Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
29976419f111ed4ea5da69b13ab6c547_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
29976419f111ed4ea5da69b13ab6c547_JaffaCakes118.dll
-
Size
203KB
-
MD5
29976419f111ed4ea5da69b13ab6c547
-
SHA1
8da14205fdadaafd463db3b44e70856032add461
-
SHA256
3db2166be67ee6eecd2ddcb66dcc72def90791a02ebc11edf99a0d96050fc14c
-
SHA512
be01bce4059f30bd37960cb40dedd0b201bbb47202eda383aa061ef57ba7062ca47fbfdc2f8311a7bdef958eba229b2036fe33846e195c2ee1d2718928fd2128
-
SSDEEP
3072:P9yAi/4iLoUCRUckAbTC0shNZtndkf7FZGYBq2JpUomA:U8t1BTC0sDU2H27zj
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e42d677766681b468fcf5b2c2ab08b5800000000020000000000106600000001000020000000d995374842a07a94e44cf7430f7af91d19bbfe1e4c4ed13c567e2037da047b83000000000e800000000200002000000047c5c5af886cda640ea46ecbc14bbca939d1773793daa130f3ea15601c3e2f1a20000000377900907f3b5d9b819feda675572bf4af22765b9cc2f4cf64003bdffc616f144000000009c89251dafc6d2910b6003492bac759350143d05d07eda62d3722d55fa0ac018d44774f0847abef58127d4fcf07723e5aa543ee6e44e6ea5e0a004dca8c5909 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e42d677766681b468fcf5b2c2ab08b580000000002000000000010660000000100002000000001cbc6f3255072e8d484b05a9eef6e890e283f548b5403e1738a6d7f4afd4720000000000e800000000200002000000004e9caf85666753c0b8121b44a686430c054be89eb07d4c40a4853302e69137290000000238e64bfb5034c5c133ed94ea2977150edc561950ee72f49b5c8553c54d339aabc80c4d184e19707c57f2fbeeca3a3ac99d0732567c1f4e84058ddd73c5194d571d7429ead9b56df19b2706a43cd4871558f08bf00fc91c90e488befb6ccc44dab3920721db09f6ded932aca38a43b4044e154aab9604be39f55e643a83083853359f8e112f246bacd9c20395add790e40000000b9edb0bd584c0b2de41ea7252f3607b1e4b3137f1340117e8fb4152d1d95f5a049bd1a2a4521da3efbaeabb27684218d29617dc67aa29fb18ca06c15cb8a8d42 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C695E51-862F-11EF-A3CD-E6140BA5C80C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434634158" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e85f2a3c1adb01 iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2888 rundll32.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 3012 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2888 rundll32.exe 2888 rundll32.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe 2624 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2480 iexplore.exe 2480 iexplore.exe 2480 iexplore.exe 2480 iexplore.exe 2480 iexplore.exe 2480 iexplore.exe 2480 iexplore.exe 2480 iexplore.exe 2196 ctfmon.exe 2196 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2888 wrote to memory of 2748 2888 rundll32.exe 31 PID 2888 wrote to memory of 2748 2888 rundll32.exe 31 PID 2888 wrote to memory of 2748 2888 rundll32.exe 31 PID 2888 wrote to memory of 2748 2888 rundll32.exe 31 PID 2888 wrote to memory of 2624 2888 rundll32.exe 32 PID 2888 wrote to memory of 2624 2888 rundll32.exe 32 PID 2888 wrote to memory of 2624 2888 rundll32.exe 32 PID 2888 wrote to memory of 2624 2888 rundll32.exe 32 PID 2776 wrote to memory of 2196 2776 explorer.exe 34 PID 2776 wrote to memory of 2196 2776 explorer.exe 34 PID 2776 wrote to memory of 2196 2776 explorer.exe 34 PID 2888 wrote to memory of 2624 2888 rundll32.exe 32 PID 2480 wrote to memory of 1624 2480 iexplore.exe 36 PID 2480 wrote to memory of 1624 2480 iexplore.exe 36 PID 2480 wrote to memory of 1624 2480 iexplore.exe 36 PID 2480 wrote to memory of 1624 2480 iexplore.exe 36 PID 2888 wrote to memory of 3012 2888 rundll32.exe 37 PID 2888 wrote to memory of 3012 2888 rundll32.exe 37 PID 2888 wrote to memory of 3012 2888 rundll32.exe 37 PID 2888 wrote to memory of 3012 2888 rundll32.exe 37 PID 2888 wrote to memory of 3012 2888 rundll32.exe 37 PID 2888 wrote to memory of 2480 2888 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\29976419f111ed4ea5da69b13ab6c547_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\29976419f111ed4ea5da69b13ab6c547_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2196
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500915e5074a7ee5cbd30c1184cc8709a
SHA15a831e1e47a82ea86cca38f5e22b4ad75acb9684
SHA2562e44ed0797a111d08992b8d864060da8b0014deed0a18d6784c189b5b89aa36c
SHA512a836be2f935e65471fb2bcb046d5039157de9e54dc8a8b815156ae1f9f9bb25795a175c2f7b54bb33ee85a692509068389cf38b2724ff02b134cbc45770a9148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52146bf6f298e08bf9eb7ad5089dfb751
SHA15174e673f756221443896520d00869cde3a82d67
SHA2565e934b9d9586a8fde64e133766d56730c160675178bb58307ca7cf87fbbd798e
SHA512b86a32cf008eac5f85126285bf3ce50ed545265f840ce19112f7e87d5b103b13dece847adc4c983b7f4cd4b0940459fbc16881bad5858b90209db177886a7fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520784817423a4d166099044d40224341
SHA1374e1f3ebf64afa10f2c8cb405567f7e41d56416
SHA256389d54bc98152be1b60931e953bd121f592079cf6ff1f7df26cda901411c086a
SHA512c62c5d5dd5ecdb4ae337bc92fc9686be886601041949ae45c669f862ad61159273179d464eea7ed8068330f4ccc374c4fd245e68b787c2229fd918321475f07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a1cd04ce5563076e0397c78262640d4
SHA15be760bdcd21dfe0a7bb5822d0f56177865bc249
SHA2563b764f46025978f053c7fd04fe6991bc29245d8bc2d05178f93e312c239cb90f
SHA5121be11af855657842f7902741e006f474b5bf342fd9084d67e66b9438f61a694753572d5b6c7c623281db2924bcc35e8376a3d315e061fa4b7db448b0f99b4742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a94ee6830a6d7c144e71aab08b57640
SHA1cc3478541e0efaff54ae6934b69f9648f5fd6b50
SHA25616f8b38362b94d52762eae34b745512a82fb88b3e80c3bad5c8bba3b50e77916
SHA512f5ade25214d1b7776c6a95f1c057a38202910cac4794f2b412a0df7484a096e25b106e28fd5ae3ee52ea6d6fca7ef9603ea319c48dd641b480696670a03f0c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5d36b2013917c0db08d29b08f4cfbd
SHA150ab6851dd3d76939ba30514b60e145d1aa6e115
SHA25692d070fd0d7e969fa81df9facd912075150adfecbb9b945c155eb8220ef949c2
SHA512109a77e217cfb857d72d6a5aef97ba8fde45009a52846e105eef9a680ba5751d252910e8a331bac69f2c21bba9d8f92d7fdf4e8806c9c69b88092ee5e985b614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5877e894fc1cccb0581c1921a2cac21fe
SHA17a47037b9b791a9d0a5e2ff97f7b45fc65186b70
SHA256eb296c5e516e5c9cb16fa55c3bee848ff02819487f82efb137ec5f598bfaab0e
SHA512476a0c219335ced8aebcf97c80c59fb227e2ee6cb69e88cd3eb801d4234fc071054b12479beab1af94a32ac6c86ad86747261fde8660c62f7fce3e3e96147ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59caf7e2351fe6070e706ce5bcc196fad
SHA1f979af00d7f20e6e8678d74ee53ffcb1ce094ac1
SHA256e1e300b63310aad62f4d5a0c72f53ceb920ad36906390c59dcf74093519c5e90
SHA5124d1f0b89241b00d902145642a9120358d50c5c8d59c7e2fbe2eeb478149272b227fca77493e6b01e8f735c32cc7c87770f1babf22a31ef99c0e2c4217f786472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9099965cab05599fd9a5ff325b51203
SHA1b7a527325780099adc1ef5ff12d69144f8dde3b4
SHA2567867405cdb78562c06ab52ed77a1d0e1b3d785d047ae89cef3fd7faf5336bd69
SHA5125c208e2fbc56d18ff0dabc458dfe63fdc8143d450812f94514f27fe42299f6b2dcdba823c2ec0883389e484b50569e07b0153292853fc918adebed5f054c1380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4e7d0b2ec6b4f205c27a29d5e98acf
SHA1586b2925b0cecf6fc9d7a25b1eaa0707f04cdf39
SHA256407d67298f24ab6389919e2871315ef9af57bb43cd30c3153d63428ab1974474
SHA512b47a29492de84f248c052c7ec027911ef40e1ac35e3e6a52bb3cf694ff92dbb61007b5042a050c2bb24ec4892f5ef6dc526e20924a96090baaa71d1aff16fc5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5358bb2f4ed17b0d2a19516ace6b470a6
SHA1ab2f8ca74ae4fee04efb5fd2de8cc4987e10179a
SHA256173f873e9f490a29ebeeb4f2f8c463b76f43a9f98329d27222d71c95c1baa26d
SHA512b7394a1b0a1c58bc36ee36f99e6fc9ec7a51b9e199de14838db6233ff4dd5b7255ab8b352a0ec05e07f6b20021a0eacec624e125194f7ab400a4f975bf11af00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e294fa0fafc912c2b4bf77e874693309
SHA18fe4211f943394070fcd795463eff25a4b433240
SHA2567de2dd08628bdf108846754a4631d6cbcb7cce7659e0df4dec5396d077a492c1
SHA5128656945412d420b91151ef9bed43a693982bb6c04b2cf4e3b82bbe0447eefeec1119f3b12c1f5bb45419931d23b9730347622de00ec7c2e0e20eeea88db1c11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518792539084576b8d1733db1b3ddf262
SHA1d190afe655869f06e7e8001403c384be09fe35bd
SHA256d75567f66722d556bcbc1a8c23136cee293c50bd49768f801bb72ab489db0232
SHA5123fa6ea37939671dbc8a3dec12d6ec85e14897a15ef5bb59a8acaa2849a1595d2a1cccb3b1a1deba2b902cfa00b504f0aba252438489296a0586d4aacd273f5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0e5ccace062eac23e5f953659bc666
SHA12e1018492ef0532d5aa5a22ff2d1767851dc6c75
SHA2561c7c474d7d4ef072c845d12bbb3a0d71af2b52d6292b5948efa35ee92bc1b558
SHA51235bcd25c2456d036218bc707b021fbd9dc7711155cb5873f902d9bfb547975c2d4abfee04e57d89f8461022ecac849d8e42fd67d4c04f3c121d7b2421b2d9c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad960445ce3474033756729306a6efde
SHA1dd20cb2e7b39c79b4ddea4e49c4a93ac987e4cf9
SHA256da8d6ae53cf3bfce647b1cd5ce265282e5deb225788e10aababa810494cc7aa2
SHA512d8e1a7f1fd22d28654917ce813b9b26de707725f6264732185a3ca69a49aa37424edef9c35f3ca7366321529179cdc74814424e792b932198c376dc8a6f74868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fff7b9a65497b34784695343cef8722
SHA12363edc430efbe5dedc344ab9fb6635b6d9f229e
SHA25650ab14c7e8c7d5ecfbdd5cd7c432be0c5a2967906443dcd07a5d0f4261abc769
SHA512f13a412699f04b7142ab5e1d7151dd5187e5b4ddb7028788bbe7d1119dc1f7e3b8bf0f6b62c530b64431cf26faad30abe57cc37a355bbc430daadde858797995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd8c1f13450c120713eb309586a7f918
SHA1b01b15a8ff91f94decd55d8e2b83e26e2be85081
SHA2565cf8157d1bdba1b751fe11357c728ec41b4425eaa6f8fd11046be30e3a652201
SHA5120b8f3b826937848986943f8587203aa2e3c5ca47742d23dc3cfe91ba1308c0b772187141ed29147e1bf1d9fd292263a1d6ce3fa6fccd55fae1e98aedf5ac3486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5724e8e56b0038cf2a085de4a72a3e531
SHA15f160709c231ce9db2d433bcd2cba35641c95411
SHA25652c5605fab6ef100e39f7bb0b5eeac2612790c51a074f6eb7ed590e2143e737f
SHA51220c9ed7a1abcdaacea5911eb63ccc9e129995184802080c5b9e5603e88d97ce9b5068bf0f805d5f4bd71ee9e492a53f50a554e07275595a02b164646ec62ed7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e215c89a7fa862f729dd56aa374bde2
SHA1c51c877e8b30441826557c180d5a1ad2cff9a396
SHA256aee3f284294bbee82ca39a9b07552fc864b63493b44dccf9f7c79bdd3ba6ea39
SHA5128b2f83b7396e1b66d724b06df61422a907ef0efaf6bb582948226e9eefce13784dd679bdaf4447854d3572aa65d229a28346e462ff4e3e12271622239b7d6553
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b