Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
431d52eecffee9238010f5479a45da01_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
431d52eecffee9238010f5479a45da01_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
431d52eecffee9238010f5479a45da01_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
431d52eecffee9238010f5479a45da01
-
SHA1
5fd9ed8d94df62381dd76077fade0f201490387b
-
SHA256
dd7cbd59edd300dae05075e96dadc574728ce900bda00ce0131ab7bff4117a38
-
SHA512
09a9d4a8886d135a320132d090115e48f5060bac53210e4f327102ba6564c45e92f5aacb976fc685b67e2c76249b639f5dece3076d9e8d58de5e1264a5eecda3
-
SSDEEP
49152:/I0Dszc4WyPoBJFEswLXDnZh/klmMoXLuejK:/hszGJF76T//klA79jK
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\Drivers\etc\hosts 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2648 2056 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6A693D1-8A49-11EF-ABB3-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435085362" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dafe9c561edb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000a8becea8e5d448062e9addd19d8f5a80a70cebccd364d76f1f6fb24566dc2a57000000000e8000000002000020000000282f89f68935aed3d487383c28d1eaeb2f24bf5d265f32d894f884c2e9c3ac8120000000652e1dbb14df56921474709cedf0f6f60f6329becb59aa521a89a990e25bc6c84000000035685424be60fbb6ae2052873fc084f642df3313b723dd6103be09c0503f85a7a768568c1c66d976b34b51834fcf073c096ad606938404fea029afc42ec92571 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe Token: 33 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe 2708 iexplore.exe 2708 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2160 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2160 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2160 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2160 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2708 2696 explorer.exe 32 PID 2696 wrote to memory of 2708 2696 explorer.exe 32 PID 2696 wrote to memory of 2708 2696 explorer.exe 32 PID 2708 wrote to memory of 2804 2708 iexplore.exe 33 PID 2708 wrote to memory of 2804 2708 iexplore.exe 33 PID 2708 wrote to memory of 2804 2708 iexplore.exe 33 PID 2708 wrote to memory of 2804 2708 iexplore.exe 33 PID 2056 wrote to memory of 2648 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe 35 PID 2056 wrote to memory of 2648 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe 35 PID 2056 wrote to memory of 2648 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe 35 PID 2056 wrote to memory of 2648 2056 431d52eecffee9238010f5479a45da01_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\431d52eecffee9238010f5479a45da01_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\431d52eecffee9238010f5479a45da01_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" http://www.sf9.com2⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 10002⤵
- Program crash
PID:2648
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.sf9.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b48699d8750277c1b49388bb7f4882
SHA157fe36fa978346722e4a61de4b647a348ebf7877
SHA25657754ed8fdd9514a7263bf3d75c77ec3cc7cfc2b9807c693c5bf09bb7bac68e2
SHA51274309e6193042dffbd19c44d5866c59a877f4757798dd29116d111e8989f126c108dbcabc981aa3f0d07d991e0e7a61d5cc5c90c7baa33e9e337a32fb937097d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e4704295e44eeb33d5f2b76ec6a1b3
