Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-06-2024 12:45
Behavioral task
behavioral1
Sample
VirusShare_00d9d5a0319cddef48add9257d4721df.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_00d9d5a0319cddef48add9257d4721df.dll
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_00d9d5a0319cddef48add9257d4721df.dll
-
Size
204KB
-
MD5
00d9d5a0319cddef48add9257d4721df
-
SHA1
4da40bf0a2c94cfa25ccface3fd51f64bdf39b82
-
SHA256
79c2733f6aea8cc0b2cbba6b2f450b7e4617d3666082cd7ae841d6fabe7901fd
-
SHA512
d7b77edf2e0a3be0bf4020f010d97dd1d0016b40b17a87b11b0c450b7c65bc0b3fc5d5db6a1704bd1ea43b139845bbefa7d979466fb36f855f33ba18ccce235f
-
SSDEEP
6144:f/FCpGUkx6ZusGqgN4KDnr59x1AZgSu7koS:gYH1N4YbPAZgSpoS
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Processes:
resource yara_rule behavioral1/memory/1464-3-0x0000000000280000-0x00000000002E4000-memory.dmp upx behavioral1/memory/1464-2-0x0000000000280000-0x00000000002E4000-memory.dmp upx behavioral1/memory/1464-1-0x0000000000280000-0x00000000002E4000-memory.dmp upx behavioral1/memory/1464-0-0x0000000000280000-0x00000000002E4000-memory.dmp upx behavioral1/memory/2860-9-0x0000000002F60000-0x0000000002FC4000-memory.dmp upx behavioral1/memory/1580-13-0x0000000001EF0000-0x0000000001F54000-memory.dmp upx -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
Processes:
rundll32.exenotepad.exenotepad.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
Processes:
rundll32.exenotepad.exenotepad.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
Processes:
IEXPLORE.EXEiexplore.exeexplorer.exerundll32.exenotepad.exenotepad.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6277DD1-265E-11EF-AB84-52AF0AAB4D51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d2f7936bbada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000000942549a6a4ee1dd04ef9f0fd95c4cc145c918b31249fed3785be0f30359a9c2000000000e80000000020000200000007da4a040b079f65d4d43e083b667c2ac0342defaa9127a085f96ffea6afc2e04200000001f32057abb69b5503565bf60c56907680eea1a59d432719415fd2de9893bf0d3400000007ef3ea547bd86a92b452c7801797721448e0fb6a7310c143b45723ac7733a20f4bb3e808215ccefa2ff1fc440ee3684ba13c2e8999315c8e577a151db80dea3c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424099210" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exenotepad.exenotepad.exepid process 1464 rundll32.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 1580 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 1464 rundll32.exe 1464 rundll32.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe 2860 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
iexplore.exectfmon.exepid process 2680 iexplore.exe 2680 iexplore.exe 2680 iexplore.exe 2680 iexplore.exe 2680 iexplore.exe 2680 iexplore.exe 2680 iexplore.exe 2680 iexplore.exe 2680 iexplore.exe 2680 iexplore.exe 2812 ctfmon.exe 2812 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2680 iexplore.exe 2680 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeiexplore.exedescription pid process target process PID 2020 wrote to memory of 1464 2020 rundll32.exe rundll32.exe PID 2020 wrote to memory of 1464 2020 rundll32.exe rundll32.exe