Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 18:25
Behavioral task
behavioral1
Sample
3b740dcc0236ecf8fb87128a6649ea07_JaffaCakes118.dll
Resource
win7-20241010-en
General
-
Target
3b740dcc0236ecf8fb87128a6649ea07_JaffaCakes118.dll
-
Size
219KB
-
MD5
3b740dcc0236ecf8fb87128a6649ea07
-
SHA1
15362c2651dc9e360f03da9d767afb82b43fcdf8
-
SHA256
ce713d9968dd65da3b1878269b7013f743e55a138c1e61bb01af8ca222550261
-
SHA512
bd955b6e99237f82a7c5fb5548659a5fc5dd2641d95cb0f15425abec29645cda2f9a7c13143edde27a228d403b66d3e795ede8f1d20b3cf2255db92b7fe8ca5e
-
SSDEEP
3072:inn3Gs0jc2h9ptGhIE4y6atOfc7HD35HXRr6+UXaYvldMfaoDhTJZsWpvrk+Lvoo:a2/c54y6atykryXfvlZoD5bNYtvc
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2496-0-0x0000000000190000-0x00000000001E6000-memory.dmp upx behavioral1/memory/1752-6-0x00000000005E0000-0x0000000000636000-memory.dmp upx behavioral1/memory/2636-9-0x0000000001DA0000-0x0000000001DF6000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53548461-88C7-11EF-AB56-7227CCB080AF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f038b742d41cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434919382" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000b37a4828db53f30785d77a82b85ce34528df9d5d82aadd900d23ea15d1c22829000000000e80000000020000200000009b43a957bcfcb253bfea2ba1b8253fdfa4c3ea1c8f3bbeb8135a9589431e970b2000000084114274c2e686e8e36dc617ca9f04446f96d3472b1dd42ffbcbe192303791b440000000aae56b721f99d8abf0affbd98643e4e11803a876ec817c94df8f825937f507f54e385c49f51d428646df4e73c1d6121919f701048f705a4881bc71745d4dde04 iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2496 rundll32.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 2636 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 2496 rundll32.exe 2496 rundll32.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe 1752 notepad.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2604 iexplore.exe 2604 iexplore.exe 2604 iexplore.exe 2604 iexplore.exe 2604 iexplore.exe 2604 iexplore.exe 2604 iexplore.exe 2604 iexplore.exe 1796 ctfmon.exe 1796 ctfmon.exe 1796 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2496 2292 rundll32.exe 31 PID 2292 wrote to memory of 2496 2292 rundll32.exe 31 PID 2292 wrote to memory of 2496 2292 rundll32.exe 31 PID 2292 wrote to memory of 2496 2292 rundll32.exe 31 PID 2292 wrote to memory of 2496 2292 rundll32.exe 31 PID 2292 wrote to memory of 2496 2292 rundll32.exe 31 PID 2292 wrote to memory of 2496 2292 rundll32.exe 31 PID 2496 wrote to memory of 1380 2496 rundll32.exe 32 PID 2496 wrote to memory of 1380 2496 rundll32.exe 32 PID 2496 wrote to memory of 1380 2496 rundll32.exe 32 PID 2496 wrote to memory of 1380 2496 rundll32.exe 32 PID 2496 wrote to memory of 1752 2496 rundll32.exe 33 PID 2496 wrote to memory of 1752 2496 rundll32.exe 33 PID 2496 wrote to memory of 1752 2496 rundll32.exe 33 PID 2496 wrote to memory of 1752 2496 rundll32.exe 33 PID 1356 wrote to memory of 1796 1356 explorer.exe 35 PID 1356 wrote to memory of 1796 1356 explorer.exe 35 PID 1356 wrote to memory of 1796 1356 explorer.exe 35 PID 2496 wrote to memory of 1752 2496 rundll32.exe 33 PID 2604 wrote to memory of 2992 2604 iexplore.exe 37 PID 2604 wrote to memory of 2992 2604 iexplore.exe 37 PID 2604 wrote to memory of 2992 2604 iexplore.exe 37 PID 2604 wrote to memory of 2992 2604 iexplore.exe 37 PID 2496 wrote to memory of 2636 2496 rundll32.exe 38 PID 2496 wrote to memory of 2636 2496 rundll32.exe 38 PID 2496 wrote to memory of 2636 2496 rundll32.exe 38 PID 2496 wrote to memory of 2636 2496 rundll32.exe 38 PID 2496 wrote to memory of 2636 2496 rundll32.exe 38 PID 2496 wrote to memory of 2604 2496 rundll32.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b740dcc0236ecf8fb87128a6649ea07_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b740dcc0236ecf8fb87128a6649ea07_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:1380
