Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 22:47
Behavioral task
behavioral1
Sample
ya.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ya.exe
Resource
win10v2004-20240412-en
General
-
Target
ya.exe
-
Size
63KB
-
MD5
222c2d239f4c8a1d73c736c9cc712807
-
SHA1
c3aa61bd6f8cc640bcfa74c40d9283c9c08c7b3c
-
SHA256
ff43049677c57277f12a1d97f02af3029d7b75b5ad40303a28f1b0452997969d
-
SHA512
1f2fea85e45e93916306c234b916d6b4b200dac9656e44f4555f825dd8677cb5e927bd5e7a74bf2fb2f6972a3e6e2d294a6104add162ba3d53a0e6cfedef6a02
-
SSDEEP
1536:tJc/5q1qoR5PDdAZcIED4VuCkbFybjQ9f0jQRmONww+W:7c/iqoJekbFEQ9W+mONP+W
Malware Config
Extracted
xworm
127.0.0.1:23638
209.25.140.1:5525:23638
bring-recorder.gl.at.ply.gg:23638
action-yesterday.gl.at.ply.gg:23638
147.185.221.19:23638
then-wheel.gl.at.ply.gg::23638
then-wheel.gl.at.ply.gg:23638
teen-modes.gl.at.ply.gg:23638
-
Install_directory
%LocalAppData%
-
install_file
uwumonster.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/1624-0-0x0000000000A00000-0x0000000000A16000-memory.dmp family_xworm behavioral1/files/0x0009000000015c23-10.dat family_xworm behavioral1/memory/2392-12-0x00000000008E0000-0x00000000008F6000-memory.dmp family_xworm behavioral1/memory/1772-17-0x00000000002F0000-0x0000000000306000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uwumonster.lnk ya.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uwumonster.lnk ya.exe -
Executes dropped EXE 2 IoCs
pid Process 2392 uwumonster.exe 1772 uwumonster.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\uwumonster = "C:\\Users\\Admin\\AppData\\Local\\uwumonster.exe" ya.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" ya.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1612 schtasks.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B699BA1-0031-11EF-9667-569FD5A164C1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000099455c2d98451b4748edc4c247cf4d44a26eaf25b1d60e0b16c23717d334bfef000000000e80000000020000200000001cd4b8e3e31efbdc654c8fc431bba127b1bba58418a85489ca6d187d94a0ffac200000006e2212c4875db60f8abd61db6fc988bebb93bc6179f638540c1b3c1ddc3f25fc40000000e0e2ed1bf65b55e3d2723b8cd16889c990f1d2af89bb7fa6bd8932784e43b6d585d7e0a92550b14d1f27569c031faef118fa0f4c256acd78571590efd52f5d83 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303bb0303e94da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1624 ya.exe Token: SeDebugPrivilege 1624 ya.exe Token: SeDebugPrivilege 2392 uwumonster.exe Token: SeDebugPrivilege 1772 uwumonster.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1612 1624 ya.exe 28 PID 1624 wrote to memory of 1612 1624 ya.exe 28 PID 1624 wrote to memory of 1612 1624 ya.exe 28 PID 1464 wrote to memory of 2392 1464 taskeng.exe 34 PID 1464 wrote to memory of 2392 1464 taskeng.exe 34 PID 1464 wrote to memory of 2392 1464 taskeng.exe 34 PID 1464 wrote to memory of 1772 1464 taskeng.exe 35 PID 1464 wrote to memory of 1772 1464 taskeng.exe 35 PID 1464 wrote to memory of 1772 1464 taskeng.exe 35 PID 1624 wrote to memory of 2904 1624 ya.exe 37 PID 1624 wrote to memory of 2904 1624 ya.exe 37 PID 1624 wrote to memory of 2904 1624 ya.exe 37 PID 2904 wrote to memory of 1984 2904 iexplore.exe 39 PID 2904 wrote to memory of 1984 2904 iexplore.exe 39 PID 2904 wrote to memory of 1984 2904 iexplore.exe 39 PID 2904 wrote to memory of 1984 2904 iexplore.exe 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ya.exe"C:\Users\Admin\AppData\Local\Temp\ya.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "uwumonster" /tr "C:\Users\Admin\AppData\Local\uwumonster.exe"2⤵
- Creates scheduled task(s)
PID:1612
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\How To Decrypt My Files.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C8D51DBA-46DE-4E45-8DAE-DBE7BBEE81AA} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\uwumonster.exeC:\Users\Admin\AppData\Local\uwumonster.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Users\Admin\AppData\Local\uwumonster.exeC:\Users\Admin\AppData\Local\uwumonster.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500f7972fca970eb9a1e2a27c10355722
SHA1328608b030987589566f642afe1810e02c1024e7
SHA256e9630a572c5a46629142ebd26a4cf0e5df7687e11cbc4fa4a4b6cddd80c618c5
SHA5120f05e11668fcd04d9b29b4bcbb3e099b0a29205a0a4c77b5255f5865c61911f708ba1073183de27f9776d6070a1f44b5e32c47903f3de8364babfc21e2fa7a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e3c058e5bd780ba8130a1db43ec67cb
