Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
3786922230f2b25fb0a42ee32fdbe9d3_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3786922230f2b25fb0a42ee32fdbe9d3_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3786922230f2b25fb0a42ee32fdbe9d3_JaffaCakes118.dll
-
Size
220KB
-
MD5
3786922230f2b25fb0a42ee32fdbe9d3
-
SHA1
b9f0d9811b10d951833c87ff5bccbe46cc91ebc2
-
SHA256
a07ed293035f109f2d92170e39d3620dbeee3e3fba8f55cf24ee1cdd70d9c9b7
-
SHA512
34f8f3632c4de29035d16eb102fc656d3597b76a5c8ecefaaac722ba66502623a92957cc95408c7914e7b070dba16540afa9ae7737f35f160bfff8fd64d36405
-
SSDEEP
3072:UaaRZyqo5tr7sOQ4HgUaTr1Ks6PMeEVh3abti2bm2ubNIXsKbZwP9z+UMD6anZ3n:B2AHgUa/n6PMe7Rbm9GbihcvnZ3n
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000976c1cec03d06a325dcd009e762cc94ce3785047eae3812d3098fa962ebddfe8000000000e80000000020000200000000580ae46b5fded25ef8bc7886b008cf9a363cd9bba9787b16a84a5d35629ab97200000001652366eef293ff0557767ddaf22b8b3ed4d8c9f51c900c0814c0773b039876d40000000f86e30e6757d398abfc72083893cefaa2803778e7a49f91aa68bbb1e2701885d8b62dd438c14f283a18343802dc2a99fc80e74e96c184a3e3b23aca9914b23cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2097b0123c1cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434854060" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C478FD1-882F-11EF-8659-F6D98E36DBEF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2520 rundll32.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2656 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2520 rundll32.exe 2520 rundll32.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe 2396 notepad.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 3000 iexplore.exe 3000 iexplore.exe 3000 iexplore.exe 3000 iexplore.exe 3000 iexplore.exe 3000 iexplore.exe 3000 iexplore.exe 3000 iexplore.exe 740 ctfmon.exe 740 ctfmon.exe 740 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2520 2420 rundll32.exe 31 PID 2420 wrote to memory of 2520 2420 rundll32.exe 31 PID 2420 wrote to memory of 2520 2420 rundll32.exe 31 PID 2420 wrote to memory of 2520 2420 rundll32.exe 31 PID 2420 wrote to memory of 2520 2420 rundll32.exe 31 PID 2420 wrote to memory of 2520 2420 rundll32.exe 31 PID 2420 wrote to memory of 2520 2420 rundll32.exe 31 PID 2520 wrote to memory of 1852 2520 rundll32.exe 32 PID 2520 wrote to memory of 1852 2520 rundll32.exe 32 PID 2520 wrote to memory of 1852 2520 rundll32.exe 32 PID 2520 wrote to memory of 1852 2520 rundll32.exe 32 PID 2520 wrote to memory of 2396 2520 rundll32.exe 33 PID 2520 wrote to memory of 2396 2520 rundll32.exe 33 PID 2520 wrote to memory of 2396 2520 rundll32.exe 33 PID 2520 wrote to memory of 2396 2520 rundll32.exe 33 PID 2796 wrote to memory of 740 2796 explorer.exe 35 PID 2796 wrote to memory of 740 2796 explorer.exe 35 PID 2796 wrote to memory of 740 2796 explorer.exe 35 PID 2520 wrote to memory of 2396 2520 rundll32.exe 33 PID 3000 wrote to memory of 1532 3000 iexplore.exe 37 PID 3000 wrote to memory of 1532 3000 iexplore.exe 37 PID 3000 wrote to memory of 1532 3000 iexplore.exe 37 PID 3000 wrote to memory of 1532 3000 iexplore.exe 37 PID 2520 wrote to memory of 2656 2520 rundll32.exe 38 PID 2520 wrote to memory of 2656 2520 rundll32.exe 38 PID 2520 wrote to memory of 2656 2520 rundll32.exe 38 PID 2520 wrote to memory of 2656 2520 rundll32.exe 38 PID 2520 wrote to memory of 2656 2520 rundll32.exe 38 PID 2520 wrote to memory of 3000 2520 rundll32.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3786922230f2b25fb0a42ee32fdbe9d3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3786922230f2b25fb0a42ee32fdbe9d3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:740