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:1796
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c88fd0f2528150db9aecacf93b3fd0
SHA1ce763de84e4fb858f5285bf4db9a3f5f1926f4a9
SHA256ecfd00d3010c75a0eacc9b000c80b2b454c030458ae1aea9fbd188006eaa67d4
SHA512378acd170032c9830b1bcf193657daa1e49289ec35b50bda502e69593dae96ca71cf5b21c3797bcde61149e8561efc728512bbe8e82c1efb1f2b1fcc3b38ad20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6de36f9704ef4fb845fa50cbff9b73
SHA13b2501778fc8034429cd102ec1f867eb6275e2ce
SHA2560e7ed06f6bc1185ee0fcad677ad203ccd14cc02e78ccccbd45ad44471f976025
SHA5121825578f7ea98a4e9981dc6bbc7655160a46b23fc9364fda7b8e6278fc9d9cceaa667a43653fb0fbe8b9fc6da6ad878e71b55234e3b6197441dbf3d4d98ae8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff56635c95cf1321dfe75886364352c8
SHA1b17c47196bdfb48c24f635098918a1c348e039f1
SHA2569feeb3b48b2c0bead6b1f8c77a2b0db46a391749f97d71e8dd060f2f1881fb68
SHA5125fafef5e37f65eb0286b1a6e78c6cd577d5dc62ef9f6832e9cdf973e82eb0f25d0d2f1925bede5207ae768974517ee21f26744281b9b9a39d514fb8c496148dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23508446dd990e7803d42585e317618
SHA18240e62bee70fedeee977d3a14dff328d606d866
SHA256e70105cdad04896d978a29b8bb55549fcbb912c556724394a2fa317f7acfcb26
SHA51239d980a951147a89d4d30f94ff3c3d747a5b92b441ee385a5b511f2559d850a4b0fe4ea461aacfb56c598c4f6bcb78e9aadc7c10643fe3ce5008881caa0c5625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f952218f635537f8e5647590f976713e
SHA1fff7f642769a8766e0f66e78afd706187e5b17d0
SHA2564a4ed639c3c3029f328b755dd81ae09424200a5f5dbe25521033e2cff640664a
SHA512c6a7a3925c2c44da77e38344c5e51a44c31c53ee8d01344270e44de59b7035596d242939ee0e4eb5b5ec597907262d8568ddd1faccce1c9cf08642cc823f8fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534435289cf53ffae81b0a8062fe59e00
SHA1ee6308933f29566123c533b2aba31f1671669568
SHA256ab7bccd6f5b8b4b7f0409922bfd0e2f9ea433d6af8847ee33bfd2028a27aec89
SHA512081faaec48321d0baf1ae3984475454ad9e5b06443c469670f743a95a9383bf93e31a8090b108f1c241835ad1be7574044ce49defa1c87b23f71c43b1f491b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b11cfcdc167db5b5453303328dbce62b
SHA1171e098eb0e0f9c27e537c65b3e4596d94d06445
SHA256ebea031fcd6f835e085f5d30ee96330fef090b6de8fef6e624f26746531b7ca5
SHA5124577f8552bb7a0d490770a187f949d494e559c1b84024d562bcb1b8c090f64d7d5c34156a0f4f87591bab9d3b92cd707ab69fbc88afb7efff5c5996c4bb9ebd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdaa084e0b363e8d80806e5b312d2966
SHA11edb6f49ad557818e1e95e45bec3138a4881f372
SHA256314c6e0b0f64308a765f7225be050255fd3381f4f16df705c8eeaa2d7a271814
SHA512179b6290b75a52c8cc641bb001ca9da9e97b2ab0a63f1109f1d084b24101e468c2d3832e22b0e6d4075892ecb6cdd3fc123bfcac4521575d040723d742c3d36b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d30853948f40993f87b447f88d470479
SHA170a86d18f8a08be7281d63c40664efddfbbc1032
SHA256e063c755a3253a4513d0ab90e8956fa35683dd46c61b3404664f04f0d70fbfef
