Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
4bf3b041b57659dd2f1b1ce6f53438bb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4bf3b041b57659dd2f1b1ce6f53438bb_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4bf3b041b57659dd2f1b1ce6f53438bb_JaffaCakes118.html
-
Size
35KB
-
MD5
4bf3b041b57659dd2f1b1ce6f53438bb
-
SHA1
ee691430e1f3a71ad028ce0af62ed8de7235cedd
-
SHA256
5c4c24b898843e09de3d6f8fc3c6902ce30627f2c7f857eb03b7b0ddd1d3a200
-
SHA512
93b18e5b8face503713a6e302abdf51c2ed34f1c2b815b8ac1e9679b5a834f756521b7892f9663d02ea86466e73b3cf41ecb93481594422ba4b22be0ff7a8271
-
SSDEEP
384:Xx9eUOwQeQeUxkUqD5yVrLKtavXwtd/cZtHi5Y0uOX4LQQUniwtPO/WAkziwOPOU:Xx9e4yVjvom2S
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74AC40B1-4305-11EF-BEDD-4E66A3E0FBF8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308d7b6512d7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427249485" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000007137d64601f3007415a4f0b723b0b3cd83adb79ee24568aacba16f954e247c2a000000000e80000000020000200000007b32b341b1a9612ffc591fb69b6ea1d08edd7f8f3bfb1156230df2c7d180586120000000c1a14ae9c24b8384da90c6e6d17c020873d5febd41a7bb489358a228d892543040000000b995ea1dadc2fad5780998ba70e9226061a88ea361260ef9f83cc49b0b0ef050a7975230badeba66508a7ca341a1d681e933a5a43dcbf09454a21bf6034e81cc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2628 iexplore.exe 2628 iexplore.exe 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2628 wrote to memory of 1216 2628 iexplore.exe 31 PID 2628 wrote to memory of 1216 2628 iexplore.exe 31 PID 2628 wrote to memory of 1216 2628 iexplore.exe 31 PID 2628 wrote to memory of 1216 2628 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4bf3b041b57659dd2f1b1ce6f53438bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddfd1210a0fef19882d6dd3527162566
SHA1ab894c42e498f805dbd5f8acf2cdaabc30ac1d06
SHA2564c5fa2c230bff7c7853fc34d1c46570b5c5d595ef3c543907e114354ca42eb90
SHA512ca31870eaca21dab9db91496030e56e82d642c341b830b06f24e34cfc92dc15d9d4e1cdb5d6ceb5e7957f351687f1d07902ab7cd3d2a80d18153016e0a2b807d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50925afd08a62e4955299015213191323
SHA193dfe3414eeebccd081eea78213a3b5d39c8cc56
SHA256fbd899033f7f45c09d2ee2fb08504de897e3d3680d4dc9c03ee7306363aa6ed4
SHA5128304af164dceefb38a8ee174225428dec49c4e72308867bf48e6d09cd777f2fa947d0d500dbb8f0f54f8b55893a4104b109e4da33b35887f685aafeb38f1b9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a581fcff0a402c45aafed88292c82a
SHA1a5fcf9b8f079daa075a4ac4e3563ccd1b045dbbc
SHA256a1b3329ff669487209a02989d9fbcb713624fdc90b7881e6e44e3016fbcfd434
SHA512816bd0fec1ea53fdf6a252f9f23c18c4fb2227b65e538448e0a42f0e05527399c0bd91a4fd60e336914b5ed57cc99a2c0317523b772ed1179c4e7bc0fb1c5929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe21f9db5479edd4bd3e81a104cc635c
SHA1fca9a370075a8e4673f9b20e09362d154e95d637
SHA256a5331c8a9bc0b9320c5148dfa66452e8c9a68c633017afe2a826c7c79507fbb4
