Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/02/2024, 06:11 UTC
Behavioral task
behavioral1
Sample
VirusShare_c4210a26cc355b64ed5734df960b2b78.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_c4210a26cc355b64ed5734df960b2b78.dll
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_c4210a26cc355b64ed5734df960b2b78.dll
-
Size
209KB
-
MD5
c4210a26cc355b64ed5734df960b2b78
-
SHA1
d0716e4ee39e2caefc5844b35143a4d7e38ae4ec
-
SHA256
838d2f9aa24bb10a81b1d750e116c443100f2be1093fc138e31621fd5911c460
-
SHA512
f000f29368d3c77c14c901573995b05b3b252134af1a16c01e32e1bfb3d35195f1d220f380f7bf887851495c001d3b56dd86895ef608dac9e43f32f0da777f43
-
SSDEEP
6144:T/q32rRjPhKuDkkLjp+ScgBKozpJ1XVSGuRq9M:myR9rIMHZBKI/XV2M
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2336-0-0x0000000000400000-0x0000000000452000-memory.dmp UPX behavioral1/memory/2336-1-0x0000000000400000-0x0000000000452000-memory.dmp UPX behavioral1/memory/2336-2-0x0000000000400000-0x0000000000452000-memory.dmp UPX behavioral1/memory/2184-10-0x0000000000400000-0x0000000000452000-memory.dmp UPX behavioral1/memory/2476-15-0x0000000001D50000-0x0000000001DA2000-memory.dmp UPX -
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2336-0-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2336-1-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2336-2-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2184-10-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2476-15-0x0000000001D50000-0x0000000001DA2000-memory.dmp upx -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a7f6e28c59da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413448294" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C228A21-C580-11EE-9D00-76D8C56D161B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000a5f0592b759ed2498bfbe1765d630bd97bdb2c13cff58acbeea9fe9ba122ae20000000000e80000000020000200000005e0a96bd8db6be3259200ff3271a4bdef143099da8f6059813915373b16d2b002000000017c0710890809fa70f081e1215b5cbbfa45d0a9489bc31bae6bf5dbb6bda021440000000c9d0ee14118adeae1e33aed350e044e3d0176162756939172741c9371f808eda04e3044c85d4657ca5bbbde42f5f7c4eda8294d9f61d432247301c3944dc7a1b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2336 rundll32.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2476 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2336 rundll32.exe 2336 rundll32.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe 2184 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2792 iexplore.exe 2792 iexplore.exe 2792 iexplore.exe 2792 iexplore.exe 2792 iexplore.exe 2792 iexplore.exe 2792 iexplore.exe 2792 iexplore.exe 2168 ctfmon.exe 2168 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2336 2356 rundll32.exe 28 PID 2356 wrote to memory of 2336 2356 rundll32.exe 28 PID 2356 wrote to memory of 2336 2356 rundll32.exe 28 PID 2356 wrote to memory of 2336 2356 rundll32.exe 28 PID 2356 wrote to memory of 2336 2356 rundll32.exe 28 PID 2356 wrote to memory of 2336 2356 rundll32.exe 28 PID 2356 wrote to memory of 2336 2356 rundll32.exe 28 PID 2336 wrote to memory of 1672 2336 rundll32.exe 29 PID 2336 wrote to memory of 1672 2336 rundll32.exe 29 PID 2336 wrote to memory of 1672 2336 rundll32.exe 29 PID 2336 wrote to memory of 1672 2336 rundll32.exe 29 PID 2336 wrote to memory of 2184 2336 rundll32.exe 30 PID 2336 wrote to memory of 2184 2336 rundll32.exe 30 PID 2336 wrote to memory of 2184 2336 rundll32.exe 30 PID 2336 wrote to memory of 2184 2336 rundll32.exe 30 PID 2104 wrote to memory of 2168 2104 explorer.exe 32 PID 2104 wrote to memory of 2168 2104 explorer.exe 32 PID 2104 wrote to memory of 2168 2104 explorer.exe 32 PID 2336 wrote to memory of 2184 2336 rundll32.exe 30 PID 2792 wrote to memory of 2832 2792 iexplore.exe 35 PID 2792 wrote to memory of 2832 2792 iexplore.exe 35 PID 2792 wrote to memory of 2832 2792 iexplore.exe 35 PID 2792 wrote to memory of 2832 2792 iexplore.exe 35 PID 2336 wrote to memory of 2476 2336 rundll32.exe 36 PID 2336 wrote to memory of 2476 2336 rundll32.exe 36 PID 2336 wrote to memory of 2476 2336 rundll32.exe 36 PID 2336 wrote to memory of 2476 2336 rundll32.exe 36 PID 2336 wrote to memory of 2476 2336 rundll32.exe 36 PID 2336 wrote to memory of 2792 2336 rundll32.