SHA1a41699ac3efdf9efe5822a74bd6bb352ede03a9d
SHA256df4d8b70c3c5457dd10d33ec522c90ad3ad95637bd0ea7b09e0516feddb66377
SHA5120174c94174f81548f4e2b57a46fa5f7ae1c4fb4f16cdcba1e63ad3e7411b90cc451fbff7cadd61fbd743685ed4248e87ffd9cf994ca9baee79f1c5596daa8640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5704eb5109f6fbc8a5c190c596af7e77a
SHA159e90658e8fb65b0d7c7c96e2bd67573286dc12e
SHA256b1b2bc430e5b6b3c60052fda104821b7a254ba511b91188a968185adffccaffa
SHA512970bae0aae9a57474c4e2430403e88c3f8454afa84eabd0f6046c520299bcc83a3a08395f88596499ef905591ca479d23f14f0a60a356939c7a352710966025f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b2bc30b19a757538849475cf44067ef
SHA1cae09299e5914a4ae41d5ba9d9d23aa1a89fe165
SHA256f791585557fc0140ee38032ec8637bdaa880443ed3c34fe316f10beaf90d5f43
SHA512eaeb52c124e12a58bcb9f761fcfc8d9a694af4da152fc08e11b8f0a717f8b1401cb6ed3492d2aade00ea25263e97fc17357f68d375cb8b9de1a45b028494a4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acb688e9d7a981a948c7b2e18aab0503
SHA10a72912a10eafb64e51fbe9e81c0dcd0cecc4ac0
SHA256754556403cb1b4ed5e17bb05428f1dc4d1877ccc4821a7a113dfa0b64948822d
SHA5127398b52ed5caebaa98dd0b08ab09a15bf5bb753da3fc331d03ebd49310370b022252346382339881f0b3ceabb982608c612dca2e3420d17d1642188b7e55c134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8873b10cf7f24b8ae1ae9257516d32e
SHA1088c0a67d5434019f7f0c12ab018ad6367666e5d
SHA2569bad17e4d3cde3797a5e4feefbe13d3f2d137ff38ec1dbdd33d32567d1254d86
SHA5124a59e751c4296e8596c69e7c2dd1fc7554af98534b75087c6a5f9d4175c6edfc1f615e9f6286154cd47c2b6d96c9cf345e3fef40b7def9c56401926577927b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e711fd9d32bf09a8b0299e7af70a8da
SHA1b80507789155a417044b543f7535a161859860b3
SHA256cb1b4ac17ca7d47beba08f1196548985bba3169cbc5aeb5d303f5ea1c6e4d58e
SHA51212aafa3bcb26669f4bd924f611b17dbe203530f3600c1d1576ef4d18e4baa28b5ac024b03de9d8ab76f681345ad0499cb56d2ca106014bd0a8466da0eeffd9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551d6cde88c444e62e13fd2a821d3cb41
SHA16d42058bfebb6ba6953ca1f4cdeda616bd2ae8dc
SHA256662c0db8b28772ffae8f64d023e64c564f473be8d2ccf6f7e582417ad7e05b7d
SHA5126c14268a569af87a645a6691fcf9e4d731986575e0d1a2a48e8d6b1f3d995096af09d5438a7bf74bd973a04c6a5d069d8d95483bb76aad727f678173462373e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c3d056a78d99493d1fb2d2a06f56da1
SHA1a8bc48af920d7f1d61c41a34c38d6d555a4e86b3
SHA256345ba01ac13ea48c10cf99ba58a2fc0007b5c788f61b9ba25313fe02aaddb488
SHA512bdf1c7315c4745e0c4166b8cc77224aec1894360d9b02f7020f0e8c56f048baf3973663104e2e3230cd7321812a33c1f6919d6ce08fac77e18270e0caec75c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ab4f093c7718a4b8da663ab1d246eef
SHA14d4e46c80316559787484ec4b6fa55692523e223
SHA256041497005ba12d0550305a08413b58b3353155626e2c3de4264caa275845bbe7
SHA51294b6f058338eca2ca3026b1a51f033aa3426b253116b0b2d6f26f6f3d819935cf5767cc628a179bd52721841efc51c11e098e9b20f9f09b2f59c034ba8608425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfb3c40e1b803924ff2b8bfd2db98ef8
SHA13419ef727128006c7fb9b39585bd6e2d2ccc4c2e
SHA256d2b455e6760d1389a769695da1c09891fba569518b30fa12de4a29c438f772d8
SHA5120723784d97bcb5811213bd76b55ce9146083bf6a244fdfd74f1768711ea5bf2dd8e9cd9c343884d5c043dd89fc1ec0d3dfe9fbeb63d42be02e5f072f7262a454
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
63KB
MD5222c2d239f4c8a1d73c736c9cc712807
SHA1c3aa61bd6f8cc640bcfa74c40d9283c9c08c7b3c
SHA256ff43049677c57277f12a1d97f02af3029d7b75b5ad40303a28f1b0452997969d
SHA5121f2fea85e45e93916306c234b916d6b4b200dac9656e44f4555f825dd8677cb5e927bd5e7a74bf2fb2f6972a3e6e2d294a6104add162ba3d53a0e6cfedef6a02
-
Filesize
639B
MD5d2dbbc3383add4cbd9ba8e1e35872552
SHA1020abbc821b2fe22c4b2a89d413d382e48770b6f
SHA2565ca82cbc4d582a4a425ae328ad12fd198095e2854f4f87b27a4b09e91173a3be
SHA512bb5e1bbf28c10c077644136b98d8d02bfec3b3e49c0829b4d4570b30e0aea0276eb748f749a491587a5e70141a7653be1d03c463a22e44efecde2e5a6c6e5e66
-
C:\Users\Admin\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000001.regtrans-ms.ENC
Filesize16B
MD5fa4c32288e02e9af7c11efeede5ac423
SHA1dfba78ee5e72b9b613365fcea4f48e7ddda25941
SHA25644d8be36b726e85ebe160ee8770e1e1c1b7c676084c96fec08cb33bce785d96f
SHA5121b4a145d6a29c8e04687282375e44ec17d944c98f231622660647633a2a5c2aaeca0cecfc93e510f1cb18a1561c56105b1c281340ae9f98145030e4bc65f1503