Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe
-
Size
5.0MB
-
MD5
0d9ddb184039ff999e81ef7b60ab58f8
-
SHA1
8a37520bff1d9835af624a2c8fd3394a2d1777c1
-
SHA256
abd15b81597018a7c433492d496317942e07935f249da14b9bfc95a813df3585
-
SHA512
9f9e7e73c3ed0323b602e8113f9a1e9430eaf732e70c0f7ce998998f56a96ceb742731743fef43d41be1e6700fa4ce4c4f2d21154b1aa5d1ede300aee623febe
-
SSDEEP
98304:qRgk0xOXhMUjwbRDXoI7GuS9/bYVZ0FX8Ipaky:ag98dcbRDXoI7TS9/W2xL
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: 0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe File opened (read-only) \??\F: 0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2188 0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\copytrans.net IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90507f624115db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434086684" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CFAC571-8134-11EF-A4A7-66E045FF78A1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\copytrans.net\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003c96689268f6e449a34820013d57e948fc5ad45615929325b8e7bce694f70b66000000000e800000000200002000000024eb148e7eedfd4122747fe320a6e95cd8236dba9b9c10c026bfc25476fa643520000000de27a2279029837ba87b4a42c3b79ddf547929841ec21e104ba97735afa5c8d4400000000d2e2dc0197b6cd9563e0d5752d3505970cc9d3a2ca1ef1bf56b2c217030fabc35b5d93947677e9bd39c142c368e06d3a02ca339a214180b015b0bc85e1b3a77 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2188 0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 1892 IEXPLORE.EXE 1892 IEXPLORE.EXE 1892 IEXPLORE.EXE 1892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2524 2188 0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2524 2188 0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2524 2188 0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2524 2188 0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe 30 PID 2524 wrote to memory of 1892 2524 iexplore.exe 31 PID 2524 wrote to memory of 1892 2524 iexplore.exe 31 PID 2524 wrote to memory of 1892 2524 iexplore.exe 31 PID 2524 wrote to memory of 1892 2524 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.copytrans.net/support.php?utm_source=CTP&utm_medium=software&utm_campaign=CTP&utm_nooverride=1&topic=ris2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57c4281425f6963222ac716987f899d96
SHA18bcf8cb3b2e16e3fb7a566b175fb77aafefa0894
SHA256494c5309d4639870c4abefec19bf6ab3d4352cb2e7cfcc406cf51c613a1275e3
SHA512c1a73445276bc5b2937284fb1a8abdd7b53fb78fc7fde968a0f0028550c2b2c9a3a9289ded668424164e25fa8537260502097b88c791f401e727b9de5d9182bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD50afc9f738e91a9ba8ef8c82c3c39de2f
SHA19a356673d8a6eba551dd82cf43c50de8efff54b2
SHA2563bd8384028a6f47b59686f4fec36e0689b2565ab6ab4f55264be07c6999815cf
SHA512143f05f64fd8975d6f7ddb35a4aaceba991414905d1be9d0a94be102d7075677022adb2693dd6fb8201fe22014291ba5252024929f50d515ad871ce5e954806b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba7e0f8d1193bfd22384d54c8060521
SHA138cf5076ed8dc088fd8de8e87bdb3489e3fffa78
SHA2561888ecf1a8029864cde36b9b378928f29fbca94892f4e89677662a318a9781fc
SHA51296f732d7eb1b24b5a7e6678d8209599d20e4d1db78e29082696836ae18abce82c00e6472add970700e882dfcac996a93b03e2b86d0d5663d8b30f99c733f50a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562d5b0c142e50f8e54cefcf81fafb449
SHA18af6621a7549d055f28fe02d13f5e9023c64731a
SHA256f6782742f3ab4fbc13f8ef53d8c2e2e327839641809ffb05a9b2212e0c33cdb7
SHA5127c103ed49cdd65c518b0c3a773e77170e589a9ed521bb13f31fb5d443deb080001e817c0752f2766a397f91b63a16bc66d7b9e115d45e41709c8e21f94659b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdbee4a53b116231239b4deaaafa499f
SHA123e31d1f1df7330e83419340681b92745e47f7fd
SHA2560748c988b6f1f4630a4c910d016e3bb67547cd49c5c1234959b851a2ece91cde
SHA512c664246acf041a0c5733e2c48ccec4d74bbcc6e9916f02b1268165985c1bedcac6b9d9d78f7f39313e9da89a86c87048421fd779af11a479cb1d23069ffa30f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523458280b64a8e9b6d9eefd085981baa
SHA1da56d7e1794aebf548a18db6e6cc2d1731e56967
SHA256c24482c5f38e86b7ef27f9861659a298629dc9996bc9edab74ed069fb4eb9be0
SHA512d5ced4a88efb4ed5c424e830c50b4949cba5ba31448b4e2674055e681a78e416f1858e899d0a899dccc88bf8a9d403127f0f00ff4519980a74a94ac6eb6e78bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf077628f9bc6ea6d12866697d236c0
SHA1a2797e70732301614b79c5a9835e39f964c0748b
SHA2562469fe4283fa08fc6059212a40bb9d83e075cb18853af88b01f1c3f9ad740a1c
SHA512dc868cb608786a736c7f03d24a7b3e18d6193480b30c7cb0fc03534f5861300aeee39d742232f0c4179ecae50fa1bfd92e8d68dd8da8300cc7e7e5bac2a03a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fc09ce1fab9a13201af3edf50a305a
SHA112b431fb2389bc0b9312878b340173f13a258079
SHA2561add9b7d282ec84242814760dc52585b80bf0270713e7f30f4852bf01f0699ca
SHA51225183560541dff242a576a8fab1e4b56b9af42569683b38c2dd2b8b9c9435db157aad4f06fd712a8cb0754f48ff44a9b3d223a5a53e80ce8b22e9aaa3f016247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556da6e70bae2817da2a13135e2f2b0d2
SHA1bc130b65a023a3020127cdcc9b08365110cd0122
SHA256bc13f65558dee344d817ef7b3c1b20c3cbc545e420fa9a74532d487df3910058
SHA512d87b0b4aafb6dd7ba446d9e0633020c24329a87b81d28a825228967534b6b17342fd541f21844ab66ea731f9ec94d46c0b5e78f04855b6590f2d6116697683af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a6ec52d0de1d8fa7ce8b4460d1971c
SHA1baaa7f533109db443c3b8efab5938864578a7e8a
SHA2560c02af8dcc146e195223668e916e083d63cb13687a1d013fdb85374a87ae5ac9
SHA512662882296d990c664acfc42f065ebd2caa9d2218f23943d1e1714d886cd78e3194335c69bf09ba877e1a6fccd9eb52a239b2fdb296bcc15fe99023a701a2f187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dcfa835f3aad2280292365d517c6a21
SHA13b32b12bf22b627b288ec12e6d9eeff6c1ccb2f7
SHA2561d120f69a66503e1600e1ef469c95c0ff281cc262963455f570611af8b05208c
SHA51219d4cc66f212108a2b9b03b7a54fd2d063648e3f6764fdb7e5e54971b473fe4bca38225ea38793a41066c2d8d516e5c78d37741f23a1f3d85fa783d3bff6c4f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ed4722dc4bfe40c6a6e6395c48e948
SHA1da25ddfff49b64c54355a703d08a432e2551fbdc
SHA25611484f5f7fbd85de3d856dd1f77fc14ecdd1b31b93b04e2c4dab4a978496fe5d
SHA512074e23c7c2d120e208a788727642d45d287006ef5665732dedd219b86dafd7d5c67f85dfd0524af483dfdef23729192c74b7a4c88d345ccdcf9b6e323c85d1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db90a7640542e006b007a1fff8b4f21f
SHA1f5d25f8c0c6b98c0a9d8c1e14e421a34e393083a
SHA256494e380e96171ac7fb9d49d0a1abbc08131a080689bcf90a673662420c14ad33
SHA512cb617803d1c4eb4de366aca436d8f4da448c04de18c4ef319882931f40b927e7ac209adef402eade8788b29b74c5454280a332752dc4d95a8b77f47e263f828c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f6382ee6866334297abaca6b6c9737e
SHA1269e22900b21235c9bc87fd9cc6546ed8ac711a6
SHA25603140b175ab4f04f40854e2c0d2f7bd930645b154159b8eb9195a78b69363703
SHA5123a8d2382d9a1804c043f6e3babb34f865af1e467be56163cd940b3ff06a7dd7b89acb5281cb8fbd5c3751e0fb4b9d09525ff22f45f6ae2b7b2f060165e163541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976ac4707b827667cee53f44e30c5fd5
SHA1759b2fe1238a3d8a22b951944d93d3f17b60e194
SHA256ed10c363f9fbd55ff39419c68f10d86a405e29a88d8157a7222456b029e8425b
SHA51263a7d96f56448dcb5450be2f03d747fa69238cacb11568c14142c0487abe08f7183760a7d0d4a7769220aaeb582d1d424b3dae39eb1ce7c6542c9b6fb163658d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5439b95bdf87bf4efe5dcb94c30e0fe6f
SHA11e7419c87548d5e3f2c920ca38ee0eaa2e408071
SHA256f4fa0dc629b15216d0e56d1fb2d8ac6c701fa94c30780089c9ca042881d592e3
SHA512ffc4e7a06b1409a44de56e4a89402f0c58e21b136eb5fdcc7cc81139b6dbfb3c62c8d2f94a82e366e4e770f8f4cb83d9bce633adf17d259da86be1b38476f7ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd24d818f5ba93d0325e5534ad75ee30
SHA13010875c3838be1389c76666d8f68aa24bd702f0
SHA25618acf77d67987d1c27ecc841d514d46c8a82d4d40a5cd61a137f9667c114aac0
SHA51288b3f93a1d2335dde34aadfc6e9135e10e535d4c21b147463025c2862d7ba95b3523ac5d512eedf37f2a020b10632fcca2323cff462d46e1070a1b806b36bf40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8dede34526f3f6084c155a4446c603
SHA125f58fa9b8487c354ba83b78e76aefae85f0df1f
SHA2565cadac315e8a10e7b65554ef739b7bb6eb267822cf7c57c8f3c1aaf3fcab56a0
SHA51263d26ed24e920aa3c585ab78309a076ff07d347360aea10f2febfcfb1cd0f10cf61ea80502602af5edd5b636a2afb5518f91abd9b80761e86e6189d1ed369c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53164efd01cf80e55dcc464b1ba589374
SHA1c71e1273f536e1bb4fb6f1608738326e13cab9e4
SHA256f1740b12c68b0198b55db10b1186dee2a68d0afdf3a6834c02bafafe83eb7b75
SHA512d988c8e045c0e91d02f8ee860b2b5820e875f3955d8190006cf53dd5c1c432e3c2f051278762c091babba6b9b7a2ad8b5fd312708392de7717cb49bf447c4566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cefb6b9bd2dec1909f105b1da9161a9
SHA17ef146fdd245061b63bc48f5280eaf1a0663decf
SHA2563a746e007a0d3b05997f4c1cbb2e5182bc3dd2ae97cfab6645bf3219e95acd77
SHA512e31f2744ae63e6ee562d85063ce56cadd66958b27ce50feb2ad9423bc0c0829d148d922fa94bbe8b38c77da9fae5b05ca12d030bb00ee07cf1dc443436c82407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f5c46e8ca083ee21b425df8b293c66
SHA14ca9bb88442b90f5107e67b3a886405a0e8929c7
SHA256e7191f397d8f89d2c21f475184129008adcdbad61164458a4dfb2dacc18da8eb
SHA5123c96ae2fa7e7b51765e9386999754d0a5776a4eeb62180d6e81dafc089203f8397d65438bbbd4e5361ab2f8052f4579267b78e5103b83e85ce703b23696ab832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368b0dd295f9b514fe41f423c671fd59
SHA11a0bbe846158add21f9456535dee512a27ac10f3
SHA256842e34e189fece2d70184205015694416a480f98d9ab5413d2ac640676d76acb
SHA51247e25ebfe811e1a5f2c8edf05a1a288c9734b2c23e6c1d5c2ce7452148a533878ab13f1e6dad7cf6a0e297d66230cf86c9bfda8476835fb6c9a8e508eab9fe1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01159e0e7048748f249d02d4cca0cab
SHA1c7d0f813746b88d6f28d5cc7983c6aed8dd187b0
SHA2563cc75a166e1e82db2dd05ab49074ca4cb13613c2dd84b97d51aacc608d75a4a7
SHA5121e466a8a4ce4b0e1ef655699b8de512278d75d6c5604444ac0bb183e5853c8cc4d20b0219af4b6739ddb6d3ca16d727e4a72f6ae84fc566187a8181205a9c2c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a8908ceb920e9afe3bf6167ab0f1b7a
SHA1860a32e88f5d7ebcfd54f21f00c31cd116df1f52
SHA256846a74c41b7079a9b55e2ae062afd504733ba13ce996906a808857d7488f3e8d
SHA512d23a7fad35fb6065a5ce2a3fce987e39d6864af2a0d5e7403975d8ef86db6dabf658f5aae0916deeb1da2b5ed5ca37fdc5ed3e756cb5c69b876708bb2957fb1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD596f7d844dc5be7da3b96b95b2b7baec0
SHA19e1cae62091931ff285d198d0531c67f3f26cd0d
SHA256877edb7820e234bf719519fbc323fc624d91ce88ff1d41f3d63caccce4b42cd1
SHA5128a58e3cbe25e6ff265890671d01715d6d322d48c5bb9f6536e4e8d2eb7a195c1477c528b7692244b46de4e3c9ef2f25a7d52cb13732331c53cb6eba3e0516b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e9a3ca4a0524d8461754fec0f42a1eb5
SHA138919812e972417a34df652331eafd7aadadbd5d
SHA2568e68905da2177bc05fc06c8076c3bac4c5a19d0284599e2061c6faf619d1368c
SHA5120ac19ddecc254523353cdfa9663f244b1c13887b2eca2d93195473eff5c15828ccf682ac35baeb2fa1296da0cf0a2df4fcd22b98e723039c568a95f1c3fe8e42
-
Filesize
15KB
MD5e5255aa440afe5e978774fe27cb33c54
SHA12b183a397b9e8ec510939ad2072e55937cd19bf7
SHA2563c07dd53ece273085d719062ff1bcc894c3a078dcfcecfc0867392c2b1386d50
SHA512f608820c4e05e7c22d2ae2369160ce2ce647b877c15167dab6e127bc657f2e65043b7091b3c4204ce50676f5108648cf1103bbc076a798012338209545715f15
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\favicon[1].ico
Filesize15KB
MD5fb4b00bcc6c50e11ff150cbea4070797
SHA1e693c7280d83bb70c82b54ebfa27578b184bbf86
SHA256373de346a463f5151af3cfe8a5cfedfd63c6067eeeeb50c0d0eb1669e3d8a51c
SHA5127a4651c7367c4c55cda8570d1a366438eb6d8240660d4e5c5bbbe372f299442706a9776939e33f7813dbd3571780a0aa429866f152334c17fc283fc000cad53f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b