Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
2caa9f694c6ce6cb12c384387e9e6e14_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
2caa9f694c6ce6cb12c384387e9e6e14_JaffaCakes118.dll
-
Size
209KB
-
MD5
2caa9f694c6ce6cb12c384387e9e6e14
-
SHA1
baab3ea6957332e81cf0278e298d66034ad25d80
-
SHA256
3c48ff887506825059008079b3d465f60d4e6208902c35c0d757be2c747ea8d7
-
SHA512
2e6887634d3f0fab6711bbe7826237c66d446df612d9429e1fc0cdc46e76a2360055732af5f85ca0d6830b7302576d469df825c47c89a9a3cbb67b47ddaed8ff
-
SSDEEP
6144:gWBod5j7uVeHSnh4T+jxoctnUfx1G0lLjgb1SjIxyubz4AT:g70ekhu2ZUfx1bLc1S1m4AT
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c584da721adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000924e9b9e242b26c7a656d8dd78922ec15837fdee15e30c94c30528f4f7e83a76000000000e800000000200002000000089c878c48ed06344ed2c8dfd4840e814254ac4ea16e4575dd5f935c527d197cb20000000e6779661af713ce799a83e584730bddef6d55257ddfc9136fce18d21d4b2b24a40000000d6c2cd3df825ce8eb1035424090dc0a45f5c2a80b34a5b2de98fa203a277fcc777073546f4c8a174565761971ef041c00e3230e58febde6585b882ae67516dcd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434657644" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB3C3891-8665-11EF-9B14-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2244 rundll32.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2560 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2244 rundll32.exe 2244 rundll32.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe 2448 notepad.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2788 iexplore.exe 2788 iexplore.exe 2788 iexplore.exe 2788 iexplore.exe 2788 iexplore.exe 2788 iexplore.exe 2788 iexplore.exe 2788 iexplore.exe 2788 iexplore.exe 2788 iexplore.exe 3060 ctfmon.exe 3060 ctfmon.exe 3060 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2788 iexplore.exe 2788 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2244 2888 rundll32.exe 31 PID 2888 wrote to memory of 2244 2888 rundll32.exe 31 PID 2888 wrote to memory of 2244 2888 rundll32.exe 31 PID 2888 wrote to memory of 2244 2888 rundll32.exe 31 PID 2888 wrote to memory of 2244 2888 rundll32.exe 31 PID 2888 wrote to memory of 2244 2888 rundll32.exe 31 PID 2888 wrote to memory of 2244 2888 rundll32.exe 31 PID 2244 wrote to memory of 2344 2244 rundll32.exe 32 PID 2244 wrote to memory of 2344 2244 rundll32.exe 32 PID 2244 wrote to memory of 2344 2244 rundll32.exe 32 PID 2244 wrote to memory of 2344 2244 rundll32.exe 32 PID 2244 wrote to memory of 2448 2244 rundll32.exe 33 PID 2244 wrote to memory of 2448 2244 rundll32.exe 33 PID 2244 wrote to memory of 2448 2244 rundll32.exe 33 PID 2244 wrote to memory of 2448 2244 rundll32.exe 33 PID 1048 wrote to memory of 3060 1048 explorer.exe 35 PID 1048 wrote to memory of 3060 1048 explorer.exe 35 PID 1048 wrote to memory of 3060 1048 explorer.exe 35 PID 2244 wrote to memory of 2448 2244 rundll32.exe 33 PID 2788 wrote to memory of 2728 2788 iexplore.exe 37 PID 2788 wrote to memory of 2728 2788 iexplore.exe 37 PID 2788 wrote to memory of 2728 2788 iexplore.exe 37 PID 2788 wrote to memory of 2728 2788 iexplore.exe 37 PID 2244 wrote to memory of 2560 2244 rundll32.exe 38 PID 2244 wrote to memory of 2560 2244 rundll32.exe 38 PID 2244 wrote to memory of 2560 2244 rundll32.exe 38 PID 2244 wrote to memory of 2560 2244 rundll32.exe 38 PID 2244 wrote to memory of 2560 2244 rundll32.exe 38 PID 2244 wrote to memory of 2788 2244 rundll32.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2caa9f694c6ce6cb12c384387e9e6e14_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2caa9f694c6ce6cb12c384387e9e6e14_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:3060
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584069143d797fa37f1a9e97437f10117
SHA1d5a24ff2968bbe27d3f53dea2220f7ddf8316128
SHA256c44d8d7af0a88e98e76fafd15d3395f84064624ef7977fbff6f319d280139ca3
SHA512a63176c2bbf02e0749aaeb9c35416da2e30eefbc6f9caae03bc89c6db456cb0c49cd8f48e9eb045604ce65fd2648f96a3d9ab631f65116f3e11caa0bc81b06a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ff0c66ce7bab5ffb29ab4cb4a96ded
SHA1c59c8cb4f4804737e5a566dcddb2c8f28f00f9c5
SHA2567899192f9fa238fc10ad717fae5eb13f1c62dcfd6de6fdae521336c021e45a49
SHA512c40dfeddfdc2958c8e72518dd6ea78b8d66b89398743731c9634e398ed4817b57bfb9c06926295a172c88d00a195afe6d44e9debe169b554bbaed5662e9375d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c16aa59f6b42e14f0e418530282b6cb6
SHA18c01cd754f83847775da50c6c0e7adfa21c54ebb
SHA2561ac52d19f02fcc39fb87471dd7e7a76ee4d3762db7cb89474e0e74f82083cd3e
SHA5129e72e9f4ae6d132ecc431b2d48656a25be9e539ca9aac58a42f480565a0d8dc62b71afbbaf3d1a70cc4bf473f09930fdb042ac9f9e28c2ff4a9dcb71721c45d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e02cd18058262865abc7ad32b1d41d
SHA1672df5b58a40ff7f95773c1089062c812c9820bd
SHA256246466f18e73fa46ddc219fec28f3e309efcfbc3af0493348f365b49ed9e2854
SHA512f0f14759102a596de8c159a257f962c21d5aa64eba2d1dc4b613b0907a53e27342dc9bfe1fa70ccd6b0912433e51105c3469154b742132f5a3812dd9c9b918b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe5b2d776efc41febb5f2ad0fef1776
SHA11e307014da0f1e3bd768d95fd7add797fa6dbf49
SHA2563751b758214a1c53a10bfaa3d8a09d7a7d6811ceb0730898542280b43f76f843
SHA512f3fd2b40098e876eac086ef7c99939e5fed62ccf200cd851b7cf9b5936d60e7f5f081443ce28dfaef36996e68c9ca337c2bdde6944ab28faa6bd4324454f08e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502ae0afbacf0b0860e3a4fa154b59883
SHA1fbf8d997c5958c1e930517a53c1f5623adcee1de
SHA256056a611abd90edf6f7c32b3f16fbae73eaaa810c8bf446bd95912420b25d7eac
SHA512ad846ffbd4ad24e30d84c847fe5e635bf82dc9fb75cf36b49950738c2b8d2d7580030c43b7e73f654e3d1bcc23e57a84d06c35fefff4bbfbf11158e0e2f078bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5120f00957354cda4baad325e03ea18dc
SHA1f5fd992e20cdc48ce6246fb185eaa44c9390dfea
SHA256ae1f96b6efdfa894ab7866d729612a72c97a45958850cfa69ee5e010d0cbd84e
SHA512584ac04b0bbf4f32ba2f964d50b9290fdb1d12757c26193b2fa88a04ec0d27c3311df6508cdcf03caf0178bcee1fe443ac87e608bd876e1246e26b599e7b51ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5802537bd192d8086c9a90a8b435cf418
SHA11a52d40b2ed50c04009e834bf9fe9bb5650c08ae
SHA2567f122fca7295d601a35981b17ca235b2ad863359047354c26cf628e1d9afd206
SHA5129c0abe19cdf583cea8c0346204e13f29f2862f1741378e8aa0574a358b2bce042f1c5ff11fc3f630fabe93fb1a20037328b49b0a828ca86070348cb3146c8e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e097eefcb4b433ece62151f223bd3d
SHA18a7abda6696b2d2ea572606a6143acfc322fa06c
SHA2563547a682cc5b87f8893c659ccb61ca32608eb3d0550564eb8ae0831a23bf2370
SHA512f0dad04f87506e9abff8e235f07d3a3da10baefb032abfab7f0c8d272dc8a369295aadb46e4d305077ea9ede8c9c3cf6b568fbc2ce92965a6fa4e239934f2a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b4c36e5af6a6e8b450f291a2de9c8ed
SHA17e501b727db2edad53112c1313b83549a543d901
SHA2569099762b88ed689f5cca7e7a1b224c2eb59f1758a4bbae13419abc261734ed58
SHA5128a7c287a571b465f2c816f5a70af21985af68ed321d3438e3885ca73fb0a123474e4e1f5e0c5cd98aa5280ecf3f4161fdcba970ca8bb2c2ea7ccf5a10ea653c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c53a9d838db15db5fd65900a48a3e1a8
SHA1229872688f791380f070268b1a1995e74858821e
SHA256cc49ee81a8caa08f34de84632d6c1b48693a98fbeb5e0f364c941c3584c4d9e6
SHA51246e9a529ebd67576b0caaee3581c0361590c48c0d9d919dda048a2a10fdc11d068bc55d54e5b4a436d778b902314c314e8b5ffa5791e66ff43aa7afc43f48743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef5e5a08235cb61259539f53a4808ca5
SHA10d58847747c9eaeea569543e7d26db3a10fa3b7a
SHA2563bb598917ca539ad444f59be18a28284b602c01382c99a234feda84afe225cc7
SHA51280ea543ea0a0404ce576f8bb8cdee33167dea9cebbc19bdbe687812fd1ddbd0cd31669995272b5e8370b64d67ea561447cbadd61ed071616ab59e0610c310f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a163e9aa72c23ef9807771f64a7061f
SHA1eb11d4bdc3626559dda9817ddb90aab535121f19
SHA256c11ffc5e9abb4c16eac11c2e4ffeb9bf318c9a96c3149ba8d281d8030e4f661b
SHA512f3a6467c636f4e0b3a22b8887c793f18f049603a90305f845b3691d640477cfc72754b7e1934ab77a6fdc716e0c892cda0bd2acb19bd54f5253300dbdd45acdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3cc5c66d97f58f3a5ae34bd2be8e2e
SHA1738aa3614541feb17191148aa35c55700e1ed965
SHA256240eb0d5fe67b0a7c385f29f4f2e941d07d804d9436dab9a56c2528fffaee1a5
SHA512348fa7d27f0bd1a30b859d5d35cfe2c27775ce43aadf187806aeb9dc3e21c95b48010d4cd53ab5c3cf1fc82187b5228e8f060592df9850619ef7a4ea8dd1f247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb579991db5aa3feefdc995de67cecc9
SHA17e1f6995e445fd509fbeab0f28c63f4a889bbd93
SHA2563f48f67299a5de4e0362574a2d034b66f5e3da5dfa21ef10c26f643a98c2fa2f
SHA5125d7220a416719a3b970d2c49f5650a99bc3dfd26d05d64b39eb315a2d89ca0ce80fb86ffdda00115cfe871b95f995023fffc07eb26a29d2ec6e127850bb3595c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563672c8d8d1e9244a5d0f2e00183634b
SHA15df451b4c53fc2f51b5bbdc54427e681aaf2ef1c
SHA2561e55811e9c297ccf31f870a58fb0e825a79e4471adc4eb31fc7068fd0b92d010
SHA512cf1311756c0abba385bc967f52b95d50c211a484dd9a433b0acac12189fe1db56fd9bb3fc8b4fa551fb601806a42e927f6217ef3995c477de7b7937f450a5f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506a6330ed4cd6a1746ddc8c256a0443a
SHA1eeefdb7b6fd9205f741c99faec87bb655f5294f1
SHA256b05d8ea0a277aa07bf1e88035f486d115b1c02013d955a9de5aaf44851096930
SHA5124eaed8c21ef31e15b95377106058aa68594784208d0dc6e0c437d71aa882a507f3e17d7224752f293e080ff0d40396114d5af588028600c227b08ead4c5ad655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566050adcf3f2b55dfa36624febee7d7d
SHA18ad90d1d52a4a4117cbe9d894d6f1c3cc6c9955b
SHA256072fc4fa22da99f0f3e816a8051e2008184c612bb6e1ff1ef14e81da57849796
SHA512bb508335ea7ac9981caa339663f820fb143850f74b016aeb2f3a417d125251ec594fda814624295761c709947a57d9ee3e0f277deaddf6c6619a2ad266857599
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b