SHA512a84edf5b5cb9ca5d0edfdca43d1861993d9b54926f2673600e638e6a0bc0e541bb624581fe63c941c3e604bfb1b60e8a6d49f2f0dc318ef292ae167ecab3717f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2137f973cfc73bd7270973447fd4b2c
SHA1d0492bf4170b70f46f36df4c590ee3e4c6d92180
SHA2565884556056b766f0c59b327fb7e734c223b98c13637fecee65800ce6d00ede83
SHA512e955e3031518edcc9e4c97ab92971b517a9361a89e3fbed5af15800b596cdf5d87da8ebf343c8dab243b179d4149559adf3b1e26713b4fba19d9386656fd9c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f422886c691062ccac9faa5fbd66ca5
SHA1535a579c67933e2ba6c6a6d47a59c05382a50b39
SHA2567aa8f146d6b182ac47c5b6b39183ae24e1de0c43203a968fce40178187fe3a08
SHA512c69f55438c0bce06e530d9f152793296a7a2e809481c3a18cd15ed29624d81b49758e4f03dc8125f8e62485be26cca92d242534656d3702d744e9c58535208fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55060aef44f40a1dc1c24743793deb64a
SHA153dcadd4bd107117cf177d7ce9da29ce64a39a0d
SHA256e59d984c02f6d3cef9fad0ee5f82857ce2bfd4753da78fd97d233e22b6b1863c
SHA512d13dd96b221ab69f01ec92abfeb3f1956b5a168417ba42d14a4a377cc7eadaf5b80859e6d3ae7d53b3757bd5bb30114b7dc70f8932974d088270ddc785582c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a222b9aa1308c24a1dc0c293905677
SHA18589ef34bb0d74d2628f624ae365ca92ac7b9ae1
SHA256a04840ec3efa458bc23a2dacb27d7b3558f6a4614417bfab45ae0082cc65031f
SHA512c3393a0a19f6d87cb37eb66e889974f612f851c9d6093cb894d9a7114b96e50c6068b168b169db565e1bae5dd1ed3f88ab157cafa1070577712b06be4436649d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bb1e776c485adcfcc79c9f7cf8f6131
SHA1f3e4ece69f1178b45f282470f6f6a0c72aabdc4f
SHA256f89b557977711d4d189aef894d13230848867ec0b9dfbef1d0eb3f3b041930fa
SHA512d647d6b589e41231aa188783e7ef713118254e20f40a596613f9a277bd3bc5f1d7f91762d08d44ae18c31664d07eb2c78089612e0263b6d0afa7845eece988e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cc78d4d51df89316a4218b71813804f
SHA1413fa2487cef936f11002fe76bbd2d197fd33489
SHA2563c293a15b83a0a0319d92fd1cc4d60690e591b2d9efa493909e4cbcdf9b632c9
SHA512ee4733f1a4c2d1bf517790b3ad9bfa30ac0d58826a9a9d4954c348e0d898b77247561b1fe2839d3b54b9ed28d360e8e768ab7b530b51e5950fd8495fa77f2e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb4d045e93c265b446c598d2b92a608
SHA18d2ee54ea7fcb0ee339f14278e582e9bc518cd38
SHA2564c1823e1e43efab968ecc5e979d191bbfda0bed22cd355ad4270ea8852e61f23
SHA512c7b25dca1a153025bca78de16ab319085741727654f4f5771fe55c9288d30790f0b27c5927925a2e39407bc279733567a624a5932657ff48314c51ec19395ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d49ec3687c5e7316bde5574b1384b82
SHA1c7778a3b6aacc523f9ced1040a63316522a81534
SHA2562475fc380e1a9b4ef638c71879455330e3df9f72f2799475cf5b947ff636ba15
SHA51244150b71b18491bcfce02a437d38e959ac8dea17fa5c8c558c3cb8921d5aaabd76b01c8102c12e40e82cc65c7e3a5285eaedb9dfa024f063a960b5bcbae87aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba1d9d3f51cd19e0cc3272a8111321a
SHA17a0a8c1c2d9c03fd8a566d7128922f848e326def
SHA256180679786730164fbb52e1beb2ff396dfc36200a2a7e73e61ed87429f96b44c8