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0aba79f95404f87f8119bfcdea634e
SHA1b2c16df4038c9fb744017a8563c365d7bc565e68
SHA2564e0435af1b52b91b3f9db6022ae3e055b4ad80f0618e3e453aacb6006d2e7352
SHA51250ba3890e491f00d716159ccf805afc323c9f41a5f211821eff5ca8989f958ff3c459179134f30365aa691b6c116dc725362d4501b56b262de5baafabd076f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed89e72e2bbaa35a41a94747f77d6513
SHA160291d856abebba6000a4131673040b4aa91d02c
SHA256a810d59769cac47993ff5372c7a8c6943470232fdfd5263a2fbc4ac1bee1a564
SHA5127f3edd88fae2c753f24973d1bda7ca9a74b43c07eb58532d645f28f9f7351a4f05be723ebdbf0ac47cbb6557190dd589abf27edb8f627b386f75055a6ccbb391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518e91e66d97641cbdac8d58e7dd37424
SHA151c0282722c9b7166a188aa5f587fecf6104db1c
SHA2569f4c7c82dfae6b3e1aba436feb23d9c24f9d6ba5a75d32dbe282412587bf44b2
SHA512b6c92721f1747fda8c33d2f80c54e8722e570ecd0102f99cef19893f4efc1188da5384dcb54a849c84d36fed819f9fb38fd61eee21e3b71c0aa954fca361e04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d48c17f1f1b4182eb9607432a0acb8
SHA1705e6b8367a40f53f92a7c1581358771bc82a029
SHA256de63049ae2bcf9fd51e8cd085a7b240d1998b8d430fbb4d8ef033c2f028c7334
SHA512934da289d15aae2f1ed0d3e7e71ed41feaeebb27798ab5acf2d83056e2b2dfe53fdd27f560cc26835248e080464b45dfeea15a591f57337cb103437e7fd5c797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdca5a0ee6d288d3f0d397aae7ec7483
SHA1f38659c6934bba4a76136c05f11b744f20e0fd46
SHA256bd016ae36ed47339dbc9fe55500c3ca82150f8fa1004443a432e52802a4b3b28
SHA5121bd38ceef5f5da1f06cb0e29deea618ab2591ea75fcd815a414cec9b8ffd364220882fe7ea4b2ab8e6541dcc4c1955f1cbd5e28199b6b5fdef22453e9dfd0eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa9545246c008c2fd36dc0d406c1a51
SHA1cc99ea2ae76747e659c3450d04954befecba5ccb
SHA2566704f25293d45574c6f8ad1f356f6379ac115b83808f840461b63445c82e0174
SHA51220e0056031f90b63c82a8e5e1c5ca5bc416477c1b4f1f565789175f3e8fcd9803bf096761a31478040008cd3e2784df4a3faed6e24bdb1031588cde1af944e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da7713298de289cd5f3f4c825e22962
SHA1c61f32c0cc3c91686f849dc3f549f5c0cb363598
SHA256b9c3a0e56caa9362f9dbf3325d4e133a1e066f8c4c6a5ac55700dc09f21e94bc
SHA51261fd8b229194eba323235cdb148b10664dfe2c34ff79175196d2a54d0b5b4dd1f35328ccfed40b4d1f0e3995db75d42e47a87f76f5e5403ec1932e088e7f87ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f5b1dff10c16d47b9fb42418a15244
SHA14a8663c3d2386a2e0dce0af8f2bb7c8b468af927
SHA2569a6c1d3812797c6c8e740ae6658810c79e832e2bd272b578b8c42bdfd9cb55ea
SHA512353e18b4f376723ef0c4185fbb686a61cde1889b2b804b5e765d776da5cb3d5151020714926cb223af8e85539b1783389aa9611831b7c2cf1a4bf34ed59eff7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a512a7fdc178bd3bdd66163ccf126e5
SHA1cf4f0c37892524037cdb269de059d1029a04d594
SHA256b1efcc8798d065aa791238f61027e725c0464d217beba996a6331aced9ef1db4
SHA5127b2a25f313e26db9fed26ff1ef7023b59ad718374ef7263528035060980166b43a50c5024db0e134e03087a01fb0948bebe14da83e03a0a133065b16f93893a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840e9792efb9716fedf4899f45f6bf52