SHA1a5cf23a77d048a0c91652b83856756dfb54c1102
SHA25629a90111f4e15715548c2fa1c05d1e96e911aa719509e01798c74a4b00ddf5c3
SHA512371b64584fe68c390b4e44d0b75202c671c0a2eadc767c15fb948f48dd8f486c3a23124de548230d32944baac228149cddbda5f46b0168c68875be097f454042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5899cef02438604f90edec1ac261e4f16
SHA1a3ae20d9570ea7a48c30d7c83be49ca41ca81357
SHA2565afe84c875f945ef1d9bfa359f1fb25f6f3aa58bb102e8400eeb94cccef4cb31
SHA512b597db297e9ae6614e808c428ea6ef5728f0a221fe36c095da59242614232760cfb00197be21602d99da0487ddcf42fbcd0c64c888b374b6cffcc5cb214ea5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adbae1d0fa92c49b31dbe3705047529b
SHA13af7f5440715c0268c8b7400e44618a1352956c3
SHA25654ea24df7cd3e393d35e5600ab7741f4116c12dd5e433744bc4c06447d23108e
SHA512d0ac1f1b5df8a64c1acd55bd260503a933d14dcd6ddb5d8cd728322e65c6c8f1e1048b9466765be5af34c0099e4a79e143d986f43ee8cb80e8ae9c2b2dd8eb78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f4e3e514428c62f243ec904c3363da
SHA1cfc88b790240b33accd3ec739fbdbe919a2d3208
SHA256fe8f325692640bed04c77e95a9ac222ee4d7855d9c6abc1acdfcf4679172abc9
SHA512c8cf82b2984f204cea8c54c09afea89cbc57ac2cfc3f9bcfefc55191a3147d752a1a9370360b43d7ceb3b018a78e49d7dde57c784e80bc78c11d13fc15f0d983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e7ee7e12e35175e48a923a8e6f3ee99
SHA1096bbcb4dbd0b9e1ca23e5575ce7523645bc20f2
SHA256c36a8edb6eca2f36c6ccd761d672823d881aeee0547f6b8bb07baf4ee33be43d
SHA512ee67e045fc03c36d750e56439ea0b050097d72c2018ea03f9d569b106ff3c61c412cd1a535984fcb767365fa58bedafb7a52cf7f6f3e5d9738f66c8db922a14f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed5cd8dc0c2c027361859ed9fc8c05f
SHA114d22fc0260d3e0152542708a51b5ee29c1e4728
SHA256e4ede8464d03872b35ddb3b6f91bd17736e681e42ddc579e25ceafe2cb140548
SHA51206f4a76fb2cebee040c2e218067baed0ff78331c388710ba98a77e6bc9a0c633cce62a45c2a7e965707807998027b348bf732ddc6b97930bbf28c3f7d9886ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfdef29cb57072cdaa95c7616bc99564
SHA1740733fd525782d6754b2bbf10a407f99368497b
SHA256db9fcffd7271b752ce5e88c62335ffd96e2decdf074cf2a69f24a18b9746e1fb
SHA5120bba3b681971c1b3e3920d86812d55041cfc8b627d864cad5d3d3e3410711ed9c27334b9091ba7da9db375fedbed6f0a83876f8a5bced16de1b7d14529014bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4d80a24cf9a019f488206cf56818ab
SHA129ba4425b57a9a89d453eb3fc38902ff4e5e0aef
SHA256dbf604fd4544667153179bce98d54204ab640fcc47347addcc3eb029d4dc44b2
SHA51201ec80299054528abf0bfcad0f5c7454d1f2ac2ebaf46384a0eb7016d4c6746b7c478697c24f7b445904d76e80a491f06191c61f215a1cae6870fee333533a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf25caea7f7dbb6e0d410425211776b5
SHA1ae54e3bb5a7ec2b0490bc566da95d570ec824420
SHA25629ab49d2d9452b04ec048457611afbdd883680f2c1fb811fea4ff00ecc801dc1
SHA5127559a4c133ff5fad07f478962840c42d77d93cb120d0195d26097939228f4736bf0f6a347b6e983f5b20921b3522554c19757aa4bb38593292229496d1ae9e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2f22c0d73fa34e2cfdcb2845225421
SHA1597b4116ef934bc0a6c086489dba3d296ac689ef
SHA25625e6879afab039b830b1ed033d26e0d8cc9389ea53b3e06906f96ab7ae788ca0
SHA51230a86e463d88bbe0cdba4078998298f60baf99eabbbe41a05167a5feabfc997e222abf52cfeed4499526468d791adad3c53f7a5528c3b3ab39b8ae8d42ce370e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee1a60120c7d057e0947031985e2854
