Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 18:52
Behavioral task
behavioral1
Sample
610613fa7732bf81c2a98e5479a0b180_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
610613fa7732bf81c2a98e5479a0b180_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
610613fa7732bf81c2a98e5479a0b180_JaffaCakes118.dll
-
Size
181KB
-
MD5
610613fa7732bf81c2a98e5479a0b180
-
SHA1
8e9aca851098cccfe4b701466ae170214e0d25fe
-
SHA256
ebc2a69929e84bdfaca4fb3804240ab1ceaea69c6664cfa29442f6b52b31cef6
-
SHA512
094a9a512d7d7459f1c41479f5943f3f29df4a279b179a62edf8d473db6aa17d3fb173c5f43575bdc2d4800df64e4bc6560047ee423aca8c0892484656285a08
-
SSDEEP
3072:tBrNNeA7Flky1ZRWIhh+DNdoepSEvAMyzkmWK4Z2O+Q+1Iic6pcmdy0ZyPIouty:tpb7FlkevWFJdo2dyzkmWK4Z2OsWibpV
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2208-1-0x0000000000230000-0x000000000027C000-memory.dmp upx behavioral1/memory/2208-3-0x0000000000230000-0x000000000027C000-memory.dmp upx behavioral1/memory/2208-2-0x0000000000230000-0x000000000027C000-memory.dmp upx behavioral1/memory/2208-0-0x0000000000230000-0x000000000027C000-memory.dmp upx behavioral1/memory/2928-9-0x0000000000390000-0x00000000003DC000-memory.dmp upx behavioral1/memory/1572-13-0x00000000001B0000-0x00000000001FC000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ea9a559fdbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427749828" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67AB8CE1-4792-11EF-826E-EEF6AC92610E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000f72bb3735280fc7f0c9e110cf8c0b8afc7380851f55c4cd047ff23348f2f20dd000000000e8000000002000020000000e7129b2f81b3b7d14e3d5afb70deadc1c0daa81e0a22527f564455af271e0dd520000000ed55fd7b461c91c278ba8171df1ad118cdd1c9063473f5506719fdf43078ed5e4000000075d507e6c2ddb8c00039da0b8713af23856a0a81d749257810024790555156a83e4e7a695d2cc9971f01d92d509595c68e80f8bee69fc1ccb914b94ca9bdd107 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2208 rundll32.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 1572 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2208 rundll32.exe 2208 rundll32.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe 2928 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2864 iexplore.exe 2864 iexplore.exe 2864 iexplore.exe 2864 iexplore.exe 2864 iexplore.exe 2864 iexplore.exe 2864 iexplore.exe 2864 iexplore.exe 1484 ctfmon.exe 1484 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 2208 wrote to memory of 2796 2208 rundll32.exe 31 PID 2208 wrote to memory of 2796 2208 rundll32.exe 31 PID 2208 wrote to memory of 2796 2208 rundll32.exe 31 PID 2208 wrote to memory of 2796 2208 rundll32.exe 31 PID 2208 wrote to memory of 2928 2208 rundll32.exe 32 PID 2208 wrote to memory of 2928 2208 rundll32.exe 32 PID 2208 wrote to memory of 2928 2208 rundll32.exe 32 PID 2208 wrote to memory of 2928 2208 rundll32.exe 32 PID 1884 wrote to memory of 1484 1884 explorer.exe 34 PID 1884 wrote to memory of 1484 1884 explorer.exe 34 PID 1884 wrote to memory of 1484 1884 explorer.exe 34 PID 2208 wrote to memory of 2928 2208 rundll32.exe 32 PID 2864 wrote to memory of 2732 2864 iexplore.exe 36 PID 2864 wrote to memory of 2732 2864 iexplore.exe 36 PID 2864 wrote to memory of 2732 2864 iexplore.exe 36 PID 2864 wrote to memory of 2732 2864 iexplore.exe 36 PID 2208 wrote to memory of 1572 2208 rundll32.exe 37 PID 2208 wrote to memory of 1572 2208 rundll32.exe 37 PID 2208 wrote to memory of 1572 2208 rundll32.exe 37 PID 2208 wrote to memory of 1572 2208 rundll32.exe 37 PID 2208 wrote to memory of 1572 2208 rundll32.exe 37 PID 2208 wrote to memory of 2864 2208 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\610613fa7732bf81c2a98e5479a0b180_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\610613fa7732bf81c2a98e5479a0b180_JaffaCakes118.dll,#12⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2796
