Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
37ffb891342...7e.exe
windows7-x64
77ffb891342...7e.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$R1/baidu_...an.exe
windows7-x64
$R1/baidu_...an.exe
windows10-2004-x64
$TEMPLATES...at.exe
windows7-x64
1$TEMPLATES...at.exe
windows10-2004-x64
1$TEMPLATES...cs.dll
windows7-x64
1$TEMPLATES...cs.dll
windows10-2004-x64
1KDocks.exe
windows7-x64
3KDocks.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
7ffb8913420ecfe98527201694da927e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ffb8913420ecfe98527201694da927e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$R1/baidu_dizhilan.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$R1/baidu_dizhilan.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$TEMPLATES/installstat.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$TEMPLATES/installstat.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$TEMPLATES/statistics.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
$TEMPLATES/statistics.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
KDocks.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
KDocks.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20231215-en
General
-
Target
7ffb8913420ecfe98527201694da927e.exe
-
Size
1.0MB
-
MD5
7ffb8913420ecfe98527201694da927e
-
SHA1
a332e21c63d43e47a3e9e6b8a9aa7579568b3c94
-
SHA256
9f86e36984bd9998c779891a995b4a96aa01e796afafd43e68e7f5cba56d8034
-
SHA512
c8caca65566ec8f8e9dc49a8a92a3d4c3071a9e0e349fe7ae839c43b3475dc7bb93259d296b9edaaaf0a60268d64e5d1c9dfff55a9802f03b056bd36be962c2a
-
SSDEEP
24576:Q0OOvdV18Q2PotoVfAKqdHsLS23i0iDHvJR7wGGg:JOOvNh2PZVKdHwrkDHvJV
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ÌÚѶQQ.1nk 7ffb8913420ecfe98527201694da927e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ÌÚѶQQ.1nk 7ffb8913420ecfe98527201694da927e.exe -
Executes dropped EXE 1 IoCs
pid Process 2588 installstat.exe -
Loads dropped DLL 5 IoCs
pid Process 2100 7ffb8913420ecfe98527201694da927e.exe 2100 7ffb8913420ecfe98527201694da927e.exe 2100 7ffb8913420ecfe98527201694da927e.exe 2588 installstat.exe 2100 7ffb8913420ecfe98527201694da927e.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\EditPlus\CSS.dat 7ffb8913420ecfe98527201694da927e.exe File opened for modification C:\Program Files\EditPlus\CSS.dat 7ffb8913420ecfe98527201694da927e.exe File opened for modification C:\Program Files\EditPlus\4500.bat 7ffb8913420ecfe98527201694da927e.exe File opened for modification C:\Program Files\EditPlus\kk00.icw 7ffb8913420ecfe98527201694da927e.exe File created C:\Program Files (x86)\baidu\baidu_dizhilan.exe 7ffb8913420ecfe98527201694da927e.exe File opened for modification C:\Program Files (x86)\Baidu\baidu_dizhilan.exe 7ffb8913420ecfe98527201694da927e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412697769" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99290231-BEAC-11EE-9B21-FA7D6BB1EAA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109af96eb952da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000000a5ba94148a95368e8474df332e7f1c9d955143c6f6f7c1b2227621d06adc21f000000000e80000000020000200000006604fddc246987e4576573ce4f84b6cc9a386eab71a3b375d170376cf636fe9c20000000ebc7411f2536de0b20bae7364cc618781252e2e6ab01addb7b469a9e85726ff540000000c311512bf5748a257aa35084754656ec27ffb1d3a7539b11b1b2c810a32d5c8d71ee069f5e938984b1c28153330541acd81810ea7453d45e84e08e264c18591f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\Shell\Open\Command 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1nkfile\shellex\ContextMenuHandlers 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\l00file 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\l00file\shellex\ContextMenuHandlers\{00021401-0000-0000-C000-000000000046} 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\l00file\shellex\ContextMenuHandlers 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.icw 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ = "1nkfile" 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1nkfile 