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\VirusShare_c4210a26cc355b64ed5734df960b2b78.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\VirusShare_c4210a26cc355b64ed5734df960b2b78.dll,#12⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1672
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2168
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
- No results found
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
799 B 7.7kB 10 13
-
753 B 7.7kB 9 13
-
785 B 7.7kB 9 13
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1100fbc89a3952af66094c0cf5371a9
SHA1cee24070571a72a2cee27233f8cdf6f05371d32d
SHA256e2c08cd33e0ab61cc42e600c709964b6b06e25565b801578baad54e581842394
SHA512a9a38e8a9ab28dbf3d3987a3bcd8b9ace5c2a78838f6b1b6e1ce10156ca4d58c74a3d70ec29f59692a0bd3a735845651c7b0b258a999d93469c27e13af3d2c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c03910a5e7a72b635d4f415cb63e7fb
SHA1347744dd9b727b76c3ed78b6cb2b232faca3d779
SHA25640d2ab848c46cc4b830249f266a7d958833cc57bd95246664a8f5e1bfbc8ce42
SHA512ba6e75023c5de946d2c987d14da91122af4ae35ae88249387256f8e626789f1a3e479ecfc81a09cf3f8a383653ce8f48df93cc6e80b484e8fd4e5fb9d8265e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f45a42fd91d7d2a3ce29b5909a1ac242
SHA13ced6bfc9d504a51df70f5d855d431eb4f247251
SHA256f1792fa1f4cd147a4eca5b20be7c3057a17cecb189fa5b7a45cb047aabd7ae68
SHA512a9a343d02937b20358e5ab15aa0e0e7e760a3f3d9aa917cde3c606a8602061bf4856537f71a224a8366f3f0276e2b0a74711abebc7dbf3b66f10881bc9ceb7fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c09904e142afcbf689ea04ba48fa6eb0
SHA16999319e08f953ba566d6118627ab20a5f3d5988
SHA256a4ec151ffd67b139c8e9ab3486723df67c5720f88b22c5e28c6e07ced39c27fb
SHA5127edf22417a8188986ce7fbb28fca3d04986bacffc847c2a25e7da352a723237ce2d2a0ba22522db057515a9a98ec25dd9eeda6a32269d1e0532076dfa3af4a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5974a9689dfb5ad75b1d4d8ff1e2ddd26
SHA1f6d8f4ff1f9f0bd812531be8af0875163f98a394
SHA256ee0807feed589dfc54122b0ece1ffa987a612f565b3f4ceb503f07cf1b69a322
SHA512d7c7a9126c7ae40e5dffd9e704e4cd8723e14768fd9d1cb08f92b9df1557205058246bf291a9e88fe1d54341537667683f0ab663b5ad79c4f54840b7b953f1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543eb35ad91ec6d217e51473c41e3e806
SHA1d6ccaea55d4fbc0bb497aa55ba13e2f39aa73be3
SHA2567bed0fa93096b16145782a7de77e3e9931dbaf4c90031d2f3f82f95b1af99e75
SHA512d6f312d7a335bad6eb5fbf0d054377520c0d5b36ff65aeb5d465153c73357795a2c32dc99fbfea3d45b54da9d1bfcdfdf64699695320221e31924130021f0288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce8854a292654ef8e147a79d9b18bea8
SHA1803babb78b020471b5db8236f848ffb6fac723a3
SHA25614810a13695386c6d286fb3246efbe085800b73f4d02001ed783355dd248dbfd
SHA5123c2053276b2556a3fbb2e4b043437c7d0c000f4f38ef6fd432347a31938e2f4e2f8987ae899eec728bbdf654ab9c39c131a26bfbad383d2a7fbf6d8ef37930a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1d3360ac16d87d1b86d9663eef7f49b
SHA1c9a1e16450346349b442b9994b66b1463c2c6aa6
SHA2560b1c952a2e0fb58692d2de72bf36048acc7bbb23f312a3b7c3955176a1cadcf8
SHA512a12336726fec9f5edef3f8511467d91ede678afd596e1131a6f261b06747b88525110b63babacee027c77a952877416a50d5742423cd7c56b8187b759e8223f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bec8776b8351d2551fef6516f8595089
