Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
ead5d26dc159f712880d2bac6f98d936_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
ead5d26dc159f712880d2bac6f98d936_JaffaCakes118.dll
-
Size
199KB
-
MD5
ead5d26dc159f712880d2bac6f98d936
-
SHA1
f5102c294429f08ebb36fd5c7e50c1d2c259712b
-
SHA256
ffddf58d1a5c87376b48b433c4035f6e2797893f8d839e195256e900306ebf91
-
SHA512
b2e8587e5674a688ea09fc3a68c26c1681ec4973e9a70710ad2bc37a356ce4bd3bcffa2c73bea36d0a0b2cd18411ef215d540066682cf71714ae49b1ffb34256
-
SSDEEP
3072:1I3QR72a/FHs6FAM2f9irM1Xd5YaiReijmPF3q3WUuy0M1BjLeJs8sHF5:13/Fef9AM1X+/yPdqmUuq1BOJZk
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432892196" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000508c2e1f8d7b793a40f212ee208f691a0b2f431ba8de15d588cf7c41431f6cc6000000000e800000000200002000000098d36263845d28161363c418d548893f8f4ab8615f88722b2620b29c101befde200000000bc3b0d2bd8632303ac4c64572e95f4e50efb25e13877217cf4992c1596180c840000000bbdf362378812c7721d518696905d1dec3be85b017c75212bc6781dbe4d7eca94fd8b6a5ba0dc17e741a07d856297a2a9a2107bbe4f3521ae5613b267bb2ee5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d6035a640adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6AB1CBE1-7657-11EF-869D-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 rundll32.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2628 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2512 rundll32.exe 2512 rundll32.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe 2312 notepad.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2752 iexplore.exe 2752 iexplore.exe 2752 iexplore.exe 2752 iexplore.exe 2752 iexplore.exe 2752 iexplore.exe 2752 iexplore.exe 2752 iexplore.exe 2752 iexplore.exe 2752 iexplore.exe 2468 ctfmon.exe 2468 ctfmon.exe 2468 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2752 iexplore.exe 2752 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2512 wrote to memory of 2320 2512 rundll32.exe 31 PID 2512 wrote to memory of 2320 2512 rundll32.exe 31 PID 2512 wrote to memory of 2320 2512 rundll32.exe 31 PID 2512 wrote to memory of 2320 2512 rundll32.exe 31 PID 2512 wrote to memory of 2312 2512 rundll32.exe 32 PID 2512 wrote to memory of 2312 2512 rundll32.exe 32 PID 2512 wrote to memory of 2312 2512 rundll32.exe 32 PID 2512 wrote to memory of 2312 2512 rundll32.exe 32 PID 1492 wrote to memory of 2468 1492 explorer.exe 34 PID 1492 wrote to memory of 2468 1492 explorer.exe 34 PID 1492 wrote to memory of 2468 1492 explorer.exe 34 PID 2512 wrote to memory of 2312 2512 rundll32.exe 32 PID 2752 wrote to memory of 2408 2752 iexplore.exe 36 PID 2752 wrote to memory of 2408 2752 iexplore.exe 36 PID 2752 wrote to memory of 2408 2752 iexplore.exe 36 PID 2752 wrote to memory of 2408 2752 iexplore.exe 36 PID 2512 wrote to memory of 2628 2512 rundll32.exe 37 PID 2512 wrote to memory of 2628 2512 rundll32.exe 37 PID 2512 wrote to memory of 2628 2512 rundll32.exe 37 PID 2512 wrote to memory of 2628 2512 rundll32.exe 37 PID 2512 wrote to memory of 2628 2512 rundll32.exe 37 PID 2512 wrote to memory of 2752 2512 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ead5d26dc159f712880d2bac6f98d936_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ead5d26dc159f712880d2bac6f98d936_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2320
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2468
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c8f5666eef59e83bbfa2d3128a2c0e
SHA1ad057cf04547cd12514dc0b687754967366caf0d
SHA2560207ad95e9b9b8fac69873650985fcf800435fbd2a52470bbe0f67bec4885820
SHA5121558725c6cef566d61ed31526805c669b7990450f2017be8aab32292d5a4b3e68e32054865d8c857135b8ad229418f8ea87babe29e77d5f9f4c005afbe6aabd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df371b508a050396347d83f53c7246ac
SHA15e081904fdcf386825de105a04da013ef38814bc
SHA256878905371636ba09c18fdf02772cceaed092ddf9eaaaf5314e06ed78f510a4dc
SHA512a282b04ea5534d4bc9546c43e29a3d2552c70000d9c92970714b1b4e21164c1f06a8a5885b9d157b3aa45ab82b4e096c5a2428e59453d8d02ead9857b7fbc5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2b4e4e7a8dffff5d78d2aa296c8fdc
SHA17791591ee6b640063e2c065edebb691dcb5ccc3d
SHA256cefb8839665963e904d3bdec26f22f6107cc3c33906c2d5b9e941c85df6b1ef8
SHA5128360659d279c474392ae8c7920eb4b1eb77b2744be95637b24f527d3dfb1f69e73610d1042ce36895eacbb1b3908a18e13e51593262893ae8662364e98e60c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509173790d6c8ff48abb476f4b8cb5c7b
SHA1937c3542c51ec95940e9e06e311d5532b88c9091
SHA256e49d81551a024f93db87884ef8c1ba1cf8ab2324a07164a9ec002c0897b5596b
SHA512824a152d529e8052aaf83fa5a296b970407d5c4f9d4465359479242049f49d2cde56a6d73c5deb41611b90f702e31f2b1b4bed53802f58d96a494993ce8068a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534e1c1a4dbd71941a0ca3973a2296c6b
SHA14acc270fe6eca0b62dcb60edd3dc8cb6921053bf
SHA25679d5ce72c4579a89921eaa1a00ee5745ef32a5cebd230b4f19532830d0c8ee7d
SHA512069c3ce0732fb86c51bf8706ec029cfa00aad670a53771965ee1d78d1b1a31930d2ebabf19721dc005373d7e87a4720b3f8e5c0d5cf184df21a270d81e078bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa594fa6747029264018d3d1d16b06e7
SHA16d4ecb0d559479ef4422ae7ac862155aa4f1aa20
SHA2565e1a65ffe5e01e851bb19c1e2897ef3609ca98c7d5bcda051d1114e8d92343ab
SHA512c4a3253c1f8ae65130ac6dc8d5bcd8a7833229fba106053fc2b61069f97af3aeeb63ebaea67cbaee0c7fd9ec7f061f3e6abaf90ac5727a809760e9fea34cedf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502550efc77ebbefa4e7552e827ec6558
SHA190910da4189e9640436867bfd6b248b235304508
SHA256d94f61807c1a500b88364e3906914cf6f3d251664dd40ad87339448a17a25cce
SHA512f62a0dbeff92d20b31645ac35061ea52dc6498a2ecfc5f5c76c5f44a899e7955ec05a4c9d77a2987aea4177e504408082b56158cb27a40aafd23fb2d6153d073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0447c4657827357e32e53a6fe151d3a
SHA1ab2ff8c9003dbff872155db70149043374a5fcaa
SHA2566206f258a8b9b83c16fa569c7f576f418f07e168195d4bc8c240087b7347c5e9
SHA512c63331421c22735b53daec316f16e62bd58e48ee65d280c88c326db5f272025f18802eced51faaa4af8bf97022c0cff79b6c5643c5d7d6fb2c718d80085b1ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a78ca040cdf0f4083127f273b90db039
SHA126626dfe688793e3e4f9e84433e8c7dfb9001780
SHA2564ef033b46be6d2d429f8de6e8546daa4fd8faea36f7739f4043e7ec79a89109d
SHA51272ff4275199a74ac0b3704c152cc4873e626f9ccc591f784faafd689be61a0980b329a3fd256f61cac833118db7fbd0d0ea777d0252f1d78675db85889b3c028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567dddd96e1e0269d4a28cb84ca3476a7
SHA105ede526c1bb586e9b22027f5f3f4c86e64e813b
SHA256aaae1fceab0b533a34884b793a26cd27835ed6ddd3cb1b9e8c8ffa96f68ba977
SHA512f0ab99dd5e990076665a48af4119dc1f48b650ab6018cb48e81cb2cab41bdaa557137e7f6e8bf77d98b32c878555fa141764b1fd44e52badb59b88d4036756c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cc94a81f51068cd8bb81f5cab33ee44
SHA15eaf5dedf68d72acf276333789d19b9e5a2cbf67
SHA256389f6b87b1040d6310cbf9b6b0663b8e621e66b6cbf3485cc6a1aeca5c7b8fd6
SHA51248c61ea81a28a445ee570d5de82529873151e97b9e9b98a80078cd8ae033c8b4e6ede6cdaa08be5818f99010e03b90b2c2df4778d3c5e0e64e5ca54f8056118c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57640390c0ccc306eb421be88f0f18b87
SHA1bd008e7e87c41552490cf2a8d3963e92b4c91fee
SHA256b3f012a2c2ea398f1253a115b49bbaaa6fe6a66cae9fc31183d1e4609483b555
SHA5129b512f0c1d42325424bccede59c372cb291a38a45469520c6ebef78e97e8114ff544c490d7cee11a24efaa81164a7b5280cdf677463a01e99ccc652a1b2c3416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e5dc736ef2b20354b9c84c61fc59a0
SHA125a08a911a75f1bf15813b215fc209e903d23a00
SHA256fa191ac491601f025b40791678fc69a79efede694a9988bb663b66c850a3d0d0
SHA5127b987dc8dc5ca0040d7a722395170784fa174eed1d156abd4455294204b4ed937eba42fece8f2fce1b097d1c04108a7a42f23ea2fd8d7e8710af1840e648ccb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5732d534a39b5570de92eff5471bc4b91
SHA17b30360ea7718886768a7d7449a91f76e1b55ea6
SHA2568269bacabdb4baf65c418197af201b0e93f65f4bcf0aad510d63385687745077
SHA51259da4ea623f0b37c0712431eb83bb0c9f1decf26aec0212441328dda14698ce1ad706c9d3499ea7cc869c18485dbcbf348eaf3ec24151df3fcf4d3102d3b58d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4c6deee2940164d6e8f04d1adfc91e5
SHA14ddcf1a753f82a42d4cc70ea8ed1be3b87cf2944
SHA256559f1e4d719f751628cdd9ab071572dc17a6b504ba4072354f86a5fd359d1021
SHA512dbe81c251b053b4e044df698541c30d7b53976f20ab37341183df1ba2b8acc5f2564128a2cdc21b355e381c19b85dd3e2b4dd0842a359bbf15931a2ad303099d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a376ea9c5e3aa0406932e972ff0fc08
SHA130ba2c836cc741ec25647299d899d769c7fa3487
SHA25687efbc18c389aca51a720f8de5e4e5d1c0c38842972b803b6984410fd258c33f
SHA512b63edabe0519bdf8837b8eeebd61cba45709476ab9eb037d3f363dabd38a668fef3fd06283a60f0f98fc37d1649186b2d32ed4e2950c373d3a576cf1a777ef34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589623c749fe6953b4163957bd5a7c2eb
SHA182c0fd592c5d716c76503603061b6f542f1318b6
SHA256dfa95b6bebe4eb09718f5eaf3d3f151b47b0dea099551ea6fd135598ef392516
SHA5120d4014db404e3333686b1c037b059da8739f186a567e5fb36d9bef7af242ea6f8928e2acd9ba06ec10d30c39d9e69fe5e149787405433c3141cd6cab6b60edfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e02e64db92afaf72616c86e8b176fd9
SHA14c7374094dc8ae891f323cc9e7afac13ce77d723
SHA256dddf3b756be82240c6feb2dfacd31054c6d8c33e9ac9dd4d33550e2c903c92a6
SHA512674612c59c870e25b627e592c3aab1215280e1a5760bb7356135a0dc07565127afa7aee0277c85f1cc7880791bad40730d9e39660f51e3e27d9ecf91142c1dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5897c40d57e89ec6070334a9eb9c2303f
SHA12e31306e9b7646b4c469d9e742573a8555a92cee
SHA256f830f8727e03ef1edb07cf4d8503b13268116be0df927617406be06cc09e8a0e
SHA512576fb45c68fea5edef2c270dda2e9937e4aaa8392983718a42588e4bbacfeffd8b5fca8e6ec8def9948730024301524cae30a1d7d56682b3b25dc216d982fa82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57543408a95b0536e2ca5bf8f2129ea34
SHA15f2c0aef5ba5d1e51281783a81957c591e6efb08
SHA256a254b4d76c5047c2c5d2bdaed93765b227ca2f162bdeaa8f6abaa9f7a1061957
SHA512e44a043f3e2ef0fbd34c66ea8bf24b4baf9b0052f3e6e06ffe3c91f63f627adc96666fea5706f0338dafb1175b74b8e68633f758146077093db7ddee05c25e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57250c55ffd7b3581defa31669e346d5f
SHA13cd899b6be1d9ac2be0db154b55b08da1a19a255
SHA256aad9a4d13e7c0f3853699a5b6979e4851568c53353c9cec2e2ecb61e1d60baa7
SHA5129d665333fd032827fb29ec8f57a765fdf63fed88013e4f54ccd1eb742441669415b90cc76f59ecc22366e58037d69b823442024e2e58f9623e17f696ed0b8b3c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b