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\l00file\NeverShowExt 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\l00file\shellex 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1nkfile\shellex\ContextMenuHandlers\{00021401-0000-0000-C000-000000000046} 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\l00file\shellex\ContextMenuHandlers\{00021401-0000-0000-C000-000000000046}\ 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ani 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\ScriptEngine 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1nkfile\DefaultIcon 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\1nkfile\DefaultIcon\ = "%SystemRoot%\\SysWow64\\shell32.dll,-1" 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.l00 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\l00file\shellex\IconHandler 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ani\ = "anifile" 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.icw\ = "VBSFile" 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "batfile" 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\1nkfile\ = "Îļþ" 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\1nkfile\shellex\ContextMenuHandlers\{00021401-0000-0000-C000-000000000046}\ 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\Shell\Open\ = "´ò¿ª(&O)" 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\Shell\Open\Command\ = "%SystemRoot%\\SysWow64\\WScript.exe \"%1\" %*" 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\1nkfile\NeverShowExt 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.l00\ = "lfile" 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\l00file\ = "Îļþ" 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\l00file\shellex\IconHandler\ = "{00021401-0000-0000-C000-000000000046}" 7ffb8913420ecfe98527201694da927e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\ScriptEngine\ = "VBScript" 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1nkfile\shellex 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\Shell\Open 7ffb8913420ecfe98527201694da927e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\Shell 7ffb8913420ecfe98527201694da927e.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 644 IEXPLORE.EXE 644 IEXPLORE.EXE 644 IEXPLORE.EXE 644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2804 2100 7ffb8913420ecfe98527201694da927e.exe 28 PID 2100 wrote to memory of 2804 2100 7ffb8913420ecfe98527201694da927e.exe 28 PID 2100 wrote to memory of 2804 2100 7ffb8913420ecfe98527201694da927e.exe 28 PID 2100 wrote to memory of 2804 2100 7ffb8913420ecfe98527201694da927e.exe 28 PID 2100 wrote to memory of 2804 2100 7ffb8913420ecfe98527201694da927e.exe 28 PID 2100 wrote to memory of 2804 2100 7ffb8913420ecfe98527201694da927e.exe 28 PID 2100 wrote to memory of 2804 2100 7ffb8913420ecfe98527201694da927e.exe 28 PID 2804 wrote to memory of 2884 2804 cscript.exe 30 PID 2804 wrote to memory of 2884 2804 cscript.exe 30 PID 2804 wrote to memory of 2884 2804 cscript.exe 30 PID 2804 wrote to memory of 2884 2804 cscript.exe 30 PID 2804 wrote to memory of 2884 2804 cscript.exe 30 PID 2804 wrote to memory of 2884 2804 cscript.exe 30 PID 2804 wrote to memory of 2884 2804 cscript.exe 30 PID 2100 wrote to memory of 2588 2100 7ffb8913420ecfe98527201694da927e.exe 32 PID 2100 wrote to memory of 2588 2100 7ffb8913420ecfe98527201694da927e.exe 32 PID 2100 wrote to memory of 2588 2100 7ffb8913420ecfe98527201694da927e.exe 32 PID 2100 wrote to memory of 2588 2100 7ffb8913420ecfe98527201694da927e.exe 32 PID 2100 wrote to memory of 2588 2100 7ffb8913420ecfe98527201694da927e.exe 32 PID 2100 wrote to memory of 2588 2100 7ffb8913420ecfe98527201694da927e.exe 32 PID 2100 wrote to memory of 2588 2100 7ffb8913420ecfe98527201694da927e.exe 32 PID 3044 wrote to memory of 644 3044 iexplore.exe 34 PID 3044 wrote to memory of 644 3044 iexplore.exe 34 PID 3044 wrote to memory of 644 3044 iexplore.exe 34 PID 3044 wrote to memory of 644 3044 iexplore.exe 34 PID 3044 wrote to memory of 644 3044 iexplore.exe 34 PID 3044 wrote to memory of 644 3044 iexplore.exe 34 PID 3044 wrote to memory of 644 3044 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ffb8913420ecfe98527201694da927e.exe"C:\Users\Admin\AppData\Local\Temp\7ffb8913420ecfe98527201694da927e.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Program Files\EditPlus\kk00.icw"2⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kk00.icw"3⤵PID:2884