PID 2020 wrote to memory of 1464 2020 rundll32.exe rundll32.exe PID 2020 wrote to memory of 1464 2020 rundll32.exe rundll32.exe PID 2020 wrote to memory of 1464 2020 rundll32.exe rundll32.exe PID 2020 wrote to memory of 1464 2020 rundll32.exe rundll32.exe PID 2020 wrote to memory of 1464 2020 rundll32.exe rundll32.exe PID 1464 wrote to memory of 2428 1464 rundll32.exe explorer.exe PID 1464 wrote to memory of 2428 1464 rundll32.exe explorer.exe PID 1464 wrote to memory of 2428 1464 rundll32.exe explorer.exe PID 1464 wrote to memory of 2428 1464 rundll32.exe explorer.exe PID 1464 wrote to memory of 2860 1464 rundll32.exe notepad.exe PID 1464 wrote to memory of 2860 1464 rundll32.exe notepad.exe PID 1464 wrote to memory of 2860 1464 rundll32.exe notepad.exe PID 1464 wrote to memory of 2860 1464 rundll32.exe notepad.exe PID 3032 wrote to memory of 2812 3032 explorer.exe ctfmon.exe PID 3032 wrote to memory of 2812 3032 explorer.exe ctfmon.exe PID 3032 wrote to memory of 2812 3032 explorer.exe ctfmon.exe PID 1464 wrote to memory of 2860 1464 rundll32.exe notepad.exe PID 2680 wrote to memory of 2568 2680 iexplore.exe IEXPLORE.EXE PID 2680 wrote to memory of 2568 2680 iexplore.exe IEXPLORE.EXE PID 2680 wrote to memory of 2568 2680 iexplore.exe IEXPLORE.EXE PID 2680 wrote to memory of 2568 2680 iexplore.exe IEXPLORE.EXE PID 1464 wrote to memory of 1580 1464 rundll32.exe notepad.exe PID 1464 wrote to memory of 1580 1464 rundll32.exe notepad.exe PID 1464 wrote to memory of 1580 1464 rundll32.exe notepad.exe PID 1464 wrote to memory of 1580 1464 rundll32.exe notepad.exe PID 1464 wrote to memory of 1580 1464 rundll32.exe notepad.exe PID 1464 wrote to memory of 2680 1464 rundll32.exe iexplore.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\VirusShare_00d9d5a0319cddef48add9257d4721df.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\VirusShare_00d9d5a0319cddef48add9257d4721df.dll,#12⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2428
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2812
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD50e12b5ccc3ed85917289e44a60b1c096
SHA1747e6f32d0fe9468c6767efccc1e431a3a6a58dd
SHA256de679fa1e212ed693c6b573ae8831e7247b7623458f226d5ade184590d6537e0
SHA512f990bab6e298f0aeea030e7ac80dc0b0729cb3b0f664e90c8cf140f895758993b954fa2e406a5d27fc48fc87a23aaac44f29b6f6cf89b82418b77ff478f6c638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d0be8ef530ea30ba740f09e2706a852d
SHA1328f0aebe03f83ce8f9d3c5d36e767a7ee166d54
SHA256370f87f4afae048fc4ad237d80e8849c4ed239c9d426fb0d383d51fc24ac0fa7
SHA51264a23383e30b7c08083eacb77ebd1e9288bf5455cf737b6caea0cbd1fec9fc1a313fad536208b71f74ba86e5d457d9b140e40fb5fd8f29c9609b5ff2432f8e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ef88a72d4a435198a4fabead970a5b03
SHA1127f6abb62f1809d13a9f500e14d9402fbc89e22
SHA256fb0a35168160235deb8a5c35a019addfabf95ba7c324677c0c1fd68885263ef2
SHA5124ef7aa929d4cb230a43080c20a03e535ada651cc400b9146cafe4d79ce53a85a7aa399cd4c7c0813b56dff10fd006f79a99dfd7de2ea1e4a9118b3cbeba6f5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD593fe2ac7efe368fe4032ce58690a49c1