SHA512526921a2cee4db73ce7eee701eb36f97be7eaeef6e09daa4ed0852e45d599d408e2a3bc2d67d4bf29fb9c7213af0891216f206328a2edfcfcddd76709ddef67b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde1ed94a37e337fa506aec7176d6c03
SHA14774799039add85c58b3311e1b39a9e0577a2223
SHA256a9dee959c08cfe3b4f1f1f8012bdf53032eeb1ccaed7fd6abd75f43897d71146
SHA512ea94ed0ea3f964293b9bcf212acfeae378a50532f71298a16c24b591dc4a5499fe422c90c38bfb616bb58fe266f2975983463f14c101ba9acc0743d67805e299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a2541fbf75a5715e71053a9146b8099
SHA1713d82db60f2bb86baf4438c68d7c90c9de07897
SHA256bbf9c4e23bf9c8a8b35d806482eb9891dbce6ee8ef46ebc8ce2fce9b70939f0b
SHA512b43014e65f41284a5a3184864194753d6b04c439cb72dae62be796f212eb40615a9a5b6e019193a4fcdea9875a1845c8c0f626e2fec413d7e7178d2846dc3b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2453bd12bc0b98355d1361a001d9825
SHA1e1166b13718d574f3c3237062cd3ec6010ff2bea
SHA2562770558a1be8ad57b9f0f0c6360ebf1f33a929f34a9c9a1a7f612f36fca95a19
SHA512f635605228d7ddf82224f64c3242f16d2ef310de38f9ee54c94ba9b4eeeb785c67d84438f7b93ab77c7ffb3cef5e903489f4aff029beead3c7ed96e2ba8ed088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50151dbed0d5c7c484ea1b3a1b278b3ef
SHA10cc5b6279bc3d98a88caa39cc980ef7f0389baab
SHA256624943d2e113b7cbfdb3f661ebb4a0629c80d13a75f35a21c57a3e27dacdbcf3
SHA5126cdcf9d66dea46ce8a5cda076ed47e04c93dd36e636cd95445227862c1417a9262dabf9526cc71712fc2fa7806573eb0dd2625b6e5e67e5c9fa46a977360c96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf36eab96fdab607540561206d9bdf6e
SHA11b24d1e65c186db51675b7dea371bf169e17bffd
SHA2561d5f2547c06eb35f59e8ae772dc3b2c4188de73b3130583cf54bf49ae57b772a
SHA51286f5566df8363131dbd13709051a360aec420170baac4f28b0547958821cdad14efef82bed1a9a76f8ca61dff237edf848b5aba59c38371d8c7f65de137d5ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5366c71fdd9f555c1641d7e1b048bbb8b
SHA10b2f30987182e13de780e56adacc628f3a50f31e
SHA25600431aa5a77e790b5b6582f9e46b71f4c896270113bc62711eb5b9b8e6a605b5
SHA512af2d9fae09bdb3912419b6d6c79cede16d245f3b3a22257e8cc69d7ddf312b64986591fd43b807b3ead389881b2ac7bbbfc20fa56bfa3e2449f7e00e660bcb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc2ac9138c094d35b51295103d4e9ed0
SHA1dcb27a87a1ed50b4b21a5ab2986a6b6760ff7c59
SHA2560e5cfc8f3e5dce531de9b1a3d26a12e374ea424f16bb6edf69819e5892fbda16
SHA5123be08e3c563caf98ad0a1f1bc9061b7b1b0027a30621e00c916a3bc8ab5ee060378cc27f3921303c3de0732bd00aed200707f0e110cf9ea5c9693cf5071a9832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50709dd2851f5541bda386fefbb7fb0dd
SHA1f26b0d8448cb38acb4203a4e18238d5690f79281
SHA256ac05a16c3c7be888598f73b500befb90f83f7aaf329e151540d4c81390c3d6a3
SHA51201b489d9a737c83fb4587eb0d5b3c8024cbe156e6965a389f2153ea1e1553e15a5e70225009a024f7ea505da03878d3df04b477c63c197f947ffa1f22c3a411e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5979047038e60db3e6fc1e6aa0542de7c
SHA189ab01d5e0ba25d9622374d834eb611d9e509883
SHA256c19e418879417b6ba7dd45925b30e0a4042d7edca23cb6bc95d4bd392cd874ad
SHA51206ee7e1bf9e745338df6fa6cf6424bf3739930248a81385971fd02dddb126d6e0551764e871110d95af7115b6816b6335a62374861b287d223be992d0fe73bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dde0ca49a7e62454840409df369da5a
SHA1a902582c5a0923c22a6762b874cdb2d0ff6070c4
SHA256ccb0b04e99d0a155ba7f613248716104a2e7540105e4034de23ddbc586414eb4
SHA512f017129f0308ffd23ccd0e0272629dc1f06b4e41e08783f3c6679985781d90340f636af48353f182d5a4c6c2bcbf1a407cb2d8a25fa0e40351d4d12cc59c449d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b