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2588
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD5bc8f2e19c0be726fd8c62c08b7cc26d6
SHA13d48f051b8d3168b3abb22bfdefd87d4eefed409
SHA256f2b9065097ee1ac830cc7d75502337fede08309d18774055c00b6745f6b4bc8a
SHA51276f0da346b1b737cff351d76df2906a6c7dc0ed3ace5831fa0a8dd9093141f7ba073773854eebc68918d6dbb416a3c7703f0cc3ce17b45d3a49a0e8f505f9eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5db9f949c3239d8f7b4b5c2fd2f35b9
SHA1083fcc694f1320f0af55129fe9722251ad3433ee
SHA256a895294cd1c2f85685f7d87e035b539fb696c9988d46faf104e8c3370955c637
SHA51234d274b266c5deffd069e089f15b47c8668ef0951b3ccfdd7c4841481dedc31c211ecb06a14cbe06227d5a02348f01856868d8e5f000af06b686e3b04b0531d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc981fed011bf0575066c56252980da6
SHA1eea0d0155f00fc100907907fff700b1000fccedc
SHA2565d57dff53a7213cc2a4785c8ebf3f4b6cf8ac257a19c727c28fa1bff6d41ffb7
SHA512387e01d3837b3be812de72c77f78b3db3384199b41f659c1079235ed10b39951c7fee573c6ac86bf4ed763b9033c8ccca88b0e1a96001da11413a7bfab14fae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5264789b175d7ee91e103bec547c584ed
SHA177bdf43ae6088a2334ba35e1d94213a0d1f03dbb
SHA256b1be2240a1199ed096cf1e1636c1a041713cddc92d2c8c0b1a50f7ad7c7187cb
SHA512f0b017bd20bcb4a9387cf82c641afc5dc190f4997678e0bcb8d03a09d13d73d9c2e6c509f59499dc39aa5d5692392faea542765d4b7953ce13cc6aef85ffe23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a3909bf832bb350c2964f37cbbcfba5
SHA1c4b2a967fd308cd42dc8a7ec6809adaf22d27a2b
SHA256b0fc5e9613e2f43942046d77b9a84bf2d5861cba16cc14a6cc02abded80352a8
SHA512c9f2a0e63d036f291e8c2c9c79d0136142898f29e6a8e0c20f652bbba1e3dc9c031bfe19c4a6e4660819cf95604450f859bc1b75b5c8438d2ce1c7c3874ef870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565d01eb551505842e5d5c847c73ff249
SHA13c0d4554646652a9ee0ee3ec4b0fb2ea2b096c00
SHA256a80c34563409952fa1ae288d1e90914bd3f71d6d6c2738e70fe5bed9046a3e36
SHA512032146d51cfd50b23b9d8d9b78d36fbe9822ef68bb57e77fb3dff410a99934980eb5707f2db254d627bbbd96d4ed756d43b765608ead52d30432230e0fe39e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5381c4113c5f3e42b6ecf656c645d7798
SHA16fe65816f61548310cc7b114fecbe0cfb196b89c
SHA256a8e462c544a83f0ed21bc6aed5463180e5d8cfe14eb588b0918b6c1f657f6c59
SHA51285771619a3cab13a008484629befda84ac67414f4dd4ec4cf1e0524d270863cfa7badc9b419126b72718a79c8372d6bbd1f3a238206621d202a69ef8a6e1c0de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525707be7abf8d8195feea6b5ab149729
SHA1c5f136cffa17dc6f93741076da2dfb7bbab48500
SHA25682757307becff79788ec267ec8c978f93fb6f07a3e83bd28cc741f12c79c9ad7
SHA51235f54e6b573a577dc83e9a8e245f664c5a0ae81559b8647b25213f68fb2641b4565d1f65b4be18cd3093d4c3b0303bb17292cd0f305081627539840db40cd6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e002bdff06fb2edc997d97b1954d2fb8
SHA1202ea188aa3b477f712b507d580ad1652ce62ac2
SHA256cc331a5f714dcf198cee2b3800e89d07d78678a01d5e25fb6e55f9c9d1a517b5
SHA51219165303c245804dbf62342cbda9cac87ead8257f3dbf6e06f4d6114b3ae1e0890b67309995fe05f9f9acb77a76a19ecbf29300bbd9b26a0fe3b8bd77c5a68ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea8c0089eee286c8edb55c1587ba4b78
SHA141e6c31186ffe53e9d7e16a73b64e4130206be24
SHA256d9029aefdbf3a325732f6377b7a8cbd951940220b02fdd92383c9dc1351fc50b
SHA51228495512327ad0ecc9d3a0a59a0cdbd34fd57006a028908e86e97c776ac4067498f3f674fd15ee6edfbf4ae35cfa970eff13411c5668706d1cd8ca86ccedacaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ff376426ec60966de4af0cac240509b
SHA1d775910b7c5f391c254493e601c1d6737453fc0f
SHA256f8ba74b0dc47ccc14e4cc376cc2fd6be49e6b2c6ec0c3d4504d167b13a501253