SHA10af5f1438ebdf0234590653faa96639ea54b5d5d
SHA25665afc019bc0b9ad19d4b68f0fb908349ced44b3b2908f8573485e253367bfdd4
SHA512c8d557b2524745160c2aa6bc69f9f85628405426925c710e7ed80bd0a5bfaf6f83fea04814a0626c14ca6b45566d4eb3d3e20429f1d750a645b10d8492aead63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5eb0b5e46f886336b73c038694b4d47ea
SHA1cf39da46024ce92028a9845d0d2b1d1fd95b176d
SHA256a8433df3e84b404a9f1b6c4284aee5c099221e13f94f5bc701909df8b21a9ec2
SHA5126ec38369427273d2108a535727765095804b4d72b4fa28606872cf9ee88a5f46577efcf77385dc3bab807b05501a80b23a86e414ddb50a1038aa2b577efc3c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f680eaa44068f0699dc41b4789af349d
SHA147f4250b99f83bc16e3293ab58c66f1b23974a4e
SHA256a2b8d47aad6804412c875e160a5c3ecf3d72221e8b2c0d20ed827b6dbe31dffc
SHA5128567f7c41e74ecb728161c93a76a70dc477a3ddaee7f8449d680573789a562bd00646125d9769feceb6f28f72816f7e061b47b192bf57a4283d8a16741d5f979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5359b0dc0cc55cb813426ad16efd1ddc1
SHA19770a5bf3074878b0157e67fb683d880e4169f3d
SHA2566c84f2b0252f46f8fa3c516525835164893eb6f3aaef9bb2b2704bbbca5fb31d
SHA512baa4a27b8f9045b45bb727722ba2a45bf73f0d66b93007b92fb2b94607539935a13f2dd621eb5ded97995052808c085fb10e18e40611a24b11844df4b9adb052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD539ef4f5c88687c1aa1438022b71ffe86
SHA1f7126831dee41240350b6d91c0c3f68d25596114
SHA256802ba1534c10ae90d3f3bd4cf02c3b312666999fffa16acdd49e96642605440d
SHA512da10388dab0d1f3d61682bff2045742fc1d8504f65a7361e6b4e08c03b0e092b7b9a01dc8a4abe12fc8047a37a67ffcab1d16a1e04234d11575546577f64e4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5875b8e800daf1b4066bcbc8a48fefff5
SHA1bb216738da245bd55109e1b2b31fe0da878de5a4
SHA256e6871900409f4367f6f8aa1b76161233c64477c9a5a563fff366d94002ccf755
SHA512044c9bd68dd1627a4c29e706dff0c6de9bf0992b71e9a37bcad19bdfc1e00be4124df54cce8f203abbed3cedf823eadb10ac84c91323430ea1099b54f0431cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5722e6f82d3effc6d1857d1299340334d
SHA1b7668dbc580731610ca00110900e9e3814c49f9c
SHA25659f033dfe873c4bc3811fe9eab97a632c3603b474699da44ce3b8a957c6e907a
SHA512f1f74afca440bf096bb7ca59749cbb7b577612d398c589e59552cc408cc5856823f4052ece0956c32f59092a9d6147a9fd5a08f659e432366b55bd4e14af2f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5035a06f62242bdf59ea520c2f7f83aeb
SHA16ba677d97e22bd2d8afc6108f7d0dce546753a2c
SHA256ed9131d43962f4825159c4d831a0d7bae231f1b43b20c4ba6857c1f71eea4224
SHA512f6a8293b3c40183be4512433253c111e3825e696244db0fb2ac1284f9315ce8774e17066c53d4776e64390f5b69f9ac08c42c07ec973e57af2296c37f8afade3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5cdf591f566d180f70ffe1b94e0b2135c
SHA17b179627d1d93cdf40a1834fae7d413569d90ab9
SHA2567be591b6429c33c560cd23051d5c0bfbbd7d14603627d47c3a1a81ac1aa54448
SHA5124313f7853679394aaa6aaae6700e168fe1da597c451bc304ae24f32f534f8cb06542e0283fe76295a16699f63619a0a4b0a4db684b13f2400149abab83cb1946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d4d3197ff69fc0208700eed90d92cb64
SHA15422a5885ac79299d8f6709eddb0abbb9c726c5f
SHA256a9a169135594dd442ad8d5d1418caf696f59f4445040016cdbecf971df3567c5
