Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe
-
Size
71KB
-
MD5
1089ca24f198dea7ea70b3c393f1e1cd
-
SHA1
84e9fd0de3b92ffdd1af7fda2734cba6d989b25a
-
SHA256
b667caf294dfc1ec9073576d84e40504659ba8cfb28b57d861d08ceb492f4f92
-
SHA512
1d9bce6ef0d287cbdcd95d6c941b17d541547f766abdd0c6d641d4c7feec5bd5e1bc9767a5f9fa50ee497a9e9539b34798174e9754c931571216d78e9fd92630
-
SSDEEP
1536:FyUiHm6t2cswngVAqqmqes6Kflbt4xon1txbxNwc2bdqThFgQ+0iOR9:F9i3Jswng1hIFlbtWo1fbxNwc2ZqThFj
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c474cdd915db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434152148" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000c578bedafa82915f97dbe2c58933d8d5b9b901c7dcdfcba5b6b2df4d9249d11c000000000e8000000002000020000000b1ebb8778c1bbaf26ba47cf6939b11e74d3ff30e27eadfddebb88f4f815a31549000000039ff859877b7632334980a84e7e80c7a8ebc6a3e7fcb3bfeca1cda68b1ea88345d8fee44eb434ac857a8732a950ae8201940f9e24068527671978204e1cd55f60fd2afcd9141e3b0dec64bb37302daecab38c53e879a69f2fb33b3fc364cc362e65a0c1ab8ac5585e1e7d872c61533e56475f03322cc98f50593d624a2f792c4b0ccd51bbbd12e6d771b5b7e046a09a8400000001358f06020bc6046d7fb36fdae8169ef026f7f18c0b9cb721559ab5b64507ad8f763c770a0faced835927471ad4a389cb4d5e23bfbe2193d5eb7d712916fb2c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7E6BC21-81CC-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006e7ab5c3bf8aa8d32771d9897ace0590bbd8a2fc7587303f3bd6eb517f37b198000000000e80000000020000200000002c279ff9de335a51b6898cb2c40f253be860483e6d22dc2ece53230dfc13152620000000b4b715c537ea5ec9e89e82cd0d05016a633223ea19906ffcf32be6d9b204a6f1400000004ab93cc05d5941c412ff30a04040c92b90918cf4a1736317cba8326532b424aafd9b03e6ce2a02349b0001cf45f7f16ac93e306b5ca1429702a2f9eaff1883bc iexplore.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2608 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 2608 iexplore.exe 2608 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2608 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2608 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2608 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2608 2876 1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe 30 PID 2608 wrote to memory of 2984 2608 iexplore.exe 31 PID 2608 wrote to memory of 2984 2608 iexplore.exe 31 PID 2608 wrote to memory of 2984 2608 iexplore.exe 31 PID 2608 wrote to memory of 2984 2608 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1089ca24f198dea7ea70b3c393f1e1cd_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=vsd3g0h_vs02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5601e660c09b419c8bd11f252f52cf3ca
SHA1b8410760edf5be06b77ce96b98ff4514ebd557f1
SHA25680d3b4ad0943f4c3168d8fcfe5b0b416737422244e608f760c06e6986b45275a
SHA5121beec94604767aedc199aa8f505b04dd980e4435b87d107759e9d722f8f9a51bedaac603ece9b817578f15ac6955a7dec7bbcd167ec0f96833f3e00bed63d2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5816011a34f2ab61f5ca3641cfe8d5f81
SHA120d6ba9da001f89d4299845896cf53b21f8b66c5
SHA2566479a8108761e8fe1a66252893c9a1ec30c2b9b1c288dfe18d06b84e9654d7b5
SHA512b1da4dcdb8e2d37ac64595273961921814746ab432101e168c5d804a7dccc6528638c21d821c09d7e3d9fb4bb0d72a3553f8bc923891aca04c2013a5ced3af14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e381def6a3939baa9ce13fa29238ec3
SHA1058035972f6c404d3d957a963beeb287bf5dd509
SHA25684774935681eeaaecea1aca9056b87820245104808cf8f0f8ca705923c0042dc
SHA512fd96e38ad0ca544a68e9543d260106f35b2685b0c0f6dd09f57b9cea8e236e9e7b8adfa9838772f5101903fd5a73eb96dbcf0835bdedfd9c6fcf8f1a3ca9d63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14f6db00fbaffeb70b04a17d75c1090
SHA1009ebcb72bed9efab9bff9071d52d739a226e2f0
SHA2565f3a44c85b8f0c04327132c0e51b706ea98e946ed99ea2da5a99b463623d3756
SHA512633fea2db85dbf4a8b6c06db60e2341738f316c6957dc617455da2f17cf982d59d817b168f9fad34d087f0100c57f60265103008bcfefda4ce282b7e68e73c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5856352f36772df76999e81e0dc6feb
SHA1f61938f4d52cf85a319fc0a951d4d5777fe869e5
SHA25674647aa3caa5928be41588176791f9a4ad469d8c5a493c2994e741b576c7024a
SHA51230967fd79ee4896bf946a846381078579906302574be48427573324740d5b2538376de019dffb78474de8283c591fd6a0e535c5af8ae6b06fe7182e0caa7510a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575466f41d8b2f0c2dd35ae72121d9976
SHA1bc5d04bdfe5bb5cafc4caa3f004b4535a8d46271
SHA256d219c06b3f5157b75c2e4ccc119df4991bea896c8f64fdb1fa48d52b8e5eb474
SHA51236dc662a42d8cf6612f3b572f55cd884627c610b31b213cbef7929151109f9f7273121f2061ef89f60fa6b11609057d1d452ced65de64934256662c6b4d22149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df13cb7ccf3b924ac534921ef36ac4d
SHA1cefc4f85fed7a60a434b4a6a8450ad9ed1548604
SHA2560f8d234b11c7b76af02b97ff5cd53f173286b5a8267ec7d2ada602e3ff43c73f
SHA5129e9777395209ddc7235d7d544931e7364252931c9b5f5d787a6cd4392dc8c3df7d7c38e4a396f74f42dfa4bd438450ebf3aa56ef01d024ee2f8ede0c71c87bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcfaa0c068380f3c92e54144f3d8c241
SHA10b4ce6b8f4ab60ff8c3f552a18e33ea6ca806bf4
SHA256415e5ca82c4b08f990aeb7d1c70c1050df5c1f0268dc9e4cf01e786a56674f2f
SHA51244b544c5ee74e9203f15290db962e9d02fc1a94f07f82166b6d02ce6d34ef0ab91929d418eb0c448aadbe69cef29bdf307ee38433e3d39146e4fc6b911a9383b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ec12332098f68478cbe86a8deeca78
SHA14102a5ce0d126682e65198fc63700eafff7a4383
SHA2561aba0ee7d42734a46f9cf70042d79bd69eda77b40bf1312bd8910b3f87aa79ae
SHA512eb7697d7cb0d8e8c95358871502f7c0ded8ebac4f57fd87aef35bfde58c061d4c7fda710963d3933427ff7e5fee7b95c999f95460aa45ef1afc107dde065cc1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52888664aebafae279ac5b278947607db
SHA11c792b2e2eab468577611e902488ce033c1960dc
SHA256a915b50b72e85d883ebfaed94c94b8701ea03f8460834efce3afab86d7cf72f1
SHA51244c8dcaf3577970dd126887c720f793511e88ddd2a2038188d6f736cc85787c1afd77fb4b1bbb02e1b483f51ccd732bd2398453199f3517bfd604006c7244f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea2127214aef6e9447d43e644e4f2ab1
SHA1d73e7718312689075316dcaa3a35c06133501659
SHA256b15e22af6dacf3e50023744f764062fc3144371b8e076c63365a0784594fe991
SHA5124dcd64fd386a8aa46b98fd31bb08b5865e5d1714deb981a16e18bbca4a8baba03d13d814ce4e01d2b2a2b4f8e93ab0b7f8b4b350024baad62d948e89f1e6d620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8b822f68fdde28cbf80bb71f83dfa0
SHA12dad2a6c42aa913aa3df896ffa3258f25b0921bd
SHA2566d4f9aeee966f087180dd37e281d4b7f74fa656960c7c8281fc6b0a985309008
SHA512843e1a041a8febd197419ed7bd81b2cc2f19dc21da71b510372f9c20af83136d067cb1a116ec7610ec9ce107bc1e3c604aeec74a29e4d0ac805e5fd62444a54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7f2e01b8b67f2325d91b2243f2200e8
SHA12bbc01f2d8b53277fcd22ca1e26db867c100d3f1
SHA2565edea5165f30b066e26ab41df390d71d4fcdabaa0ccb5997802cea61b7364b41
SHA512941230dddd0be80a02482fab0fa8d920f7abf83a4771f2641c37046d224379b888da740dd16b59b73fa9dda6c80684b76d19822abc359aee0a2e53192db9d751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec631df2cf20e1173253341b6543947
SHA1f273049bcd6fef689406ed85fd0c3957b282f887
SHA256bf75223ad8956f4aa9ba052851e42313b0cebd0415fbdcb5edbd0aa8defd3b9a
SHA512db78a34101c3fb9c2f8d02e206e38f10b0735cf46c99fe1c619404ac5f1efdd2c6f2bc583357ae38444d19032bdef834f4d6d420725630407cdabfeac2ba8cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc12fb18218887aa6d43350b10775cf8
SHA1980384a4c73b42bc4e628c0b7ecbaca982c814c6
SHA256311bf92b4adfc7e1207fd5cc83d223b3e47ebd08735867a3a930cd076615147d
SHA512daf850c298c9119bb9fb9444983094ef8b6fb6b91dce857b719991760faba02c7b346a3289e8756046005c23698c3abcbff70e06ce074def5939dbd3f2cc7629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ed7601856cafe619d07b116ea470d5
SHA14c23c4919843b9d9ad56388572c633b8340d83a1
SHA256cd9f23a3df6c0b87fb304e25f17e127d00b4461630e1a743a641fa8a08e6f16e
SHA5121fc8f3bfc26809d5c8803a1a681ca6eac7c45a3de22e454214089d62db9faa433a084fa0ad5e8d5016a5c16191955e0eb04f42f58381b1ae9bfe811acb1d30e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54712d31c40c2e9121aaeb77068048034
SHA18477ee752aeb22ae7c99dd29e19dcac46dda9a03
SHA256050580e9a0bf967c115ca37b7065694711b07c1856d9b50e936afcf952fd67e8
SHA51258d46f9ad4ae28d418be9a53fdcbef8d207456903d7617530e9b1dc15a4031a54be0f765b5192435b2ad70497df1b51e2ba28a629e7ee129b990beca8f5b96eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2f1b129886b1da308f59b87831f7df2
SHA1ce5150f9bf0b51c4f5efdfb5445b8b88851dcd7c
SHA256f0b0ee1490f7554fe5d152db324c4d641acfa3787e24e0a2f3c04dbb0d7e92f0
SHA5121a67fd56b86ca3b2cdf649b7d4f0194a9783dc69546dd269eb2aaa2cefac3256a1fd17e3302d72b08b1adb6ba40de89b619ef66683966affd081b443efeb7d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe24d2c11feb606e41b119b04608b90
SHA10b99536aba52ef1810a2b0e4256607abcb5a8e7c
SHA2562568e210ab089e82b259e4642260e52445ca4dbbd6c6751d853e9bc4aa27b4a4
SHA5120ff50a602b89f0317c0047fdf692174d6689fb5ee222d60b311d3523ed104eefc21fc8f0e762ae0b6900c9f14bdb82ad1437e100461d56fe024d834773a22ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df93484806f580a28f88c19daf8c171
SHA1ba76a3f9264b7a6909b6bdc64e9ce5e329ede5e3
SHA256d77c2b4c1967cb65d1654d79de797fe08fb98baf8e6997d955a0cf2d70783655
SHA512b15b4437177b6e8562c3365953264221f68f85da4715ecf6dacdf4a845d044818a8b8f2aca7d39652811b4a1fbdd5254788ad9e40465b7396b3a1ba4f5339ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5dbf179da0f6d67685ac7e2583f639cf8
SHA1f5227b1ad1252620b81da2f3d5dfd3bac61e7693
SHA25655acffd29453a81f9ff8a05ff93834bb931380b5b5480d926e904cca9379bbb4
SHA5128754bca58c406ded56d046ca0f707cf7a52c3f6cb652b2eba59eff4e1b51dbd34d404ac9e69024ee9bcfc02f394e04d62dda09a0bb99c2fa77e517099c09671e
-
Filesize
1KB
MD5c4194ebd61f686dfe09e56c0121689fa
SHA167de43e05942a11ce8e0a0093d9d630041320463
SHA256bd41332ca075e003ee811dfae8181e2289ea085cb8979362ab68e69810a54e1c
SHA5123e8a963eeb9890ea3ac8d4d0749ec89093199f0e72e769163050d4e72f5f44d8e15431451f00d0be4a727a5dbbaa8a8da698434b0f5fac800b930acf0d271b44
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\favicon[1].ico
Filesize1KB
MD5f2a495d85735b9a0ac65deb19c129985
SHA1f2e22853e5da3e1017d5e1e319eeefe4f622e8c8
SHA2568bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d
SHA5126ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b