SHA12cc287bea05b5fa5f4aa3ec91b4b7006baede303
SHA2565ce45275725a6b7f2985d59adfa096209e02392f73919da2b891b533a50d26ba
SHA51249d0416dd1dcafaf8b6ddbf2c821c9d4890f41cf32cb8714f424d7d08cfe088904e40c98948b76c560bf9c62a78e1fcf01ff9bbcc5bf39944bb7a283f260f62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d694e2eb550090019da8fba9d3eb16
SHA1ffafca02c3d415a55ac9b1550ae9c0398d7df494
SHA2564ca5db0dee1b2319bd9b4dc6ee869890ef8cc496d6330099d1a88361b422929f
SHA5126928ed80678cc16a45c3b51a49735427fb592fad873ef69701a8d7802f926da3ee39443e1bf0dec35c788c8b8c7629f36cb8d6450b3b9a91983d24a6fc69fe2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab50738f34752bc82465f52497b787ad
SHA182fdc54a258c39cc7ff7f835f26e213a1ce0cd1e
SHA256284b3e7a11bcd2c6b14ee0949b09005a0a1e6a19411c440fb581a8b60eccd88f
SHA512fd3facbdf5fac59978b14143b3ec6bbf1c5e1d9ef172620caecbd2c87c8cd59f1c78d68f2fd6df5443fb986fbfadb6c69dea31b910c4ebc16520aba50ffd9911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddfb833c5d5f63c12b6142fc3b7d704c
SHA1859980371a0b799aa34c21d2565ab005813f6c9f
SHA256d1dc8acfb24a86a8bc6c737d4b468a33c92e37b138fd3c69cd3380c33f09334b
SHA5120b36198dc97888cb88b27d3183e92d42de5809857518ec85316b034ea95a96be186e31e08a2090493b2324e1199e73a4be84591d09084c61a3bedc42b0a2abd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283d247a611ae4fed4cdab61b8cc4d38
SHA10d502bb6d5090a01a31790dccfa8944dca5e6c3e
SHA256dfff2f7a03f286f23eae825db68f9eb230874f154c6a601f78348134b40fcf8b
SHA512dfade9b91c6a1040e296a74a901e997c3ec5cb0445257d8099cf2c51c1828ccaa9d2c6f9799e041d811d86ef99e9bae8cc1c17f98824d54a6f1d0b841e36965d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f18e23cbd2eec92425d95807b0ec73
SHA1dbbfe833737a197ae43fc9ad4b859eb5a919625e
SHA2568d08f39b72454cbb1d6a8dd6b1a9bf9250023733c56e7de9ea55ac9e391a4432
SHA512e37b1c4b1ee697a068e6b05610c71b5fa9ca39e5a33ba282c35e6f12e154b4d006bbe412280fa41f0b81de031ff0c1c174fdd3225d35377cccbb20dee4fc50db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547157e7d540d60422e447793745c463f
SHA1bed8a7ee42860ab1c471e220e6a102d62071e842
SHA2568396f32de9ab7075fe7c413f20f529e03ed8a26709cf25674a0907ea4c0c892f
SHA512c27fce7bb845c9b3832f5ab5bdf9ec91e348566b196395352f5b47249ef4f2270e703d779c0f16a62526638eaf0752c849079b81267a382fbf42e5b7a542cec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5103b7eb762895b21d9929a7fbc815a84
SHA188381be3a2d467c05950f5c376e670f81cbd909f
SHA256f79f0a0325f6f3b3adbaf9925806a48a847b1b92703a74330fbd50734ae9e602
SHA51226bc0acf846cf797e5f6bc72a8b61136b2ae834a9b0aaa439dc199aec24e88d3ad703cbe599401b58e781a7e7c6ac6582981293aad3da0ba8e219ae150eb6d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5592f72a197ea453f3a13128adc7a3c68
SHA1698cf59b43596cf44518c483bd6136d7ee8526a7
SHA256b60f19228f88e7d55918eeda268d571a8564d2c42b978669eace2f253bf70ef9
SHA512593404f0d898307f5bc7eefec03e84ed294ad07ae20a433273c5e6062315523bc19fa566be79a459403d283b63740a92c070b4d779f042234bc137b26872d1a8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\favicon[1].ico
Filesize7B
MD562d768651a9beb566cca8d8394560c66
SHA1f59e55ef6da594d1a847199e38d859665ec57b79
SHA256607684b502032efea9b8215ac46d6c41545efcf4938ac90fa377946e0c522ccb
SHA51224f78ba65e7f89c11b98a6bb195a5a3b67d22263058c079fd97a676702f2e1df23786563b1bb54c583521342c9f4aaae1de76bc6327d6ea394edf9ce944a769c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b