SHA5125dd26250a3ffc21dd3d40f4c213a8c1cd4b09eb10e0a560e74326d538227d0cdacc0fef7c115cb0b796d774a328592f4601f5376526244d3edf1d083feb9e79c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c4cde0aa599d0b1154836616c6be5948
SHA18a89ba70f8e9061d982c77cf47c5769a10d2e451
SHA25686514556dc7dbe6302dd7ac6407b3f1dae5e9d3be3940f5f76cf51effc04c5ce
SHA512b307b821daeef956e606dba6c95808a78b329ec36d97277e9bba3feec7a1825d17fd631cf8ecbbf3516cfe9d341c7874224e024164d384555151f18e8312ec45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD557a0352626b0b1edd632ab9dfa73922f
SHA19a7b6d69186cd898ec4d1c63709716ff59b01cbb
SHA256f97ada614527e5c86f149ec009a5f85daaf1658cc3a48ffd8280c5baf20ecd5f
SHA5123e8b8685d5adfb4b8c6c51419f95c56dde0e6e3aac55cdbafa297437c022b6dd7b7afbccbaf8b52be0905d430fc33eb52be9a1e1f80993789b8ae8e321ed824d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD581a9b8aac955127ee073558a46259974
SHA148c12e8e148e7024ac5fd440007570e983726b1e
SHA256b0cfcaebbc2f48d5e6fdbe6b768e6bb0d9d449e7ce9e6ab9a6977f7f38f845c5
SHA5122b95a81e347008834b763b2a83ee54e19923e67702de754a351d704b2f8ffc76b10cbb06413a617953c45ff64b1df378c0f2f2701f5a1937a3f281dac8576f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5bca72b5849ab38a8b155e845ebf6d474
SHA1bb562954f788a1ecd045344d3cadb288b840fe2b
SHA25652a4fc9a63dd1612e569b96452079a63c8ac45bf4f0a6610c1074504f68eb7c8
SHA5125d116dbbfb6d3ca1ef7202c5a99e95f4db7fcb0c2014e0100840f0897665d5d4dc45696aaf5f2fa7f25ac728017ab02ef6351deafbb7e6944062f75e76d2fb36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5426d8b0d98aad48956ca5fa46407ceb3
SHA17d03dbf09dbad115bbb3f16b1dbf62202c74c0c3
SHA256b514a67966c4c4e7e7c4a5e30864b5fbb65e0c13976cc524cc59bc8c0bd5d653
SHA512cc8f015674ea09ff9ebff00fb571f06fcd0be43c7d7115c48e3919d8e9c9cc92d228bc19187067cc8ad6a1cb80575dab38a2e2e03e13a18a064827f784da5706
-
C:\Users\Admin\AppData\Local\Temp\CabE86D.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\TarE98E.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/1464-1-0x0000000000280000-0x00000000002E4000-memory.dmpFilesize
400KB
-
memory/1464-3-0x0000000000280000-0x00000000002E4000-memory.dmpFilesize
400KB
-
memory/1464-4-0x00000000001D0000-0x00000000001E4000-memory.dmpFilesize
80KB
-
memory/1464-5-0x0000000000280000-0x00000000002E4000-memory.dmpFilesize
400KB
-
memory/1464-0-0x0000000000280000-0x00000000002E4000-memory.dmpFilesize
400KB
-
memory/1464-2-0x0000000000280000-0x00000000002E4000-memory.dmpFilesize
400KB
-
memory/1580-16-0x0000000001EF0000-0x0000000001F54000-memory.dmpFilesize
400KB
-
memory/1580-13-0x0000000001EF0000-0x0000000001F54000-memory.dmpFilesize
400KB
-
memory/1580-14-0x0000000001EF0000-0x0000000001F54000-memory.dmpFilesize
400KB
-
memory/2860-15-0x0000000002F60000-0x0000000002FC4000-memory.dmpFilesize
400KB
-
memory/2860-8-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/2860-9-0x0000000002F60000-0x0000000002FC4000-memory.dmpFilesize
400KB
-
memory/2860-10-0x0000000002F60000-0x0000000002FC4000-memory.dmpFilesize
400KB
-
memory/2860-11-0x00000000001C0000-0x00000000001C2000-memory.dmpFilesize
8KB
-
memory/3032-7-0x0000000003D90000-0x0000000003DA0000-memory.dmpFilesize
64KB