SHA18eddefbfa4c5c98ba04c2be8da175b39f8cc1fa0
SHA25610f076c080ce4c7bb94f43f41472ca33b73440366207893fa3fd7a3e1a911a52
SHA5121aeaf9be3e35aed0493160edf146e81e115dbefb9c675304aabb9f50dc923626ea7ce28b3830f1054fd029f8dac90ca0ce5f574cf215deb1d03ebe5ee90db794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52984496f890b3169ed9d1146cdaaf88a
SHA174c79c8902ea9b213d97291703a777fe26061913
SHA256eda91736e6f29be9e2979e1dd4f8082af9695be6b7bb5dd60455e418a8c95533
SHA5120282f7bab83f6eff6e538a55211c79acc1f25eaed1208358507c4a1c182a3cd25e770d04b0a623d9b07811c7aa88b65ecc5b66faad5ac46527e8df22cb646cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563ca9b03b198b1c3fba9b804f01e1153
SHA1c2ad081045225059b2543026f14d0ef71c1c48d4
SHA256252cd6ddcdb2a96cc38d4dde8bf6859508cb3659197c08bc6e6ddddcef724571
SHA51258333bfeae8b46e33735b685e94d9d3944d3079fb9a9b68df569e88ee21c734090a6dc96e609521acfff541fb8cff3426dd9ccfcf18dce9a5c79f20e9c23cdd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c6392ce7ebfe466d61a62e38a96192
SHA17be6658c52c107aa02f413830345cd5ff84204df
SHA256a6db8f952435c3b418a88cbd2fb334878063197c109f55ca5a7653a1036dc49c
SHA512bd733f028438fa95ff57d72e39c8f607f1f05b2c3077336879674521b1dd814006d9877045330d5b260c8f9e5975655779de36c2d5d44225748de655baaa3dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e84f21d7d254e1349495e2988746efd
SHA18a469f33d6687a5c67da224f67a115f5113eb891
SHA256b5fa4074a8fcae0749d2fae0540222984e1681c8ab431f04c37affd74d3ce3a9
SHA5122a3b06e503ec24466b78085dd747672d63c57e56684836ec12471a4849fb1de9d859ff0aa090688043f5c7d7561d6e1aa3c7e8b5cd58d49a295e16441b371058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ad5d76a0e871f42317fb2c8c6c6601
SHA1a1662ad2adc50a9fc5234c1321e9e0be36669281
SHA256258b60a3e5b87a23c38c3c57f7723f979e76d08cfba7b1fbbf6e505590630799
SHA5122f8cd29b62f7248a0806ea8618e15b24eae9f32d822db3287d3af506773674c1b68cad1a0ab0a832bbe75d90b718de3d54ee469a9a5afd5761d94007efa6122c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e902f85ccff5084f907fd2a03d75a232
SHA126604c1bf87df7bb1cf58ac89b8db45572cdf3a6
SHA256d98e13ae8a0043b7ed06fbba77670bf7949506fa48ec8122b9068f494fb28e6c
SHA51282245a2a57a6e24b3390b29837bee47b35d28e7e6f09a0ac03f97349d784c5c67557da930ce7a76f935240ed05b0780eee30c24516dd063022cfa80b7cce40cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8a26d0f520ba2aced52e0a25632bbe7
SHA13a01a6aa368fb38d70c0fa52e33a4dccfcccb44c
SHA256a0a60724f735d6e4cc0bcef40e5dd17d693d6ee43a599852a92613aa8ad85aa7
SHA5128e1f5786c5953ceb80d2119d4dee0bc53469e61650642670ca45503f2d75f3f1f46bd460325ecaa56309c3f0b6968a9663649d4a0ddfe96515fc05ccfcf869da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c8c045c30d60fdfd22a0b0be140267
SHA1bd68f1b1084d54921d7b2fb3345af9f28c6f9711
SHA256c48043d19a0ab273841566e711dc94cd025b1b462bde85e0add62617cf10543d
SHA5126e50072273d74d55733e018b5c81285a011c9ea304d4341d67cddfe02669e310dd8328f2997b284fc61e0b9a1352ec048ab3cd131c8a0af4d969484364a008a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556033c10af6e5b960bbd23d69fc04009
SHA1d140d497d0d1d1eda075fa611522b087eb4f8340
SHA256813bf1c9730757340214487b29f6a97fdf53d59d03dcb4c9994f998a85748edd
SHA512b4a1b780f0c3c59f380de050ffe678b63531919ac8c0fa81bed840559cf3e4d743a80adb6785ca6817c0039a59f3489d4af0cd8a11914ee2629f34de949e7907
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b