SHA512d8d2c0b0d0941c336585393cec01232747f279fbf3fcdcc61b620c2dee13af9447e4d2d33bd6fb9158ade866d1832cc85248f516d3788bec4f18fb8c3852b660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ba0deabe7052721bc639bfd9ba2a865
SHA1426569f7a579123231ce20e6f219e33025c62216
SHA2560e0d3d7e3189be09f3243adaf69f4050f592aade4be38e500607fcfdffdbecaa
SHA51233317b96369c417a790ab3190ab67ff8b906185688e876304efdaa762c1132f9f50cdb6b98d4afbee0cdcb15dcdf00d0e624507e126cc8320a363ee12eddfa72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d1b32bca1723e823db605a59d3362ec
SHA1ac1c5d02b85cd6de4aa1aa96a4deb046879d93a5
SHA256e7809baee979f36463cb46db1c4f06ac13ee5788f10e4a596f2f448595bd50ad
SHA5129ede378ecf868efddc9b3d72f54b25a9eef4f1144ee451bcdd4450fc64d2d622ac7a2ea229c5e853e3a1f0668a9220a08716cfbcdfee954a9a5eb2557c1b7d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5839a2a9a519ca59726c69a151e890621
SHA152c82fa837810925d0c08e173d6afbd7d19bd022
SHA256e54c73dad60643fc67ad63067b55af297b165c8902912c5eb7045d76a8f7c6eb
SHA512cfe8967c5d5b9e4656a83c07d582cf3a2d2e84693e6a09a94e0b2d83b8bd943c8cf1036ecef4e5a5ed99ec97b6cd252fd7f0ffe0154453dbb1e07aa1db7f31f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eb7f4051a95c69c4914ed7979846ee2
SHA1841b158d83458df1eb7400190a12e52e76a25caf
SHA256242d8b9940a975547396fff27ec431550cc810c88347d776eda6ed8272e99e35
SHA512af41055de6fc70b0883fed911638b358d47bff02b73740607dbf26fd07d71d01ea24ce34a212283b0cd07a0a1f0f7e2360bb0fc86e277b2a3239df7afb2dc57c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553bbc9173b0d658b4bcb1ec7176cd04c
SHA117cdb4354b0260c0fa76196bdeaad4d78d2b58d4
SHA2562b7d0a0a7382d319a8786981ad3bb0dfe5b387a04bf33e79627b65fb2ba04ec6
SHA512a2b8ab4b6380fd566104154826d4460de548633e7946d944d8f5a2818adc25ff4fde3094134180f77190507342709929101147cb6072035cfad015260411883c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b240781a4c1a7752ea338d2ea93f0193
SHA1971eb4d63c08924f98d762d31e31e6eb8994ac3e
SHA256ee93351f3532b1cc3d8b8256c06037cc2ce8fdae26c7b7870a6ebae373bf2740
SHA512838aa63db520c74a3efec55b723e200ed955ea911aedf8ff12e69aebdac5d003d3999a15213d87a5f26b9c118bc13053dc296786d06341784e185fd445a29ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5833149a3f45b302c87d3559f2f3d1d8d
SHA17f69b5ed9740030e6b90e4e7348a3e8c84ff8e3f
SHA256672d6e590e6f5badef22a7ce40717d171e28a1050d3705d280f6ec287f6cc846
SHA5124fb6bfe1a610cd65d5bff8302c0d3a69431b53c028854e14bcdc54383d71ab8c73e475338d279353bde6eaca59c853e308fc03b22ba6a49168dde3a98dab8c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f9327d488acff1692690332617edc59
SHA143d75a28a1ab9c4eed2cd940878cddf937c78473
SHA256f8528e92f808b298b542eef9f676c339183ad4dd91fbb5a2566170d128977a69
SHA5129df9585b5da0b1f6219500e9e6303c950d6b500f6743033a69687ce2d1f19a257aa896f5f48d1ff812c443452733ad487987e43210280aa3c4ed7b3ed5c2131b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a301deb5305642b63f29b49fd628ba76
SHA13723e9c77d147aee1418e228e09d259e5c75ab6b
SHA2561e7c113f32a1abf556a4a59732bd6b6a4fa48d8ba32f82ea75b7398847fbf5ef
SHA512eaeb8a711ee9173414e4f809870bdd989527222b3915760e7630099560b22482607326ac978455f9e7ec3517a7c167260c7c90154e1e20b8f5f90d7789acc08b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
569B
MD5690115026b070c7815e62f7750057245
SHA1acd81480c3c6b810e5d3b0632f9ce31eda3bddd9
SHA2566801d128e587b0681615fac68b195e4d76fd344ded4d462b89dcb622c57765dc
SHA512b961d7609854a4c4d10ee3ff8153e60b6484e7e6b75a0247776edc994658636c65560d69c580a3a84088359839cecd7c86c3b68582e188e2a9fb66a677d3722f
-
Filesize
437B
MD58f67dab06e0639267c107258821a96b1
SHA13d7e032aec8d9491801c4e62965efc4a4367320e
SHA25611cf2c8fb9b68913b76b38cfb29b7395e873e7924b6b69c2caf98a9005d9b846
SHA5123067db96f6c7a4d451e0badcb118d83ac741ce40d6651d024b6f3aa04f097c5ecf94d2b9f67505ca7dd55020536741799d1495a95be9c7ce02eb3ebaf627bddf
-
Filesize
80KB
MD5a8454799d44910d1623ddab1e96037b0
SHA1ac90d80758d77292519208250631eb6eac8ebea3
SHA256266c68aa0b68afb9703ec9adc7a5e99e6ffe25e6278a99652e9782e2e3b6018d
SHA51220e7d8192ec30dff1a301c03728f758f623eac55d927defea74836fac576d9d4e9c2ad02d6d9e48d8656bed389a40a55f1787360ac50b1ca233f98fe7b844712
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab