Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Registrati...ck.bat
windows7-x64
8Registrati...ck.bat
windows10-2004-x64
10Registrati...vn.exe
windows7-x64
8Registrati...vn.exe
windows10-2004-x64
8Registrati...CU.ps1
windows7-x64
6Registrati...CU.ps1
windows10-2004-x64
6Registrati...an.vbs
windows7-x64
3Registrati...an.vbs
windows10-2004-x64
7Registrati...AR.exe
windows7-x64
1Registrati...AR.exe
windows10-2004-x64
3Registrati...RU.ps1
windows7-x64
3Registrati...RU.ps1
windows10-2004-x64
3Registrati...UK.ps1
windows7-x64
10Registrati...UK.ps1
windows10-2004-x64
10Registrati...in.ps1
windows7-x64
10Registrati...in.ps1
windows10-2004-x64
10Registrati...an.vbs
windows7-x64
3Registrati...an.vbs
windows10-2004-x64
7Registrati...ss.dll
windows7-x64
1Registrati...ss.dll
windows10-2004-x64
1Registrati...ng.exe
windows7-x64
3Registrati...ng.exe
windows10-2004-x64
1Registrati...es.dll
windows7-x64
1Registrati...es.dll
windows10-2004-x64
1Registrati...es.dll
windows7-x64
1Registrati...es.dll
windows10-2004-x64
1Registrati...es.dll
windows7-x64
1Registrati...es.dll
windows10-2004-x64
1Registrati...es.dll
windows7-x64
1Registrati...es.dll
windows10-2004-x64
1Registrati...es.dll
windows7-x64
1Registrati...es.dll
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
Registration (Crack)/Crack.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Registration (Crack)/Crack.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Registration (Crack)/language/en-US/Devn.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Registration (Crack)/language/en-US/Devn.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Registration (Crack)/language/en-US/HKCU.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Registration (Crack)/language/en-US/HKCU.ps1
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Registration (Crack)/language/en-US/Lan.vbs
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Registration (Crack)/language/en-US/Lan.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Registration (Crack)/language/en-US/RAR.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Registration (Crack)/language/en-US/RAR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Registration (Crack)/language/en-US/RU.ps1
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Registration (Crack)/language/en-US/RU.ps1
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Registration (Crack)/language/en-US/UK.ps1
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Registration (Crack)/language/en-US/UK.ps1
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Registration (Crack)/language/en-US/Win.ps1
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Registration (Crack)/language/en-US/Win.ps1
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Registration (Crack)/language/uk-UA/Lan.vbs
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Registration (Crack)/language/uk-UA/Lan.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Registration (Crack)/language/uk-UA/Lossless.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Registration (Crack)/language/uk-UA/Lossless.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Registration (Crack)/language/uk-UA/LosslessScaling.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Registration (Crack)/language/uk-UA/LosslessScaling.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Registration (Crack)/language/uk-UA/ar/LosslessScaling.resources.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Registration (Crack)/language/uk-UA/ar/LosslessScaling.resources.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Registration (Crack)/language/uk-UA/bg/LosslessScaling.resources.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Registration (Crack)/language/uk-UA/bg/LosslessScaling.resources.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Registration (Crack)/language/uk-UA/cs/LosslessScaling.resources.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Registration (Crack)/language/uk-UA/cs/LosslessScaling.resources.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
Registration (Crack)/language/uk-UA/de/LosslessScaling.resources.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Registration (Crack)/language/uk-UA/de/LosslessScaling.resources.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
Registration (Crack)/language/uk-UA/es-ES/LosslessScaling.resources.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Registration (Crack)/language/uk-UA/es-ES/LosslessScaling.resources.dll
Resource
win10v2004-20250217-en
General
-
Target
Registration (Crack)/Crack.bat
-
Size
2KB
-
MD5
e90e30e3c6697d870286c1a6831a135b
-
SHA1
1fa1f0d27f23fe364a2e0c198687ff3362d467fd
-
SHA256
b08aaa0b0319c50f5614419752f4c45fa30b5e48137018e009672791447f4e6f
-
SHA512
7feff998c5c7cf4e1cffbf8e654363168b10cd6b942116cb7ab04407ee0e3b40c523d5a273ce984a30ce7fdfb308a43e8ed41f7f3862faa0b25c083dd940ecb6
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2352 powershell.exe 2192 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2664 LosslessScaling.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File created C:\Program Files (x86)\Lossless Scaling\ar\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\pt-BR\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\ro\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\sr-Latn\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\LosslessScaling.exe powershell.exe File created C:\Program Files (x86)\Lossless Scaling\tr\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\uk\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\bg\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\cs\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\hr\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\lt\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\vi\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\Licenses.txt powershell.exe File created C:\Program Files (x86)\Lossless Scaling\es-ES\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\fa\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\Lan.vbs powershell.exe File created C:\Program Files (x86)\Lossless Scaling\ja\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\pt-PT\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\zh-TW\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\config.ini powershell.exe File created C:\Program Files (x86)\Lossless Scaling\id\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\zh-CN\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\LosslessScaling.exe.config powershell.exe File created C:\Program Files (x86)\Lossless Scaling\pl\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\Lossless.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\de\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\fr\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\he\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\it\LosslessScaling.resources.dll powershell.exe File created C:\Program Files (x86)\Lossless Scaling\ko\LosslessScaling.resources.dll powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26D46731-FF0E-11EF-85C5-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302eb3fe1a93db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "447924039" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000064b37ca8d49799449b75fdf74313576200000000020000000000106600000001000020000000f5f8e74c4d71220a3fa59a9e3b26ac53020a5627d0aa211239a3a035d2c05f94000000000e80000000020000200000006512d9035f7614df89cec0db73604197c8ee4ce393dc9d57979a11118c75939e2000000092ffd51ae2728f0b33aca0c2c19774c8b462678c0dfdf8d5109231e4a395d58d40000000012e12a90ef5d31b98bf63291e18cbd8c0d3f01d3ad3ec194208e92f67ce24d2a4469a136cf7d627b9d46d3abdd82ab29f9faea0034b5930372a420aafe5c443 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2632 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2352 powershell.exe 2192 powershell.exe 2192 powershell.exe 2192 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2352 powershell.exe Token: SeDebugPrivilege 2192 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2008 1800 cmd.exe 32 PID 1800 wrote to memory of 2008 1800 cmd.exe 32 PID 1800 wrote to memory of 2008 1800 cmd.exe 32 PID 2008 wrote to memory of 492 2008 net.exe 33 PID 2008 wrote to memory of 492 2008 net.exe 33 PID 2008 wrote to memory of 492 2008 net.exe 33 PID 1800 wrote to memory of 2352 1800 cmd.exe 34 PID 1800 wrote to memory of 2352 1800 cmd.exe 34 PID 1800 wrote to memory of 2352 1800 cmd.exe 34 PID 2352 wrote to memory of 2192 2352 powershell.exe 35 PID 2352 wrote to memory of 2192 2352 powershell.exe 35 PID 2352 wrote to memory of 2192 2352 powershell.exe 35 PID 2192 wrote to memory of 2632 2192 powershell.exe 36 PID 2192 wrote to memory of 2632 2192 powershell.exe 36 PID 2192 wrote to memory of 2632 2192 powershell.exe 36 PID 2192 wrote to memory of 2664 2192 powershell.exe 37 PID 2192 wrote to memory of 2664 2192 powershell.exe 37 PID 2192 wrote to memory of 2664 2192 powershell.exe 37 PID 2664 wrote to memory of 2344 2664 LosslessScaling.exe 38 PID 2664 wrote to memory of 2344 2664 LosslessScaling.exe 38 PID 2664 wrote to memory of 2344 2664 LosslessScaling.exe 38 PID 2344 wrote to memory of 1828 2344 iexplore.exe 39 PID 2344 wrote to memory of 1828 2344 iexplore.exe 39 PID 2344 wrote to memory of 1828 2344 iexplore.exe 39 PID 2344 wrote to memory of 1828 2344 iexplore.exe 39
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Registration (Crack)\Crack.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:492
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "$b='"cG93ZXJzaGVsbCAtRXhlY3V0aW9uUG9saWN5IEJ5cGFzcyAtRmlsZSBsYW5ndWFnZS93aW5feC5wczE="';Invoke-Expression([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($b)))"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File language/win_x.ps13⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD HKCU\SOFTWARE\Valve\Steam\Apps\993090 /v Installed /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:2632
-
-
C:\Program Files (x86)\Lossless Scaling\LosslessScaling.exe"C:\Program Files (x86)\Lossless Scaling\LosslessScaling.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=LosslessScaling.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.05⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1828
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
953KB
MD52c98d33096e97094cbbbd19f27f40883
SHA17e28af9d119d2658f962e3b28140c6081be1612b
SHA256010ac1120a88a772e87d9e9018aa5db034a9bac9399803d4a7c4db3c47a71df6
SHA512f9070ad6b2e3295fdde13aa8d7486147a7f9a675a924ad3bf117479baf5b573cf92650199e58378dd8345a28ab890bbd5021d374030c24836bfa65bb037dddc7
-
Filesize
174B
MD52a2df45a07478a1c77d5834c21f3d7fd
SHA1f949e331f0d75ba38d33a072f74e2327c870d916
SHA256051099983b896673909e01a1f631b6652abb88da95c9f06f3efef4be033091fa
SHA5121a6dd48f92ea6b68ee23b86ba297cd1559f795946ecda17ade68aea3dda188869bba380e3ea3472e08993f4ae574c528b34c3e25503ee6119fd4f998835e09d7
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdd4f073cd9a0476d8ad6d5f75ebf5ba
SHA1465aaf9eb5627d2adcac69d5dcbd121b82c33013
SHA256a5733b24e7fdad44612cb240ef93c47aa99fd6ed73fcb2dd189a7056fdc5aa56
SHA512b9aaf29e38331037107aa7f9d9b0b3171bac1a0cfcf7866ce9899cb0288db04fb7c8f23d790a604680e32df8afd1d2e65dd9274a4be1471863bae41e104167ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f19df936c31d36c76777d61d36360de
SHA14be846301427b1c320fa8eec413fcd22709f3bf4
SHA256e9e78f2fb808a68675195efde803b3f3f11a73723177c51fae1feaf307b63fc8
SHA51252fb9c0772a679dba3d019d0070e3ef90c6e3916c104e6062bc23b29cabd74b807f01e113158f7703c1efc12c261abd9b6b7ab848a902dea6ccc54f3eb3db34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508535552eee88f2f39c8fca2a943b631
SHA16a9d1a92fe3819bf1aeddd3de41ad16d1c158165
SHA256000d8c888f190b5ccb9f3a4f9bd97ab9d89ca5785609127e47ba657e5d2b9048
SHA5128e86b72f7d18ee36908348004eeae8bbc130f52971c0112cfdfba913ddc0f44ec5f3348088eb47205cce48d6880993a800757e830381356a427c388a39dab438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59287a44b0e245e64efcdea17cdb72d26
SHA1acf9fceb605ebfe5bb7eedff8d7ec1be7f86cc17
SHA256f7536c5e8c6a9b478e1c0c2280dd1400c354b5977ad5ad9ab78f4c33fee18032
SHA512fd4074d8d4900e2e6962e8cc72269e22a9b6ce6eb47ecdde0eaabf6f5481093c9c60c94245b14d780f5add2e8337a9a0f53eac79363141cc2eee0b03d5e51650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c0cd84140c5a892808653d0ff0acd07
SHA10f6d2c194f302974743319ab64f9d4d51ac72a71
SHA256897df8bae51bacc7649fcd9c8894b9dd4941da4e5ce105997427796d47e34f41
SHA512568295a38a79d6a80d26e758f55e36b164f515ae44e1d34f52d8c38adaddf25b10f1a4f99936c589b1c034c821dd545482bd5281a205629d39f57c73114c5510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e02b69a5d8dec85bd13e77157db309b1
SHA10f49c7ee2dd7431dadb79a2063c8a9e053a5929c
SHA256c2834a9e2eaa0e0b349369550bbfc5cf99abb6915538ac86949c680ab4a8485c
SHA5128a701503d23500f6e7ba8749fba6bb08e068b1e44bf1c4132e389e905d0cdda77b809f7d8338bf94d9486da71788bf7385e0e90add32d38238afdb6bff70b50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574668d67fa44a5b80064b41d60e59461
SHA1001cf132841fe811e0970e6e50989301614976ce
SHA25638886cccc3dd9b3c4b76cf54d7b542fc78ca37e2d9fb91944d1df8802caa0739
SHA5123169935b7e7dc7d95b25629a4298e241d66b86dac5314823440ea41b4d1e51b454a7b9724923d6a44fd2a209fa214734d267e615b99157e679e40800d3b0e47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c715d9ba8aab8de03e04b4a07c59a298
SHA1100a9215c8190ca1a017680bc371f95209aa9605
SHA256d255e2c16e4badd99918454c17f966f1bb04753261e113253067cad4182159fb
SHA51268e33684a21733b25dca4810ea670e2a50fe050f74537ec89b7ced274b26314b2f9da228d6cee4884c3f3f12b9e6b048ee5acb7054d2e76a714c38712267cb6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5abec80e908f0c17e6a34a249decad7
SHA1f17f9d7a3e0833cf9848ef04c8f8e31a7016fbec
SHA25656468fde3fda8f777ffa1838e6c4535ce28404109ed4f3c01d733fb005eb8791
SHA512e9ca84bb6bd9fb77b2833794986b4a90333ebed79d070afa2fa21ec88638a6a77f077a5ebda6f7ced2960aa7f780617d4dc39c20cee1ce674b81c5d241805e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58235f4d60571a386181e1eb4ce921906
SHA16efdc3dc3c97f58deaa67e2c2fa243a59cf9cb5e
SHA2560fe93e644b5552216170bff369bca38b59851cf8bf05ef68a08affc87b6c502b
SHA51202d97362011185d43899f707de20c0c1bc28278068c44fadf6df9f72afeef7400b7900d04f0fe1c4485398226e2289a4b7b64487b35b226beeec9367326da011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5401f06dc04af86fe65b936e318cb3882
SHA11d5f270e9c7c7a4dc0be54bee6e30d6ca4250641
