Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
aaf25adeddf3becf944deed4924bd639
-
SHA1
cbb0e23ec201139ea20c06606d98ec44f0542952
-
SHA256
4ae22655f33e69f9a077d13e04d5b578f148759a74efc4085cc52107803bc2d2
-
SHA512
b5b2b3beff9fe2dea0ed2c328f84a6ed6004cf17b345ba327d0dcef96931abf3caca6d53bde307786f7ed4b50b8a142213a2e055867837ebadd6d299ed77edf3
-
SSDEEP
12288:3sM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQC9:cV4W8hqBYgnBLfVqx1WjkP9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1340 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424548550" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D925C9C1-2A74-11EF-BD87-DEB4B2C1951C} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\{4E43DBC5-E8F2-4C3C-9EBB-A24B51750D0A} aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\{4E43DBC5-E8F2-4C3C-9EBB-A24B51750D0A}\URL = "http://search.yourpackagesnow.com/s?source=-bb8&uid=023b5808-6bf8-4a92-a8ec-96a2d8a0d331&uc=20180109&ap=appfocus84&i_id=packages__1.30&query={searchTerms}" aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000002777940388003d4f5bbe7f2d1ae849315dae286e6c399a93a6a55438c5f8e17b000000000e8000000002000020000000efcb3d5b4c864977fd551d49eeb2e230f7789c2f18e327175fc11aa7a014e656200000004167412d165ed2a775bed5368a8390e8ea96c150e92cc91b8c2cb7b06e87662e400000006874038c4ff6e3344c772739f3a8b6af6fdbc69a1ed885c1e74b9d291bbbcdd7d580789bcfc1ea1d609316ca349ba0dd391999f8386caf0c186b0044ee14229e IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90eb88b181beda01 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\{4E43DBC5-E8F2-4C3C-9EBB-A24B51750D0A}\DisplayName = "Search" aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DOMStorage\yourpackagesnow.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DOMStorage\yourpackagesnow.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\{4E43DBC5-E8F2-4C3C-9EBB-A24B51750D0A}\SuggestionsURL = "https://ie.search.yahoo.com/os?appid=ie8&command={searchTerms}" aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.yourpackagesnow.com/?source=-bb8&uid=023b5808-6bf8-4a92-a8ec-96a2d8a0d331&uc=20180109&ap=appfocus84&i_id=packages__1.30" aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2424 PING.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2496 2232 aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe 28 PID 2232 wrote to memory of 2496 2232 aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe 28 PID 2232 wrote to memory of 2496 2232 aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe 28 PID 2232 wrote to memory of 2496 2232 aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe 28 PID 2496 wrote to memory of 2856 2496 IEXPLORE.EXE 29 PID 2496 wrote to memory of 2856 2496 IEXPLORE.EXE 29 PID 2496 wrote to memory of 2856 2496 IEXPLORE.EXE 29 PID 2496 wrote to memory of 2856 2496 IEXPLORE.EXE 29 PID 2232 wrote to memory of 1340 2232 aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe 31 PID 2232 wrote to memory of 1340 2232 aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe 31 PID 2232 wrote to memory of 1340 2232 aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe 31 PID 2232 wrote to memory of 1340 2232 aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe 31 PID 1340 wrote to memory of 2424 1340 cmd.exe 33 PID 1340 wrote to memory of 2424 1340 cmd.exe 33 PID 1340 wrote to memory of 2424 1340 cmd.exe 33 PID 1340 wrote to memory of 2424 1340 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.yourpackagesnow.com/?source=-bb8&uid=023b5808-6bf8-4a92-a8ec-96a2d8a0d331&uc=20180109&ap=appfocus84&i_id=packages__1.302⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\aaf25adeddf3becf944deed4924bd639_JaffaCakes118.exe" EXIT2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\PING.EXEPING 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:2424
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8
Filesize1KB
MD57274771ea02ba398c1b8041a0d2ebd3b
SHA1d95d6d7024708ff379ca9c46eacdccb5ce81d059
SHA256369696a114492be0cf5df1953afcba6532192417fe880c84f61a0867c95e0563
SHA5126ce81ea055126a2ae6ce1961d66d9d67ebd16b15e8a9b529130e71a6f9ce1459f52924141e2de5c1eb65e23b24816b629a326a8a06201a3d3301ecff58111dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize471B
MD5560f71df5ee4f0bbc4d6c0b622d2fd4b
SHA1aae9466d9851770b1121bf8a6a36e851da9bb0f2
SHA25604d6ab58489abcea115c00777374c9fcebf5f44b25758f07900c31393e9d2fbe
SHA512de1e4fddb020c29362b2aa5d589bfeee1752730c579c4961fee2c743d95271cbcb17d6c5ad526c13a8d2785ed91a7a33a831003fc5059dd0ab16f92c7d62c0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize2KB
MD5a1ae10d5e16e55b7e5eae527a949d33b
SHA1031ab130c571e5b5f053c6b84cd415fe66f78f6b
SHA256b09cd02ea2ca9707e302abd7842732b89abc0877b3f6420f3db768e472aae33a
SHA512289028d4ec9623f4ac50352e83702449c26a1c82dd712d55d14c0e0a65c3358ec9fcd2b54d77f1148985a89170c0f0bf95aed0205e6825184549665129ebff5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
Filesize1KB
MD5b19b68b9d54ab7692c389e1e5fc6d5e5
SHA1c7304d1a08cae6b1f1abe2f455618ab2febbdb34
SHA256a274aa2d38b283cb6809147bf78c7b9d548a52d33eaa4ebbd8437127c1c0a605
SHA51239ce2e491f17fc21e3366c1e6dbe39e7b5cd4804520eadc3fac4688b2ccbf6d8f3d9a41807bba86f10df7f7d198daaabf84c9deb1e1d942482b304cd3ff6438c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D03E46CD585BBE111C712E6577BC5F07_B82D647113A63312F289CB1E910A9CB3
Filesize471B
MD5c7415a90c6073f354abf83990ae8e54b
SHA15db3b12424479755a246f55a899745d271edbfbc
SHA2567a378fb4c397c55e292290432d76d6eb9c23ce937f5481dc35b780e11c7c4d14
SHA512628db8408a06a6382ae297c26cc4cc61288c1a8102fbf69ac7442e14d63963af2bc8265ab1d263be9a3bf7302abb0f8428f5741ffc1b429f58c38ebcaee12b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5b8aa03bab5c353b0297cdd2fe095014a
SHA1aed3c7f1468d4eb113b0231b08fa3730dc7d4909
SHA256ccc791f44ce9163e008f097dca144d71b9194a63d37dd3e8866461c858ef9553
SHA512d96ba62cc8519e05f9233b6b1e4c43e39ac5e06f7366f234f652dc614f0f33a859d33fdcc04e0cc6a3fe4936d57441206775697b891a8ba5c9330598f477ebe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595728d6b5a4d68735261b4a13a597c2e
SHA185578e8bc539a2fc25dbd4ae50004f6dddca3311
SHA2567855c82ba80d523a905b1dc99d0dff2c2c8bcbff8d4a3b9ec34b9c37b73d8b95
SHA5123527e89761af79b9a8f99137e3042f28af47e51283acadf690301e4b1d10032cf92109fca37cd2f99ac39e2310567186e8a12c75ce36af54ed7bba05a956be1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55299270d34c88431257e48ddaaa682b1
SHA1af265c188a7026b2cc99c305dd3e8bd413765d1a
SHA25687376f76b6353a60f40d4fd1922c95e4f7bccf3404009c3264928505a0936ae2
SHA512e677f50fcba0dbcda12a4b9d376b7623c80347a2a53020540823170ca7a0e19b2403ed26e1359f00bb97569065c85d6d7c34b53b0fc37bd2192ee47d59b7b4af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844d598e8c3c95b575eae5fedd4124cc
SHA1f0f88d4f345c9a3b25c3dd5cbb899e5390c6ba6a
SHA256bf09011d711d23a94c5ccaa5ccee89338dd34606753cf3c317c98402ed47907b
SHA512276d1b358d9fc67497c38c48012e364145fde0b0d9a4f8c1b9760d6ceed7097cfbfdfe6076dfae32bc0cac8380702505402ad00a98ce4e7561a0e2b0e1742ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fccfe844bb663f2a73d985a6d7cbdf46
SHA16d2a537e8feae2146bea6773cdf0e46ec6e2322f
SHA256b2644e28671f81e5340a08ee916c9ff546f3a3b61c621bb265c6292c0ac6c201
SHA5126d2e3a05f97098768e93791f542b72090a0a5cb8d4bb98c4685b04825a06fb7350d3ff255247e5523ff189185841f23701ad7716b951777cf6b44505613080c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc104deadb524ab4fea339837da868b
SHA1a650a6a0dc2b73807a634c39132b6815c37204c3
SHA25602b6c543f1bef435521d20bbbb9b0f2f41eea7fe536b8b42da7205fe31e961c0
SHA512291dd7cc423d3909f3967f6c643371aa8433a2c4ab1a224de35f914e416201416d81ae84ef52de7ba6b811ff62af7558b76b4ae67c75c20eb98dae331e79e1b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8ffe163a5a763e906ca617b569da2a
SHA1ed486d91c219c9fdc259c9d0a4a88b02a40b65d5
SHA2560682b9ac7dc4937a838b5c09a83f17fa9eee8ff8b8c08aac7acf6362891c9e1b
SHA512f136f06905b513fbc6e8928809a1cca159f31116a0673b3e5e892f03bc8506595e10e978caaad8dd421f528273a265f923adc60eeb3b19deb39ab77905f621e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667434609ec6a0944bddde1c2fb781ce
SHA1ba67740aaae3ea51c3b114cd0dd52777937a5d4b
SHA256aff0c76b03b91f6a4f8a128250f2791b05840a5b43c2a24dfc62d03949b0eb76
SHA5127c4e0dbaab66fc510edd5467a59a12ab467db1f56ff808be860471e2226012ab92c9c7f27720dda4d832e1fa1f8a7d47fe0110ba7a5b30fc402f1b64884e1c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b1eb386394235de7c5e02f7af25c510
SHA13f112e5a45736fed0d63c3cab2dabf51a6ef29a4
SHA256b889ad674a73359014543c0101b6d73db5f1b2964748c68dc0e86c6ca86c209a
SHA5121b8d01524a0e2d520378ede1530d3d47fab5f9a448693615f5ca0b7375228e530e78fb62d52c9842c71b9fd9efdce1f5bc278d931d78130e65611091513c7c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2a96533693557a560ccc0864ddf7fc
SHA1fd5be65497ebaf6e1b9aa4b33bc2ebffa501a4ef
SHA2561b2a3453b4239bd7b0d4542631a43fc1b5d9b0ebc229bb72f2f837ce79149c52
SHA512300471cede549e00f0012bb6883599cf33a750a5cd61ba2734f141969dbbd8fb9660ecec96bd955093adcafa01aba6a97bb28fe9fd942fcfcc0032faed545045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f72bb699a75c39e80f48c44448c4382c
SHA1c919dc6833cd19d3786ff2fc6ad3050a8dfe6fd4
SHA256de45861c0a897dbc80a954d8dfc0cff16745b9039f8b349f26ecbb07aaf1c7d4
SHA5123800d642dff842437fbe4f3a3b3b9b2c96cfc2ca140d27e93d70400187e87276f1aae7e1a0b687618a5ffcfb36b4ad9d64e05807e6647836ab9e0c1a5f2c3ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d7b455a02d0248116efb704316919c
SHA1c7e75b6e6f0274e4fe034f9a6ea66ef5e49a0a51
SHA256f413e3e0839fe3048129592537dd3c5525ea1214b1f39f39c038cb17722a2d86
SHA5129e259b799508c4e21bf951c92227bde8368593c314da6f361c625b2269bbb6cf28738c913d38024984d13121141b549d7d9076a2e9a3e5699fbec545e2ce509e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f01f658127eacbf9ff4224cf52518d3
SHA169f513ae86611764c252e78c3ee9592ba477a6ea
SHA25645bca2720ab7c0c310f04147025d0446d3d886acc93ffc59f011c11ad6ceb10c
SHA512e776d5cf6bd49630127d25441ff4212676ef8b6d48774c9264426410327ea6b663744fa3c2862ca282a9278489005e2498b390f220d310c415a60abc8cf272a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017b61fccb6c88bdbfab8fb0c543216f
SHA1538097ea620aafabfce9609172c0b373a2b85f7c
SHA256663a16c9b34f88f088239cc5f18b59fc46f590f646e9cf5de86259fef6e5c5c0
SHA512605a135ce549ba891df9d4a4be17080e8901b54c07c444a9d91ea240a97fbf577195ae1be80a49507d2de4e783046562bd90d5a1fb907264e6a002c0707012b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e015dcc7e4206ac2346f172d8c47a2
SHA1762328e34bf2eaee3252b6b07aab39332a2c98b1
SHA2569fe9f1a27b3a44fa16355f5e753e7109d69425be3e0386286a2dd8d7b924ad67
SHA512c53dd969d3378927921ca2c50d26081e9af8ecf637be13386d839c2ec542ed918e81c3674ec13febe5e4a91f80eb528be3dcadeb114a07ea256dade1ea92aed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d72bc207d28eb3dfb16418f03500dc9
SHA174bdba35619397e8281ab9ade4eb229e70b821e1
SHA2567e872f074ac709228596532897968769a1d34da68fb13aaecdcba50a2dd6448b
SHA512fb6f524f4a7c75822c0f39679dbf63cc78aebea8262b936fc6d13e37e2fbc381dfd4303bbd9b375e7a8af0d1593c12a4301906bf8844e454d628bdff4146d025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5d3ca70d1a40401200ad0023f05df5e
SHA1e0a8aa214fb4ec912747eeeb977a863d4caf3db9
SHA2566fd1307642e5d4e2cfcde7dc1ef2fdbb4df8d162280ece82904cd700ecbe9816
SHA512c7cac4b01bf8262752cfb805b749f14a2ec011cdef75f4d14e359043756516607df4a9fbfb9f51215fcfa5b2525bf92a6331ff5583f4a8ea54a1b0b8453b6da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a411ffb8fbb564a9d0597fb01e4b071
SHA14d20c60c06df423864b5a76d2ce636a0ac48897a
SHA2560b23b93387701d1e83952f6a20e7dd926f4bb22138c8510d0624e3bf8ac78ae3
SHA512527d98402fb7ffadac957fcc71f4d2028902001ea2d6a7dd50f8deb155a82220be320da274db69e553e60c13083770b3624bf1bb255c37bbe83ecd15a55d9e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab82e1b53b8d739d526d9faf60a3df0
SHA17e54202737eea6c3ae60921cc6d9729398f46882
SHA256e20b66f807ec5e143776f42dbb88933c97543697d2f2392cb43d4acc099a1604
SHA5127ec2f8a79fdb805595eb53d8f7f0d36d00071dce23be846092800ebe0f28a115585f7510d36caab80d05fc5fa72c55641e343730d7b1f6d35db07db006967660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407c5015054e6b6c4957c53353ad182f
SHA1e8e1258da841a1ebcd8bd31691751c63d0a7beb2
SHA256a7f56a476cd0004049e9cde9f80ba0b93cbbd8b8df2af50d8c781a5cee747875
SHA512e08e213b8b2cdda9bf8af730e08b58154e5ebcc746a81a877aad3c84f696ba1a1275982db51655eeb35d904676e05d9cf7e92ac8520f2445b63d7e1649fbaa2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5510f7be72298ec49cd013f8a2e85d2c8
SHA11dca3cca6c02a647640b2579288a0e6b8bb6b781
SHA2568469f61fab866e7a0269bdc31bc8eda0c8e98c91001ec6c98affa728051a377f
SHA51248856980e88f9b7560bdab22c482f5920d3220bf1a02acad206e0ba5f63418a32a1c6674b990c93dfdc5d1140f96a0e06db29a6fcb706bb38d8f1681f4fa0fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed66ba5ea72880a6b8a4533bb590c317
SHA19fa98c972e79d4345b023cd1fd51f845f5557d55
SHA2567cf85f7be3546c12d3f42f5ccdfde3922ab4c16ed26a08382bf85908e597e904
SHA512bb94e378ee3b4de10dc99e600f4e0bf4dc610d8ae8f88a54c89fd2c08d1ca05bbac7710b04d3504ad0502698bb40e5930c9964f5ad311ee4344659c10585b113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589854d32ef6ca5b5c7afcfccaa93e7c8
SHA1f6e754cefad7c52139fb677040eb5d235128f42f
SHA2560cf93d6e837368f1a859688787aa1a52f8cd1165fa8ca350ec94783ebff450db
SHA512b15b42546aa356a0b062c8ab9a07164c9a6ac6f49be052434afd9ea705c6b862996d0dc0d9360a0e502738fb0b637da25c04110d6ab77024874c1f20b00ccc4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52d761867d06387c8783dde254d494d
SHA12627b4b11023f71a7053b647f6224fa1d40ce1c1
SHA25623686086e93de9ad1e7dbc3b74e0aa3603f79de94bbb95ebc765c16451f32e11
SHA5128caa41bf241bdd57108d29e52e32409ba87bdfb5cfdd89fc820929ae718547c91b43e906ab47502952d684990129c9908500867252f10098ef40298ac6fc97c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e846eda1d96e813dc210d5107cf91caa
SHA19a38acfc25e37c720917a9c311e84a200c90fef3
SHA25652b3fa06207e093fea15cca2704dc4d583354631881f5d50f27e34d0b6741181
SHA512b1b99164f277ebff21b4c5f4a47d185ffcb6bea2cc2688a986871adc370394850cb8182c7492ff353f7701a439a8072f9b6b86f6bca5d05fbd864e6df296a35c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52150cfd319af93831de67b8b30aff0e0
SHA1ad65d482d4a2b60efcb52e74960f28d8b4f5d810
SHA256dceeaf4cada0491cbcef964aea43d72bb9ab560322b447d8a12ccfc09146c48b
SHA512ae2896c55338553525403801a4ea0aad9968c08493c98c1f1c00239747ff83a0bf159ba8eafdff85b760df2f51cfc44d6c9c9e8d2c037ff64820b5f0b516880f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56658b44689702cd42bc9fadf99d7aecb
SHA1fff73f63f64d5d4042a06b2c2dd04f6493bcaf7f
SHA256f28d0e8aee5e7ec951f05ad593490a375d4fa7b95c82a439d4d96f51e21f7353
SHA512fd0503163471e3a0df45c6d6156b8deef7f71e54f5f935501283d0ab66b7275c603f9fa65935c5b9d70fc90ac5aae744d46bec5607dda571509095292eba810d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532f72a02fbe1f7556eb48534eb85149c
SHA1338a519ce924bc04d40d9d0b3406955b8783c3af
SHA2560b112897f431bfdb52e2a34f0e5843c2feb0618c2860cf546dd579b22a24f47c
SHA512ad0a1c28b98cbaa938f4d0524b3e63015b39b89164f3b36b90b9039eac9f9d1e716271103f88ad70cfa757ce24fd8c61f38b66b823d158eb802b21c4668ed75e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f427914d1afb461bdb3147ff416ac120
SHA17f3ca2b8b7ba756efce988306fd0e76f1794c7fc
SHA2562f3fcfc26b062aea7e7cabde8d87a51fb2b2c41f68f469ab1a65ea1a89d7f2c2
SHA5123193db70d87847d0e721119318a26148b0667a17aa22ed591fd9c2b0b9d4377d73c24cd77affb87d23d4bfe6d0c897a0bdcb2b25be0e72adfeebb929f20a39cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e530ed9eade7bb269f1775d5cedf107
SHA17310953209f21d5275d5cec8a0edcdd93136c1f0
SHA25682f0b1d131cc0bb92373794108aca6d8ec3d54ea97f53b0bcef90c72f82ad40a
SHA51216a8af3ff506323b45844c69b407e44322c3fbf1c5c3075821df0a409e2d50f8673742bd06f71c0aa120cfe691f387483222d61236fa114c306f0e8cc547b9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa796ac2feced045f1ebd1711034140b
SHA14755a697605fd271183da11eabba07b317b8a965
SHA25641179f51e0e348a487928222dc7c3f3f0bc212a0bf5fccfde3350f806694307c
SHA5129b118a68b88f0c13aed477c14f133a63ab129abb4da00f09ae5e3646f2203bc92caf224bba051bb6684ff64c19f949a31ba550b17729eca63175b10665ff0c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653342e0932018cfa4a3093cc8d0778c
SHA14286a4c295ba592fa0c7e1380ed3acff2e0350e7
SHA25631c4922f8cdb94e43d638b5bbdb5cf64b1ca6d4001845f027e189b34db0d3178
SHA51204affc1ae5f12c9c5967ebfcd3b5dc7200ab18db9212ef93aeff99b85c22c23c5a77b1a4a7da29505dc1da00e53d73210459e722b02772ea08c2af3601625aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aede7ad9553bccf571ada92775a72e95
SHA1b9c17a7d59d2b5808f1d9ee2f2e27761bb0af521
SHA256d20452d13a658874fe91ee2b8513f87fa590d3d69f19bdf7b4444f7411131134
SHA5122f2d99345217df52955e6c7a0c1cd8e1c83e8c1cc6fe63ea30fc5add3bfe93dabaea0da0400d585dbfb379a02fd8f8713f7feebe891604311e618b89c0741724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed502829cdbfe8755b4be36a4712cc1
SHA168c81c46104739a87c0a879847eacd613ad64fee
SHA256b7bf8b9bcedbe4dc5483f000706136f74fda3c2a147437350a3a6457afbf9833
SHA51296bae931b13d5ab20f2abcb05124a145a8f434f75a9f87595c67febcb965d67db728d1d1a86194c9f0a299e887e88325873df07d3d98d6acd4153a86438ece05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b78659e669dac8565bece19c08ef83d
SHA102ab3e2edacecbcdc91c23023aa94265fc7c318f
SHA2566fd680286a28b4219c52a9fc940d2e5fc2ec642327c0619b8a524de155ec8103
SHA512742213c44975e6489ab56b5765c3284f5c697053d6212ad35ebfa540cd60a38721f98f07e8e59326886558e7268d31867254d8378fdcd92d973f1008066743cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize458B
MD50e7a1fbbf0853e723df49d76b8bbbfee
SHA15e34d4e15166388f3a7bd5e3ccea3b7467aff1ea
SHA256466fec40eae83b9a2f7b70ebadf2ad7aa2e5ea1e8f0f502c1e838bf7c07ac289
SHA5126949e7b1aea37ab8da9c251cd131e12e578b5c01b3daf0a12e92300e6fdd7ca30bf7d613c02bdde41008e34127eff9ac7c36cc69c45814dc6d0c31857968aff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
Filesize432B
MD5a857c3377d417d5eacc173137245f6b6
SHA1e595e6db589ff9ee18975ccdb72c98bcbe123ad6
SHA256a9db5345c914230d620fbd4bb266557f9dbd40b0a2cbf1def281185396f28bbe
SHA5123ae1e28fa4902537450c04e5586e1714fe858467b62fa2d55bdaa6bf4067e3a0a95eb0d40cef33eaf5ebb07387a73fd1fc70302b78f414ca6851d831b0323ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_47A43067FD26B14BE12C55F112579786
Filesize402B
MD53a6af4ab560f5927e06da84d9c6b905a
SHA122fc252f01e914d59d5febbeb3db703c2ac83a0f
SHA256c01a8325b717d5fb818a0381b617859eab852b402afd66732c049c73e9c82e4b
SHA5122134ee28b83212cf390c5d341fdd12ff9ca614680875ce65bb1efaddb60930af940e680d1e9c009ac4cb9959091b22ca0b283255a45526ead29846d0d829405a
-
Filesize
110KB
MD5c3797f7b018b113864d440047cde7de6
SHA15cd433336f739160b95f8a1dfb9e8d4c0e94f9a0
SHA2564cb0c00d8e0a0c9c87d3ecab607257748e11aad81124611d49127c38f11d1a20
SHA512ab77a2404f89bc5f1f2fe26fc96319fb3da9860f9be20d0a83749bf6d716ca0046d3c8fb62f141c4fb64ef0c2d33278c0cc4207cc55d12a889825baeb28c5d43
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\js[2].js
Filesize194KB
MD512b8b61148de5280f1a5ec174de3e4db
SHA1417a5db2c0cbdc6c6c3f67e9c383401b06ca3de7
SHA256310eb268e046ac8d18d24bae7385eecad1b4857b7a972273a5982a14b47cb492
SHA5125cc5b82d02259bf09e351e0cfa52b03052357e874522d91c0954d04ecbb61cf3060031517c85a739ff654e2bb1a2b4d153e8e9c35c144db6b67c4cc2ca25fc1a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\favicon[2].ico
Filesize109KB
MD5504432c83a7a355782213f5aa620b13f
SHA1faba34469d9f116310c066caf098ecf9441147f1
SHA256df4276e18285a076a1a8060047fbb08e1066db2b9180863ec14a055a0c8e33f1
SHA512314bb976aea202324fcb2769fdd12711501423170d4c19cd9e45a1d12ccb20e5d288bb19e2d9e8fd876916e799839d0bd51df9955d40a0ca07a2b47c2dbefa9c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
726B
MD55c9a608f0f3c64cc91848cfea9e138bd
SHA150cd6b6ab4045c279ae01ec5111f3935daac86e3
SHA256a180610e3823ee6486405cfe3aba9aecffff1e78b2bc770eae7a6ab7685a5760
SHA5125eefd80ce808c81f0375e15e81fc3aeb3de6a6ff61c73420b3802c1e58cc3f704ec7dd9630b998cf1d24fa381c945e5487b0b2418c5e6f6de4637313c41b197f