SHA512cfd1615de56b1c91e001c403ae00655dec5233ef95601903a92f6a713b547da6398cf7a08b07b8a579bbac420df1e346c40174d8e494cba56e3757669f5c1001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15992e41c9a216cc0c1bbcd302ef36f
SHA1ffa812e8de797b1fd70ef369a2ac2cd5e560624a
SHA256a3dbdcc0d8276ced47ecb53928f0c0b275d3d481d4703814cc4cf1ff37462ab9
SHA51254c581ac56f8ab71a5eb75a9464938f55135c1f6061ec903d463093e02b988199987ddeb1e86782aee5d304e1becead624c41290235a034982e0f4a6b3bfc98c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49a29dd89b54d2e3571a902bc09809d
SHA1c07013bcb2d2dbaf23019a8780bf277685247052
SHA256748de6cab7bdd128f7bfac79179c4a3dce650165a1d4e7b55ddec59c4d8102b0
SHA512c53be3cf39a59f879dee38ba2a9ab4af33fc14ef6ee365ebc29d0d7e3bf8cf6d15df77ebd106650e9ab4447ef2234a2ec8042c3710512ab2cb5f6c856d2d726d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e96a1b45d4632bd2b9ff49c6a84f53
SHA13698f441e0bb34a728ce16b717480847b560114a
SHA2569bb9b6ece4effa28a2d2a6835a2b79466e868a112d4e680f422c48bac2f42d0d
SHA5125713178a6a43a30169f52b4b2ac51504b9e4438661c914e6a90863a0a69be7a811b65d662d71c645ed0d4f155900b20079f7f9984ede8d9fce574ea53056f393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599b86b4a0e3699b289df63d1cfdd38cb
SHA105c67d8846866d4654ede310d5d5428a9f42a6c0
SHA2568dbec80f8c129b242f33c778eeefcb902059ea2068aac8091316220e4be619ba
SHA5120de029549b93eeb5587e5449e3e9ba7db3503d2478d126c20faf61eabb82058f64819e3f343a7519496af3d43bd3ddb2082bdc32e0c840cada1c3713e5ca9e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9069b94438799b54c2b37491eea824a
SHA1b1e4f4909b3226b513856811067f18b2b1212294
SHA2568642e5a3d8e927b060eb7150f8f6b38b2a70ea6c029bd7aa854d51fb16d5556f
SHA5126c41653ec2be4b6e97424962eec00d493b5a3e210c33f13d9ec1d05ea4ff2e4d730c7180a322a604900caaae5f1930bc31f9eb4cfa663efc0eeac44f79e60ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db614a30f600759825a9760f2599f6ae
SHA1409f5b7c718149ffe681fcea5f6d18942ef57ade
SHA256bdc0df30173bee69736e65150c74e7cd65f01f4b5ee44af4f2c306d6815d290d
SHA5129e86e2f2766181752bf00c05b790ac9f74c1339eb7e2d75c8619219e527603bb8232cbfbc55d7b0ecde1d1c2a28d3d1410b04a9f9be58fe2c7fd48bcb639f685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f41c5bbdc6edccfd5c567762f88333e3
SHA1d4489cdbb47d3d00b4eb4ce961df398b4c907d45
SHA25610518aa5b096b5ddb41d92a4a899b4a67d27e8a74402829a77a30d473472b0a3
SHA512e66e6bd083e5f2255a7f9ebcb49b6ad83165a10c83866e4da2b690589c0922eec636ba7086fa776e46f214668e326782c1a54b5a1ddb195041ca603856c4e51a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e22bfdaf9316c70bf85d615617a4fb7
SHA1060c579e2e7dcbe11cf93652c437348717adab9a
SHA256887cc0b18f1bcbf96f8a41099761d2c3c41391d87975f623f1e7f6ffeba884f6
SHA512d6aeea2b17537bda6ab28bc1ab2ef8c6b29b82587d2f07012ef9c262caf5b078302037880dbdcc1cf53d10b025cfe76bb91fe400da48be14328efc43e48a739f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2UK8J8K8\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3H1FOMV1\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\dnserrordiagoff[1]
Filesize1KB
MD547f581b112d58eda23ea8b2e08cf0ff0
SHA16ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b