1d4934f9a28452527896a22d9c526891ca2b2984c61686b9f798fd463b552286ff491a8d54b12acd577b76e75d59a6ce3d76c40b415c394d8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2d8b7f517f7f8d52d8ee45b3ab537a4
SHA18ce654f77d34be08afd284b471f302b97357134e
SHA256c8ae14300ce0ceca16ff4cda23d2be7bd7136c3f677c0b05be0ab847c2df4a1e
SHA5125a78056048398f27fba33f2566be07e2dabea4f682fa0a863684aa346ed1c04cdeb18606faf54f9cc87505854373c5ac83aae67e8460856dd5f5252653e9c58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50835deb7b603e41feaca238b95824593
SHA18b171b09ad6739fb2862b7b0c6972b5992ce3c51
SHA256bb9473f59dc38f95fbff5ca5f5190d7e0f10e753d4f165f26195cbe96cf7c775
SHA51289520d308177b4f238cd0d40b9950d25f9170fe80fda4d5adf3d969858fe9b1773cbafe34274631e4de51af61c2ddc6230e484c72925326da50033f886a1d24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52239e0bce43d235a2ca7223cf862ed0b
SHA152ecf00df8d9b8cbc83c0d85d9c1e151795c0025
SHA256573c7a241038a67393cec8ad4f2182d2e95cee769e98dd4d2cf7ce7ab027133e
SHA5121bbf889a2d6aa97b2b3e89b59a0807028d9c629e442e43f24be407d6b8cee33ba85a0c22f4b7f7a9c4a27255cb6fda353a18c15ec9005d48f0fdfd1d89f2f569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57916ff3c3af39d8107c8d27f42efafde
SHA1e02446c3fdf967ad2b053286fc9ef00537e06ede
SHA256809a1b049c4ffb4b915348f9c87f82c644f451574479dd5f4ccc02cafa6dce6d
SHA5128f401c48f868a8bbc5149206a6d27146b36edcc6caa6f03a5cfde9f6f21cc54e8d8a5fe91f20e2bf5ef83368c645cbeebcce02c68bcb8fd481434edf72048ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2793e36507babee00fa110f1dbdac29
SHA16bb95efaa63033002e54b9fccb77e8e225bc3250
SHA256cd50b79a2a4c73020743d53582d602e7beb52353b13f1055361c19176eaf4f54
SHA51255599dd5f0157efa4aefa99c5c82a754634027cfa37deb08b6af2122b5d52b6e3cf82568b985ba4a4a703667fc4c577e5872157a48148d5e89b98c4dd14e5455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d9d6525c95497773e0de3cfede79d87
SHA1f252aa8b77257935c710abcce2898c5bd7e999b8
SHA256feeb8cc35a2e09df848e82591bb17a1620530d77fad9563f8da3f75fefbe3ad9
SHA512b6cc8d98700158e5b6a25f86b10bee004f407525c7377270cf07056fba9b9aa629fb849133a1266e4a629474cc65abf2d5833324716f98f03c1106d280b5076e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba0b9673b365bcf0f8911f568c6cbc9b
SHA1b780b4b6a57a9a4a38f687cdff031d5e36839943
SHA256bf06cf3d2a335ddf359e5b77345ee0113c7ef7c9e8867254b0bf4a87e7225539
SHA5124e639d7c00ed7e2b88ee003b0be4321ea4fdc9d2500c2377d423b32510011cfa5c77be5f52754e6898134168e070911ddb0793137befe671dbc0871acabc526c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8f67b1047a46f96d2a8ef1063a90f66
SHA1e91455b8e9b95e033696773ac9cfe734900ee9b2
SHA256820542b4ac593b5ffd61451e9fb91637b02afa958c829b7208d650de0b36e310
SHA51246f3276bd89f7974128e48f234fb99675eba6c38f2d500002c89b7761515cc7cb9c235661977f57840c66f179387311539d2c9965b2353588d1748e207985441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7c56d84419c73eb675b18507d8b4fdb
SHA18254b11c48663003761deb9480808053e61a9a9a
SHA2566e177e945483acf766b91bf12162460f19291c31f5f24abb969140d0fc2a22be
SHA5121ca7ea34df5c53589c4b28e2068ba1b88f63bff2be0338bb54267e6ec0387e6d036b2247f41a02614477eaa90b782533535ae46d12eabedcfeaca50e5a4d89d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aea09fbabd6af049795b0ddba51cc72f
SHA13e41ab5c640c0ea2e7431dfa378895dd9abf493e
SHA256b3a6c72a2da291fb4f9ab26eed513d022a2d06efd0e8eb1b50344b6c38de6915
SHA51254f2f5374a8752d44f52fdc39679effb7b312d4677eece0232c8b49d0af90686db5f95fbd8c1dbde84a4819165a0209d93fe482b8bd7bca8ed1d78020fc6a4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574a21a7f957fce7981814e3db7c48d0c
SHA184edd5576227badacb398fcb145bd39836be524c
SHA25610d1a98a3c75b1d5bd79de489b75f7ae8f2feada4ee06c6c116c4f64c2790c7c
SHA512300f2aabffe06205321142620fedf627efa1947b328b531b00869ec8b0c1195e1ff80f0aacefa70a86b1f65fc8513ba48e960b597c6fc1e09703473284629377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594b67094ed1fac7c1260b067ec8aa2fd
SHA1d0b5f89c421473480943d59abdbb40e18d01a1c3
SHA2565f51c783be35907a8e379ea0005b9855632056c1197426f7d6c1b1500245f37f
SHA512cf5832504c48cf2aefe5b6e0590285342f443c3c06e439dc6c17a9383755c78d304edc8c602f3e90572a32b104aacf481d4e95f884db856af2b0f1db6e6ef6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56578207c16b5be48c6daa238aaf745dd
SHA179c3777dab32c3146ccac97400cb2c02003dfe8a
SHA256a41c17ba0f94350a8e426093876e1e9eac6c990ff0b930a350724cae2b507c15
SHA512a5c8e8471e65ed1a7f81d892c6686ff9968b4d8ce399c1a639455c47c09be6a5c6932353ec68d498f42373d7879a05b9a92b29f131d41cb23e5f7399e8fc8ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
1KB
MD55c0be6ae6605c847836c0acb81669ea6
SHA1bf2759baf644848a5f59038f33f4dcafa9dfe667
SHA256ea31997c8a22893e47f8199d666fded28ce5b4c7b2d7e3cab0a7676775dae82e
SHA512eac30ac4d6f0db9be22ce3105187b6fdc3e26122b1add0f76317bfdee33fa95d78195d755e632eda6524df9f792193abe1fa8257ad12eb71fd855269c20c0766
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z02RC7HJ\favicon[1].ico
Filesize1KB
MD5f2a495d85735b9a0ac65deb19c129985
SHA1f2e22853e5da3e1017d5e1e319eeefe4f622e8c8
SHA2568bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d
SHA5126ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06