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:1484
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586fcdd8708df99b828123c43591babb8
SHA15009eca4f53c1304066bd4160aa8aedd647b1a87
SHA256df52b110686669bf4d8c19ae09873309d9f108b2cb90c3d7f962a332e8555675
SHA51228376d900460a45be763da0903ef3af4024b8d8bc282aa332642cd06dec9907554207617060c8c24808ebd33fe4997625d03b8d892009bdc13837e5cc5b73ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebce3658b4ca40f2b489049de3725dea
SHA137958b65f4294635215ab19cf35b2dede5cd68c1
SHA2565d8b3bfce512f81e07c37a41a95ff1103eec6d4a9851c00d731c785c08ae60d1
SHA512320801566eec0a3eb3d22525188d117c5140a68415fc9928a4bad0ee091dfacf10a722c082110ec31cd5136ee5d10646b2f566f6a46a6a1278a272c9dfedc466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55298d11be53e819f6e7faf4b633b0cf0
SHA1e6020842ea556a05e993d3f4c42718b195e3926b
SHA25638a99dc57d5e4e499161630b388b5d72eadff4c2d08901f59aac6936228f67a7
SHA512276dec9426faefda47d95e4cf38a5c12d15dd0632329fbe3d06fda3a6e93576dd3c9b13ca51c05080a59e896b05546cdec36e4388c4c3040e2a7f66abea99539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b2361fb393742f8577ba11482078bae
SHA1b5fb9257ba1535845288c5750b02d86dc6070441
SHA2568b358a18485bf4630284cecca26b607238db4b93cce902b74a49693ed9730bd3
SHA51247772fd5618838bd0978445a855cacd17ae6bbcf68c9b0a5df71c38b6b598ad851c2ab7f75f548d3c68d3bda687a64345771e83a0b1b224911b8f17986e6b278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5357318770cb7a6a72879858ce17eaff4
SHA1047b0a22dae61ad4a2978792cff7b826e158b171
SHA25614d869416923793376585e019b6efb166c2f3af587d775be5cc8db8112dc8165
SHA512c4e2ca0727d585e6a5c87c4fa322959d11596008e8e32e2ab4e09084623c542b6202f413fee53dae7226de4e6c1bcf98b7cbb40d4c90abd5dc0f8b729605c4b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f506992a873a1d8ae4d213485771581c
SHA1d6d660b535d444c5331ac431897df428bec2e599
SHA25699a8373d5b7a3a523740fdf355ffd5c1d8adb051103db49c23110875a7f31bcb
SHA5126ff4ef36b65d71f96294c1f33978d20ba3bb22af75e89e9ebefb48d078f24704c6f86633e20495de6984eba97c68770bd2ba87902c979831bb4e54ce40f13bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f6a5df83475ac83cee7fd8306b7fcb5
SHA1421b21309cd41279a722765e42919acf0ad1ecf1
SHA2565bc03679b1d80dc19112f3a030c0e92398174b0a4d11d4aad9dfeb61e7021573
SHA51269fc394ac49efa9a718f6e0c82a531b8af3b241756c04ce09dca020366bf6265196d56d88e8dd82d41d9943f6cda9a5b6f64ed39f917ce753ea6eb672c5b0ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af29554bed509a09857a5d9f4f2029f1
SHA1b675635669dcd2a4b85609416c3ee6f2e9b4b889
SHA25677f1c152dd7239db2406375f6c4ea9b27316e0483f9599143483b26f84a468c5
SHA512afb657e8257e1309dc50439f50ad993266f4a6581ba8f72013e53d88b34023b75016f51b1748b7fdd2ec51910d434ef10ab2c287b05c1f3cfea9df19527c4b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5cad78db0761003b85a9cc8a8bf81e3
SHA190797c1c5795a0550d7b5614bdf550f083459277
SHA256e69f4c7025d16416da19e47deb8e594d39214e29d616e707ff3eafaca6641ce5
SHA5126bde006fd192334e3c0abb3cb417e036d305bc20d0f290d8db3721c261420c78515ec919faa86c01f42dc5bdf7d1b19a48adb23af7d7d47a7b03394ee7ebe6ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b42fd72abdab2281c5d3620078d0a8e7
SHA1f7bcb11770f21fe42c9832232ce7e07bbc3f53b8
SHA2569ed0e17378aab435ded2f872fc3f3132ed9252e51befeaec58c2a89d38e12de2
SHA51240797a6b1f6621149103ab66abd9cceca2e8a903af4681985dfcadc53a5d76b87cc6d5dd03e573c58878d70f1b0ad1ab38fb7b114bbd7240ebde76d8543318de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974ef48f898b583b20e9dc6a64090b5b
SHA118cd1b27f299d7dbe252bfb48570ab46fd60c7e3
SHA2560e80a86e6ff9208960c535233bf62f471866a8081bc01a7e446043d3e0e137fd
SHA5125dfb8b1d780d5b37ee197e19ba6597ec6d8261cbf7ec1b302004e74a6bbf7ea77f2ac046d35c3cae2a78908471f5ad902e634691058822d2332d643b9d24975f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd1bb1adc2c15bd152d27d6d78e45ca
SHA18b48edb87b0b9bb9436e25bc1120943f4209db26
SHA256e4d8b358b87781eb8c305b796372a4f5e061a3c100a29a24af4a08ee27b3fd7e
SHA5125ff8c0dfd84b0bf48d1d8d5d63020d557f45738324b23b9c28624114ba6ccdb46216ad4cfdcdfb462ef1d1a83c633e3d46825af2e67b291acecffab2a2407fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eab1f5f268f8273a0afde64678f9c2c
SHA1828bb12200fe7c6da81eb9fd338d71ae13662142
SHA2566601c1bbd70bc814932f9aaf8f209ba92683f9bfe657bd4dd3ee4e47dbfa951b
SHA5127192599cdf6b6f75bad78049fac8acf68a5a1c439e792d8d81a71ea69ad1f4ebcb833a24085d514424927ce3b38f84b470630c6de05e574e0c367f9c5d4adfeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52934294576834699ff39c8ef38c176b8
SHA173317c7d278c43a535cc95d3e0d33512a5804406
SHA256135d22aab6ec3796831f0caac9ccfd9e1ed559eacdae14bddf9803fad7571fa7
SHA51266b4fff6a7c50bf8acfbfd31fcec59781c135e49d55bca50f18506cdbaccc5714a67adb6b5a622ee8140b979dbb3a83f807d5e7db71f71cc318b11cc5bb17cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db91bb62b5abbfcd85296cf95b8e6c00
SHA1374533062f8ceac76576f8c34e90a298652214c9
SHA256def6d329afd22bd489ca7a9762dbf4cf790d4a16ae9443e37958cee4e725bdd5
SHA512ddd3cb123b8a8aa221427b8d52a2084ffe20bdc5a92e7bedbbd3a7da8d01a6114f21a71513888ca22a81e5c5c209638b7b6ff0d4f63c13d600830d928e67f019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d4454f31f4463e5aa880ee9a085e32
SHA165333172249909b7a28b514ce2267328e5991bb1
SHA25633fb49740bfdc3a8db9066fb757606c697adf3082a3c14d58abf49a0a29e008e
SHA51281ea579acbb6ff99ee10df875c4cc06bb1606998f61177835953182944c2478c9da8b7cda1d1c59720b69e2e3414783f0f4a08d5b2b7a6ac6625f7db15574a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f53af0c7eaeb82704b60dcc2427faf35
SHA1671768477a5fccdd8fc2510a0e2e40a1c7562da6
SHA256bf681327af4da6bc8f85c90a2640cd6b23d157f49d35deb31ea94102eb8f267a
SHA512167c12ff7756b1a6f0f4992121be703fa2b87fbfdad004324727e21b12bfa45c5d50764190bcb4e9c850c8339f18c49c06a8ee0e55506feb09945bc49e4289f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4dd5acd5d2ed72d44c274b6873b4b9
SHA1cbc66f962ac19df5a70c6572c0a821754fa251da
SHA256e2b2842b721f63ba4727925989f69aba822a08a61df72a9a5f8785a1d2567ea1
SHA512e77bdc43961149a481ae41c2871d0a9214d47ffaa4e3e840232e74cc628e8b3abac757e80fb9ddb7c5501e4f984a3cdcdfba1297ceec86a1bbf27e9f9604da42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f637f651e4b1345793182e53455ab58
SHA1b8dee43e6b48b76ba79f8881ddc774f830c96f51
SHA256c74a5527dc94db40bad8718a22efc7a54bf2c64e590ef4d1fe7f0234e96f02a2
SHA5125200d33f9f5f85217854855af59bccf90fc7dc9b8ecb0a6c8eddb0e5d52de19a245e51ac98232e1c0c6c6e92b28bd0241144caa8a35d7b5588fc81be44b2a9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2105239228f3027bed119da9bb8949b
SHA1870d2e58f2458e7de808f90f227e0a36aea24889
SHA25662eac180be0d39502a0cac91e8ca1fcea21a794f1537e31cebee750a164da968
SHA51210b23ca52c3bfdee8f4b554c2671b5adc93c5961b6dfcf2ffa3b6be4075992516abba06877f22becdc348642f32be753840719b7a828a9dfef064080172519ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36a917d9093669dd82233d33dc3576b
SHA11f614436d7212f7a6c64ac457bd00599e923c3bb
SHA25694982219308cf00a9bba7a2da5f0f778ffa6ecc2451cb7e403888193ac6ba7cc
SHA51242c279b26ac8fadaa5eebd4ee93c7ee7b5a92bdec28e7c2af894c9fd1ef8b76ed131a78d818e04ffcaaad8ccd877adac38b7cfa97e3c750322141955418636ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b