SHA14d930b08b9b4618058ed34932a129f065ea5500f
SHA256c9b31b1b17b94ca68ec615a7fa7b3b8d1f17520692e401fb4e0b1e7798dca1c8
SHA512383a45409f34bb35c18c910c83eadd8a47d9aab771a5a40d8ccff8fbad9988c933c4946665e14d5495b20dc34b2e609d095de457defb2f4b4c6270ab2c285e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5605303efb3241611a4746581762ef59e
SHA113e3c0ba31bcabc937c122227ce2c7c350039df2
SHA2566af2c0c0cd85e80c46a44fc720c7fb8b68d0e344e8f162ca4b0d7584c263c99a
SHA512c6a6c2aa36b79e31333719d0c9381e3565ee1f3c5e56aa51376ab82cd846975fd19c6ddac879157f2ad2a4aecab728aeb493fd278849379ccffec43872ac193b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ad745bcd399b27db3c4347761f753f0
SHA12c3583b47a55360445f6974176901e5e5c04d78e
SHA256fd07e4c375a04cabd997a8759e6aec3de1203c33390bd1984ad4603c55161aa2
SHA512a0d13fc1f9832b8d8ccfb83ed2a499a5135ce3af270b3c6932d8a9c17a57c96aab50479bc5da3a2d87b8cc34d4c6d5d39440518ead5d6a490998f27db51a567f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543f367fc0457233b2f3b56a676627428
SHA10994855211263ee9b242619ac6b759d5013c3b35
SHA256ffe5a14dcdc94f2c4d6acc2799efadc7b1775ecc60867ce4c4db9c0b0f63b2bd
SHA5120771ede5fc0e2067a4715e4aa067e38ec9bea443966527eb8f7787966e13a24b9bb522257eba24d68cf3a9f256efb89c3ea64317e1e1fd10b913842cb96aeb36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba4795d10eb6692ff8f3d5412dbbe996
SHA137323da7520de330685c399cec4df2eb1fae30a5
SHA256c085235039950a14ae3e9bef3b8fd83d636d3fca424c567dbabfaa04d82b40b4
SHA5127c23ad07f2a91c13dfdf3292ab98ca95e87b2a9055f1dc62a6440c7bacaef75ace6c834f0e850773ff3a5d857170c8695775e9d384f6a1a6c5476bf4a7e5f43b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572292aa1d5718421cb0ffb2c0a825228
SHA1ab10a617a80aa309477cdb8b12dc8918ca37b215
SHA25647077d3b72a46c27005f91d0ee49d3e4d688596d597d9ab98b3b4309a8b5be57
SHA51238f23260aa177d7a91d269bf981d3c173e7999aed0c3e7750db4d884d7cf53f5f62d1f856784567ef40034c5c91cc4e2e26f7b5a31cbb7eaff0cdcc0521ed3b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599ea74aa9d0e3b2f78634daeb802f3ad
SHA185cb96e0db6115da4866fda9b1f7695bae1fd52b
SHA2564c40a8881d72eff40023d65008611afe1c968c15c111d2a88d1a75134aeeb999
SHA5125e1739f2c8fed19532384c47b51d5ea3bf84377268ce6053dbbbb9a4b9f6b6c816731c3439d123fe7cc2cf3fd6a04cc3da729ce70176cec31bbe72ba088292be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2b7bac96a0b932ffa0523fb280a328b
SHA171cb9313d8b2cf1d197ab168ff958736ad76ca06
SHA256d25d7f5afa8533307f66eb14e2d48c6c1896b97f2bededdd8e5cb16a24f059ba
SHA5127476aa088dbc6f8f0d5ef92daa7282c39ad7e26e11a681ee15d8e2f5df676b63524187367139954a8a316905f57967862e225e1ca5d083b5f31d171f97dc1e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6e5af2663e04e225bda362d882c9b94
SHA17216b5737b4c7961e1085ae17fd6548ea77fc58a
SHA2567fe2c67cf851f2896aeaaeaea06db5ccc17bd1fb6ed40057d0f13410a51c25ca
SHA512534989120efa0c2c07af26e3dff3e84296f11762a88c29a4d9690311cbe92d81d674ba7fe00ce431ab869ac54677defa446be9ea70d4320f0de0a30ac71517df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56649807ca5924cab398161cad544ed27
SHA1b4eccc77c2f801335301621ccc72ca4cf2162200
SHA2563bf70566c7edf9244ef0fd891410c4cb2671b146aeaef49f9049c131a8fb12ec
SHA512d236a5e0ebfa66655b5e042662fcaa1db6b1147cbe8f5e96bbcead8630ac7ed647ab4027d6a93af6b696f79ec8cab4f57a8d482ef92682551635ffc1a5f194e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5408314bf49477fb83427f77321d0c23b
SHA197f78e6b40f87314651e4ea174f4dcc8a964e7b0
SHA2565600979aa271ba4cdb7ffd0cbf97b51ca0705ec1786c09abd4f6cf80126cc70e
SHA512e2d5bcb9244cc3ae117dfd6f1dcfed8096aa7a758e55e6d68df2e2c422cf86ddcb583e2cf1fa3cfd2ac9081ce09f75fbdfaefdcbe9ecf228df09542c6209c8ab
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06