SHA2567c2f70405149f752679f17dc3d34443043a870ee1c2c05505fc5c4f8d1dad04d
SHA512479a7b3b5661b410aed9a872ed8982bdde64db3877911ef810462f3674e949ea79abdfa65373d1d5f0f02b37f70579b5ca7a8fdc92a29fda499432666769e2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532a1e5ccb17530dfc079abda220d5744
SHA17a2527aed9ca247f152f8782243900c26c41b4dc
SHA2564d16bdc68c0a39bbf9f24de5fc042869bfff68ed743de462a32338f2b0dac3a3
SHA5123d85d7d574a1af06f7ddc927228467e5c092576fac7bd250ebf2a7b632af2aa7f2e56b4525e5cfc4f612874124eaedb96d827a0d14d5307a4e6f958281ab3c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561866b607d9e39bfac734abb778bddcc
SHA1fdde1888f312e35faa670ae06c95975a6b935636
SHA25630511487c5d89bb1ed4d225b72aa17824f071f0b55977407a209b9cc64be11cb
SHA51256b71ebde9610c6db5da4b69b9e6ce67b4edb9888e896185af5077070c54f515a1567ef947b859ffbd8588f73e3d2e68dec6968ddda08210efd2c5e5fda632e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5949461e725fa310382731014fe39cf60
SHA12e53f5b87b27bdbb2603b8019ee1f74da96d1578
SHA256f41539dbd8c1716efefa5870b98f12d74a646899fef9b7b417d5a702cec84b27
SHA51270835e9c9a5ed6a5c9dc39a8a3a05519a1f3e0b60f00fbf91465542f0a9ad89936c390c85b96c7f9d31351996347ff5b98320da59a731c1e03fb73d91b342184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a5f04f51fe3fbbf2c0a895e9631ac38
SHA1961bb9f7298459acceda0637c6e8cba0fae07acf
SHA25664169653adbe5c345be1dc8ec3ac7692cef969422aee0350ee7c2d7f419efed9
SHA51205128822af0f8e4b4cee56153c09ed2f171d536958cc98127deb20e900faf6c526354c6c53df81482b423f0d27f1408279b1458a9472991a89924151a209ed6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54366f40d321af8492b726c9434fa3be1
SHA1d8dd66e44200573119cd4b51fd8f1b6f1765c0ee
SHA256b1c7971b932c14cf36ce88ebf875f066e2952bfe7d10aa9ec0e2f28a26becafd
SHA51271d4c72406688720e247eb257cb2070165bb274a314fae1d4c6d0181bfcb22b5111ea78fb3288480de71894d1017052154dc30e722050fefb4a655f4553f45fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efbbd5be54b9b6aba0004d7ad16f7467
SHA14efe42a1013c3857f2d3cfb9a11b04048c3c107c
SHA256d53d42f48da1521a593183f650509702361a17ff355d3e58503e968bca53b41a
SHA512d32cc2d7d9c8ca611650b5abf59167f6dfccc896da2b2b8e9319bf3ad428a8b2b874dac9b9bd763ac3e62cf060f6deb30624be813dffa55c1be671852c02268f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a2ac5b9d5a3294efd424e9d149ec5bb
SHA1ffaefe0aa2eaad8c6e540d131d9cf60ec24cd483
SHA2569f6cccb25b5c54e0a98fa2fde9f2381c62fff65c36afd7d71e6177a17e0de73c
SHA512638b8ff7c7b441efe86b07a5a030e83a108c8cda6712533817df346cf47b9a68ef10b7afdaf1cffeaf5577024597f6e5fd60ca78c90272cade5eccd1a3f6c6d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f3014890753f95eb42353efef41b894
SHA116cadabddcefcc97b6195a600859ac9e51278c81
SHA256938eabd755c048715ba806ca721e11e1e20d5af130dcbf26ae31ffaad30ab464
SHA51202ddbd03bfd685197f92ad6867b77a46d8a44035d63cbaac4c694adf1c6dc2b39f3444413751f472328b2b5b2727a8b2a0d66e7ab8d1554a56d9e3eee2f0d4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfaf31cc3c324cb81b54e6085301b743
SHA1c565fcdb3ffe741e386b6fd10a4eb0955d8e1151
SHA25616dc412214131575971c535444a217df3dac6b382113231d6b80f30ee14f0398
SHA5126cd36bedb2309be88d4bdfc167b6e8b60b68d013cf59d8fcd341d307019911fb7131cfc917cc1c0e1da98c7f12cd46a80b62db0876419f5f5e5bdbed4fce18b3
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\29REOLIG11YLB08HZ9FP.temp
Filesize7KB
MD52a96e8b0028d54c0fd5db87a9de1edf0
SHA1b6d651e6af073e6ce400f1a40a04504a99216acf
SHA256a623dd9299573b189aa5ad06c955b27aae0a6053b3ad74648671871bf9546a01
SHA51270d1b418d674a81c3d0244b8e8edad59e2ae5110d22f62e1da10247b1d69b6c3de9089060c98f8ecc09decfdf87ca6507f880e7a956a7e23a8586a1c73b17ee8