Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe
-
Size
892KB
-
MD5
697b7fc8bd49004867c5d81902ad0898
-
SHA1
ced28aaf58c55b299e80447855a315a51c87f8c8
-
SHA256
1499a55c2f390b01a78e82ac27e6d6f91d9563d8d69d9659ea7da196bb9de6fb
-
SHA512
6e32c7d4aadda84c4eea768c9e78ed8781c99c633dd2dd7791fedc2144307441b64de41a898ccfdceabff7ec442ebd72557e5f65d1fca0495f602829c8d422df
-
SSDEEP
12288:p31XsYeziPHb4pbsve7glUzHWelbgdx8Xm2tmy:pifg74NsW7g+Hflbg+J
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000e11069d2bb30c17176d439d966aa0fc33e721698b48e1c9d11e0434f1a8d9622000000000e80000000020000200000004fcfbce822c06b20fba21cc3c7ba342519b3107d6f60c4ab131800db8eab8c8320000000531e8d63a1d7a0ef24076b272bf390def1ae8a310052c5ed0eb11665eff2d6a0400000000cf4158680a184d89acbeb070a1aa7b3dd9f75a214ea932ee8a5af20ec417cae18d3417c0a1a4c14404c034f304563900066221ffc82f1289f294b5d5991a3a4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427941020" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e079d6a45cddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F325051-494F-11EF-AC6D-CE9644F3BBBD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F2AAF31-494F-11EF-AC6D-CE9644F3BBBD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1808 iexplore.exe 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2500 697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe 2500 697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe 1808 iexplore.exe 1808 iexplore.exe 2428 iexplore.exe 2428 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2428 2500 697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2428 2500 697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2428 2500 697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2428 2500 697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe 30 PID 2500 wrote to memory of 1808 2500 697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe 31 PID 2500 wrote to memory of 1808 2500 697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe 31 PID 2500 wrote to memory of 1808 2500 697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe 31 PID 2500 wrote to memory of 1808 2500 697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe 31 PID 1808 wrote to memory of 2888 1808 iexplore.exe 32 PID 1808 wrote to memory of 2888 1808 iexplore.exe 32 PID 1808 wrote to memory of 2888 1808 iexplore.exe 32 PID 1808 wrote to memory of 2888 1808 iexplore.exe 32 PID 2428 wrote to memory of 2448 2428 iexplore.exe 33 PID 2428 wrote to memory of 2448 2428 iexplore.exe 33 PID 2428 wrote to memory of 2448 2428 iexplore.exe 33 PID 2428 wrote to memory of 2448 2428 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\697b7fc8bd49004867c5d81902ad0898_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.vdisk.cn/moxiaoya2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.vdisk.cn/moxiaoya2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1808 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556603cab690abfff91117e50824992b6
SHA1b594c0c9bcc3f63b74007d6200807dcf25882687
SHA256274c05c6c959affa43c713fe87ee0ab762277c3634588c136da5b0b332bfbfda
SHA5125f652b7221f2494eecaf20b8c1eb25ca2fb6fed2f8b09a38f9d07cb969af6b25f1d193f4eeb2c48c50797d3f4a945b250666ca5fc345f3e661949bfea575e363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac517be0c5a8ef7c29c6201caf25f4d
SHA16998dac76270b2c0324bca66af23e67dd2245c27
SHA256c4a76350c9d6d179dae2deea79f1a5a137f58f9876d635d30932fecdcd3fbdc8
SHA512bc9f6a6171aeb688bf15a94dd9c53234d786e5f5f4de1d5bb10aadb368136ebbe00c12f6c124af7bde965fad97145bae0dc091ed35b2c78cf300493312255851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bac3a28af3e76cc018eb331dd04d26c
SHA1b34cb288a39a41265e32e87d37e8b0e6e4b7643c
SHA256f74bd4660cf818e2692c54409c4f90d3d0d19a3bb53771deab63228ad777b295
SHA51299ba7450064a9c27bf10da04e3afa31d3167694ce528a8c37ba81cd8cc70ce070cb431279f7d83d8139626168814060596ff4babcc1f30695bf5a33ce27d4f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58253c171a085cc25c5b808292e6060e9
SHA1fc86befdc8bd428f8107317a65798066b3b87898
SHA2567af07d58c71029ac2af0d339e6a8b509b80317eaa2d9a5510e3c26f6e7e8f9f6
SHA51294b25cc35f7b2cabf67e4003635862f137ffb0dbf5912367e92d8d5d530b243c716da004ff2ec700941e4779f8c89c8d2c15325abb9275e58f9de110fd0ee825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a451f8e1b4fd1b50c5876be4358f698e
SHA1e5bd84008c674d2f537e77e7593e721d9951ad8c
SHA256912a7e039ede62b7be85a2ef5a71f6a5c5ced5b84b6355dee73099819f1fa086
SHA51214c285f56c4bba8b3033f9229a219809660ff3007aea376606968fea07d622a79cf511c43c3b1c852c4f015a6dfa35afd30daac919c875d79718b431773c339b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d388366f75745c12a651e1f2051cee
SHA18af23f470e9b109405636f6e74f53c44c1635978
SHA256f984798b5eadeb56f8cdea4e370228625f0382637094b6bc119c4cb8d1174973
SHA512e57a4c7d56397fc6e0368607f8b25c79fd9a2ac5af399d0b6fed72faa872837d3d5f61df8d02a2cd3904f3328523ac739294e086256c920b98225b87c5ce3e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14c7127e51d2b6f87c47af399f91012
SHA1ad151618c3c28107d8df1a5631befc8a882bb7e8
SHA256568fe194a998f5eb8097c6e562c23ee550bc92f0a3d0d0f925c49abf6cc5d210
SHA512fd9eed4a1b09e9702966a41d80ab156dc08e47056e9e23c0637874032c28959f4d9a6c80a4b3276c5e8735957ef5df731110c3c9a89fd6fae6f2e0a439ed0685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fbda1f06bb53205c3ba4bd9fab3c626
SHA1cd853456016d6a07882e4050ae9af6e41c555652
SHA256a5a2a4fc85813e8b47af521f94fb6a88510d16f0cd29fb5f8466ab05ca86a949
SHA51262591c777a1cb20c31ad7c5180a84105299a9b2f48064536f053f20c48b63f3b948fa7c0372f8ed1e47e8aa973557d821b8a83c738733adf424614b4a369e7f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5820203e478aa2ae5668aa926c4a26855
SHA157d7d7ed5ffc2ea32e5f3775da0e25f145f80fec
SHA256413b42b9cfc056ba092822ed5c2df8b866aecf7d683966f58360b13ce333b33c
SHA512b51fc673035e8e1f68c3833602f060d1bac7de243674da44c3cc6b70e73403142678fe6e50c7a3cb78ace9b680ac6d381a256f6ebc9c15ad055b1058b2fc134f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659fb5e0ac50eb6f2332eebedc32e776
SHA12482c12e69efa9ac0f2957b0a34a621c87f75ef4
SHA256b37e1ee9363dd06677436b718efe5d03164010e17ac5622879070774cd3bfbe2
SHA51220ac36b5bb5fb9c15cecf2d23c0a4de0d4a4a67405d5a15d1f8765992848d9e38e32f59047bea8c18ddc0c1fd5b74e897f68c161beb3bb6f846f98ea1b7cc4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50333301a2e2bb1a993739c771bfb8abe
SHA1c8c4fdb9f0ad81e23749bf96be9072a8ebfd2272
SHA2568196926183868a9ff53135430abf72f66646d7ab39b60e79f9db87ac1d929061
SHA512cca4779636a05acee8484e5677915437ad92d80b29a676934350fb32bc876d1b4295f1ec7d3a70a289ec7f25ea0114711f26e91c8c9c933ff1e144adefd02273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a386c724b372001f2c19edef711697e5
SHA11f1e1687a581ba6734d7b87a838559cd2a0670d9
SHA256330e0beaf313129e659fa9ec57feb4ff1442cf68ee9b64aec9e9624fd2de08d0
SHA51237ddf45cbe383a37e7174ea513b5346bab4c9a48aa6eacc975926394f5e9429d31f5ed28a4724b830e3b88726d271010b2d42c9d7a7373526f71d0339c9e3894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec2fc4d799b53aca5fa3a69402f5573
SHA10a49acab01fb8aa0b324eb11e9160df32ff15794
SHA25676e0ea32117fc6c788c5f15b63a8e3f3333bbe289f7e053e094f286b348b8527
SHA512b43778f70bd97c0c3aee2d9d3a03974007a5c9f20702c2b888ed8331e0aaf4a11bdf105ac589432b1ca6dcb1ab2ed165a54b20ef8f2e7b1ac0bf987bca7b9a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a068131db5450ae572dbc25dc2c8f184
SHA10fd45191c6f8234200e53e2ab2eb39fd0efa9009
SHA25667fc3e8ec8e72388545fa2a9a4e029056eceae5f7d06dfc86b9996be5793b79a
SHA512c0394a71acf75103352bc06a5ea44b1c5122050088ecf10bc235424ca1ffd4ddc2bab2b52d4c692c53f9b1ac1e9ca5ed5bd6995a7144bfa8c88ab4811e0460c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51916f149ce17b6d09217690088372791
SHA13a0b9e3383a7e6ed87bbf2b7d6e0535d5f3b919b
SHA25644b75426643a1bf0ce6898124f6cb0b7e08854775cb092e7381442e5029c843c
SHA5120db519eb748c5829dcdd83208012fb7a5facb773c1c0725fd4cf24070d8a78db83a7218859fae329e1127c46c30ccfde8f052438d723c411bba89360e1cb1dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bff1ec1fdf80da849ec4b35d2f0c1f19
SHA119f8512b43d3426ad6ac23b52457584480fdf41e
SHA256e436e7ca936b8d855c1952109424321df1197b3a0f38d1720005bfc181cdb0c0
SHA5127fa1e56f1043e631a2600eb24564a78d394f618e6d310bd7a7f2c35b160dd9bb6ff08fe3f4a52d8180232419888171f11182b589d2d94adbee4e36f66437744c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580611ca7a25675c70897ee0f56a2c4b4
SHA1099ffab1423cf19b32404d5fd141ab33f0a73daf
SHA256add35ecaf5901c8487622cb313d0daf7b6d95ac078eb3bbe3c188d6aa4970115
SHA5129abdbe4234bf4fe2ee0a20f297a904fbab1505ddd84700861d65e6933751ae2a4ad4987b0e523d6c7ba39c2183fc278b6031fea27034680902a5a06741a0d979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7ef2bbe1534fcc787ffcc749e0bc8b
SHA11c51beccdbd96eff7c71d392101722dfd555ce0a
SHA25640a1eafc68ec4d6f9564052f030f8997caadb4576e2b4ffbf2426e47bee9af54
SHA512405ed993d432a28e8b0dd17b524e4013807cc624a26649a40b2fa00006bd11b3e1955ffb3ce4ae35a2dac4ef9ea2319616f1a2a2a91835f4e6e666f40ed01fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58995e68973aa5b2b59693f2482d8a29d
SHA11af858df9a48223e99ce347192f488f679bdc935
SHA256fccb7312ac925d256480a4549528fa37b3f33fa9522e856f8c851f0def020116
SHA51212cc8672c8161d01c5d39314009ebb64e0f575c44c21b9e82b988fd672568dd68f15dc0647ef6d4a8d6ef54b40fb2227f2e836e41dd276695a35b84fccf66553
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8F2AAF31-494F-11EF-AC6D-CE9644F3BBBD}.dat
Filesize5KB
MD50b2fa9e16d61d963be51a512dbb60b3a
SHA1313a1ec116b6bea3ae50571c061cdb097bfc60e2
SHA256a29f15dcabb3e8b2e6007e9c2141775e7d1d9e746b6afecd7bc4946db1b69e00
SHA512f99c8c02e378008f8f89a06af0ff2bf23ce0ceacd7402542de378186f4eafd19385714bf7dba3e3eb62c482965036ee934ba2a1ab015ebce1a47e8bf1e2113ad
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8F325051-494F-11EF-AC6D-CE9644F3BBBD}.dat
Filesize4KB
MD58268f8115699ea0775ac5ee238380e7f
SHA1eef58886531058a65095be649c1532ba9de68190
SHA256fccc89db230aa26d907c577def734cd39654678f79508bd5afdaf573c16e261c
SHA51260ad124309ee299fb4108b954d8cce7a7408f2aa203fbd02e8b66cc7c6036aa5ee1f33ec179a02e2cecfff1343f65e45f696a7cbfdba0c544e9f9586dbed4666
-
Filesize
3KB
MD52fa1fa2e732036044b5e9d5110f48367
SHA1db0b1c0a2701a383e495a76fa3381c86725435c2
SHA2561fea7c0303b217c934223b415079b89b499fd3e9d32599ab51cbfec5984a9981
SHA512cb7581d8418e89a6c2e4c412d3b94c3146aa75e0f234aec2cb8aa10f648b77377366341778bb3ece1a40a7a25c209bf0f407c69258275d5df4a829f7fb39e0e0
-
Filesize
6KB
MD5d3d2f4d65ba6cf393682028b2cff3b70
SHA1b3c442f80790b4eca62e177416a5efe1255da27c
SHA256f37f2d66a848d19892235eb496bcbc346139bc087a3c177b9a6577283ec9ba33
SHA5126b344f15350b8a820430f49fd2c1ef0d66a36f9c4187ced453651d100f3edf210b980733a8d18c62686e1a00d808a262443a399712d8250474adc65bd8506f21
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2UK8J8K8\favicon[1].ico
Filesize3KB
MD575431504e45e9a6cbe94abe910df2d61
SHA1f5017102eeecc57896d27f13f24093663fe518f4
SHA2560e7b448d6bd1929afc573ae93df3901eb20507a295e059f29076dba25dca0e46
SHA512238b3ef8b1161f419ad6143ac5a4d5b78797a6a902f81c06b7c552060ff41efb8e033ac550d6ab9add6b7bb32d4c64d160d5c4000daaed28b23c8d936a3c74a0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b