Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 05:54
Behavioral task
behavioral1
Sample
d5bfd797bffd0d482122f914b16ea6b0_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d5bfd797bffd0d482122f914b16ea6b0_JaffaCakes118.dll
-
Size
218KB
-
MD5
d5bfd797bffd0d482122f914b16ea6b0
-
SHA1
d56c6dbfce4d9bd30a1375c7c21e058e5fc38743
-
SHA256
ecf81ed9fec100e108a655305c8ef4e4386a575a4e280684c516a91caee79dbd
-
SHA512
dfa76bff58300a90ba5059bba8dbcc731676c5e2c91a03bc874c76fa0ed677469daec99073d632120e54e2870e9bd51d566b7efe11b15501d9471dfc9c506d95
-
SSDEEP
3072:qyKGuljBliR1jjx6p0PnlE43EXU1VtlUxRX/um1onTuwcTfeMUXaCZLns9VCr:qfGu9Bkwpud3E+4BqT10feFXaZ98
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2072-1-0x0000000000190000-0x00000000001E9000-memory.dmp upx behavioral1/memory/2072-0-0x0000000000190000-0x00000000001E9000-memory.dmp upx behavioral1/memory/2528-7-0x00000000001E0000-0x0000000000239000-memory.dmp upx behavioral1/memory/2756-10-0x0000000000530000-0x0000000000589000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06f59f97c02db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432023163" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000db345787273603d607ddb90fdfedb68b66d1320a85e88fd71804a65174c5b3e0000000000e80000000020000200000000a5113abf0eb84aa24cf8de1b9d274d75e9557ee4ea24059146cb1c3253b7abb200000009777cdf20928e6d8e0852aa68e92408e423901f93cee9de0cf6d978ea3afd5034000000099eb821d8a22bba90dec915a1b24f85a47939a427d980e9461b3a09e184e16fa5519dcc3522d8b48fe43d919b94b0c506fe72ca2ce56474f14b55ec93f81436b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A2FE431-6E70-11EF-AB3B-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2072 rundll32.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2756 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2072 rundll32.exe 2072 rundll32.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe 2528 notepad.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2852 iexplore.exe 2852 iexplore.exe 2852 iexplore.exe 2852 iexplore.exe 2852 iexplore.exe 2852 iexplore.exe 2852 iexplore.exe 2852 iexplore.exe 2224 ctfmon.exe 2224 ctfmon.exe 2224 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2072 wrote to memory of 3040 2072 rundll32.exe 31 PID 2072 wrote to memory of 3040 2072 rundll32.exe 31 PID 2072 wrote to memory of 3040 2072 rundll32.exe 31 PID 2072 wrote to memory of 3040 2072 rundll32.exe 31 PID 2072 wrote to memory of 2528 2072 rundll32.exe 32 PID 2072 wrote to memory of 2528 2072 rundll32.exe 32 PID 2072 wrote to memory of 2528 2072 rundll32.exe 32 PID 2072 wrote to memory of 2528 2072 rundll32.exe 32 PID 1252 wrote to memory of 2224 1252 explorer.exe 34 PID 1252 wrote to memory of 2224 1252 explorer.exe 34 PID 1252 wrote to memory of 2224 1252 explorer.exe 34 PID 2072 wrote to memory of 2528 2072 rundll32.exe 32 PID 2852 wrote to memory of 2252 2852 iexplore.exe 36 PID 2852 wrote to memory of 2252 2852 iexplore.exe 36 PID 2852 wrote to memory of 2252 2852 iexplore.exe 36 PID 2852 wrote to memory of 2252 2852 iexplore.exe 36 PID 2072 wrote to memory of 2756 2072 rundll32.exe 37 PID 2072 wrote to memory of 2756 2072 rundll32.exe 37 PID 2072 wrote to memory of 2756 2072 rundll32.exe 37 PID 2072 wrote to memory of 2756 2072 rundll32.exe 37 PID 2072 wrote to memory of 2756 2072 rundll32.exe 37 PID 2072 wrote to memory of 2852 2072 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5bfd797bffd0d482122f914b16ea6b0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5bfd797bffd0d482122f914b16ea6b0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:3040
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2224
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4c9d50d31ae676096a51d14a3f86009
SHA16023e2045b17103f421acdb4cce758580c300eda
SHA256ee428c99db8eac77caf9b0caa4d8476f4d4699959a84c9c82a091f094133af19
SHA51246854ed808929521d9d269bed0a6bc564666d8633343c00b7fa4bfb49bd3850619d3c9f1f6e933711c8c75bc4b6daf9e5ec8185307aa28bb5a7444fe080b7025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b82a70f2f61b973f9835bbc002a674c
SHA12e1d65470c01cd69cf4f9d81a5fc9ef573f336a0
SHA2566732dd7816ca51b45cb1b570c1467ff423600528ee3dd3c4495893de85a4ec61
SHA51223c7cef636871bd6572724fc286896cb9a1fd9525976def9f9f0aa43027d4dfdd2f56ad0dd4246531047d48cb62e36c2c82d934bee87cad17d53db795f90212a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f84a90117d2fb7cef4d04549dcac87
SHA1a43903afde3acccc752160e4108b39378c7a5adc
SHA25665131875bec0939cde30c9ac44f7a12950bd8d2d126856731a8c34b87b857fd7
SHA512d91f5ceb2ef15f5736f17761f6bdd6f61bd5c7902d1d4b1ab971bd15b58c326b672a4467692e4191c59f252dce61536ae0f0a53c0e446859ca97f15e5fda9c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563954aa04b159a8aea98b196ae1aed6c
SHA12db209fe6ab4d36502c425af2473e6713aa7ac4f
SHA2565bbf66330f971f375cd9188779d7df40341ce246c49ae5f10618caf55e8f0387
SHA512ef7f5b4136333df20f327ff31fe77d0dabdd31fad73eced31c4ec3a7fff605c7ba60a71911265fc995ea05c1ce2a6efe2053fb070350af6a32d6c087a83b0063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b8532b4a589bf7e1194de06933a99c
SHA1633689956b2ca87e7f4f02547e631433e03632ec
SHA2564c9c2f838bc51d3e37f9ffc18f9cd81f0aa502125261817cc8f829930e01bac2
SHA512f4542d3a825bef4541fa1d3fb7fb7bdb4365c8271c5166b499069104c6c8993c02ac83f05a638fca79bbd46c01552a8477865fd1679aa8c37e426cd38c58fe47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556df8be27e6405c78328c5fc138af171
SHA1e7dbfa016c0f1fa722b7f776e571b64a4e4dbb9d
SHA256d46d8b5028834e5c933f12de07c9631b4c60f29a24b3db19431817ee6fa079b7
SHA512824d4b8d91cbf686781b477dca12f47b6bd70e0b6f244bf6cc1f17ac5283b6db2a3fff4e46560bfe1657c72a138090b6040baae5052cd0f314d39c411a1b36ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a92943979b19de29e7a05a296961cbc
SHA1dd71e62d220bcf6fbfe9309eb0acd41bc07e81ae
SHA2560e08fce68b85bf09b493b0170d0810ce63afce23c18df17f514ec0b23cf6d603
SHA512f7d8db8796f9119299cb1ed3ca2a2b7db45692788878f9465f97b164dce1726031b405d215c640f31eda844403212c58b8290c8d2a073ae993de1bb841814de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f60211c9fd6479365ae2c3b5805fa72
SHA190f1bc06c81d866f30392cf4337a71a69a74d00c
SHA25653dd979c69412e4352d898a31c7def06bf852bc10136cc19b35f671711be14c6
SHA51200360dd60196043d6b206e1cae4855cccf8fcfae1ec9cc8e3dd1ff9bdb7682437af65f573c1ff59c1c7f55ec98a7881aefb5579554345345c8005d2ed216a635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d07dee05b76c34fb67429e20f188dbd
SHA19ebd29f6523ffd5e499fd6146da8dbfbb5f475d9
SHA2562a7d1cf6214780dcc9c6b35abe8095b81a25bc327033554ba72da789afae655d
SHA5124f503918c7b1fecde11a302201a8316af03d5aa28c0c4881dacb573da22e2c4e9ad6e6ac3ebb158c973c74dee01a97cae4d58ad642e662b6da7f5178d2cffd09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8cbdec328b430f21860551a7196e5d
SHA104b17045644e90458db26940ccf3e12e75c72ce0
SHA25635c2476b37235d929b49d7dff63dd4887349c31b7ba9f4078775736cb432d326
SHA51273d026bbee198c5c644b479f84849e09732a51ea261d421dca38140e5ac56f827ae668c8349ef8ad728bc9471e360f54dc17c8d70929a29496c8c13bce528445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523fce2c25b5e85642a96721551256d81
SHA148cf35306ac2e2f9e74dc56e1422f1b77fd1f94f
SHA256c8084c82e626690288f8a4636d3e87aca48e10f434e18e7acb16d7255742b588
SHA512bfb9ead93fc156a69f29f51a47efe8ce47f653b1f198ec475c55ce3d733771a29dc3bc4a259d94aa0d96c0de4d8c17ee383c2ee419e9f9267ea78ef03d1fcb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a4dcfdfa4db091547bd63ccb317b4f
SHA162cf16c229cc4624474d5b80f7cd3a3b83a664d5
SHA2567fe7b74bd138d2249dca0052b81a6a71fb29413919884e443467eefcaf130d9e
SHA51259f736e88931634a64f67d088eb94cc2d616c54c98b741080846ebd72e7ac11937c7976ed484147cef8208f3d3215b2f32f325760a94c698521f79845edc9821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54602691c6616df097519acf96eb0b072
SHA1d9d6e665d5bd63049b44255bb46371ef4a91d214
SHA256fcb87107a35ef221eeb5543aa1eb4751160c154fc04bc219972a49f9554b6e24
SHA512c31328a2b19eedb7ed333791211adc45a5ea29255603677a11a9f7c7575ca45f21add7c57ea67d16048f06012dd5108046a2d47cc9ba7af6a496842939aee655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5371b683e9d2f50f6cf33e468a02a486a
SHA1af17bc0d4d5432bbad847145631e3a528f5851bd
SHA256554a34a69ecad847de1a9aef0979332f394727dec28be438cb026909cee13802
SHA5127b62514864b4fe21ec6ea479d90aeaabd3ee4d0d8be6025f8403ef0b42d61786d86a7d2e5e0448d096685bf305b13ffbaacf31a47677a379c3618474ba7a6781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574841b953b823c1f48d35d94798ccfe7
SHA1cec3001a0bfd9e3533efa34a470ca968a7592a74
SHA25652ba90e0fae9643e82b4dbf6559a724b4789fe7e05153aa5db123b9128a6a047
SHA51255a81155d814479dd2d8a8b199efcabf1501e6432818e7d2720df165cdc5da588e7dfc5de4eec505d3a1a0c73489a64180e092213e836b2f255a94f784b0af32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5533a93ab6e359903171de8a16f3d184c
SHA1a43278eff9d4089be61ba917fe5252cdf1528b01
SHA256ba753c51e673d92d55f86058b76c312ef25461b1b06bdc8692fd539c0f1bbb51
SHA512065dc22ca99e10f5e082a80bf10bc947ee6447f06eb5bdc0c48a668f7843fd414e98d88c4445f06f3d6ec2271ecdadd4578ed47b2ec74cb348368cf84f7d0f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af4c55982a38c6c12c822108449978f5
SHA18dadc5ab104acf8dba9b5fe44195f160d5368136
SHA2565d38800781be285c4edd5c65924211173b4ecb1d587a11e92c074aaff9fb3859
SHA512be3171443d1bca8b19538aecb4087ddc729028078789e585193f76ad762c008c3b8d764d189995ad4cb0fd51efb346607aed0593d274b4c9141bd39113f9c595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297e1356ecd1f020087746b3c8bf6d0a
SHA145a5d36cc38f85156da5a0644b7fb63421d3d0d1
SHA2566723e5fabbcadb47d538322e580b9a75ce29a1c1401ed9f2c7427bcaccc137ed
SHA5122484eb8a361219ed2e1996181371d4e1d11327a3f0f65db67fd35e3f2eee2aada4459602151b9485cb68f9a64d6432a28f8e78c98458d72b5a238118e8234078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6050b7f176d3916a21f04809b9dbc3
SHA15e9bdbaa6ca891bca3773d670770f220f592672c
SHA25634dbc97e60a16be3e4ede547264b25fda92b031ddbb3442f5f68f2b5833f1622
SHA512f718d2f4cfaccee2502559331434127af7ce9e956e23a4822795b22f979336c40670fb682b183adec08bef7a2bd73430765c786daec769e0f8be83a851481b98
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b