Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/12/2024, 06:45
Behavioral task
behavioral1
Sample
d5bfd797bffd0d482122f914b16ea6b0_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d5bfd797bffd0d482122f914b16ea6b0_JaffaCakes118.dll
-
Size
218KB
-
MD5
d5bfd797bffd0d482122f914b16ea6b0
-
SHA1
d56c6dbfce4d9bd30a1375c7c21e058e5fc38743
-
SHA256
ecf81ed9fec100e108a655305c8ef4e4386a575a4e280684c516a91caee79dbd
-
SHA512
dfa76bff58300a90ba5059bba8dbcc731676c5e2c91a03bc874c76fa0ed677469daec99073d632120e54e2870e9bd51d566b7efe11b15501d9471dfc9c506d95
-
SSDEEP
3072:qyKGuljBliR1jjx6p0PnlE43EXU1VtlUxRX/um1onTuwcTfeMUXaCZLns9VCr:qfGu9Bkwpud3E+4BqT10feFXaZ98
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2172-2-0x00000000001C0000-0x0000000000219000-memory.dmp upx behavioral1/memory/2172-1-0x00000000001C0000-0x0000000000219000-memory.dmp upx behavioral1/memory/2172-0-0x00000000001C0000-0x0000000000219000-memory.dmp upx behavioral1/memory/2740-8-0x0000000000540000-0x0000000000599000-memory.dmp upx behavioral1/memory/1780-12-0x0000000000520000-0x0000000000579000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e8c5ec3c49db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8f8d80141b712428f6087127495c963000000000200000000001066000000010000200000002f6c44bed1e3969c82e3628ceecdd2151f7d1f0d3d2717271f7c21cdb7716d9a000000000e80000000020000200000006cce82c646a6c2bf8afeaca55fecb7c3d5cdc984564ba77d6de24ae631bf5b46200000003386da0771c930e983675751bbe8a0aa6a07b8cb807b7d36ca07256ec68cce0f40000000ff6c2f3a8efb429284beeec1a8432ca128dc102ff184813568e073a5fdebd786380a88d72cd922497e3ea1652dda7ea535382d7bc320bb5b6600b0a1710ecb65 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF146DD1-B52F-11EF-AA9E-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439802189" iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2172 rundll32.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 1780 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2172 rundll32.exe 2172 rundll32.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe 2740 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2612 iexplore.exe 2612 iexplore.exe 2612 iexplore.exe 2612 iexplore.exe 2612 iexplore.exe 2612 iexplore.exe 2612 iexplore.exe 2612 iexplore.exe 2612 iexplore.exe 2612 iexplore.exe 2388 ctfmon.exe 2388 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2612 iexplore.exe 2612 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2172 2400 rundll32.exe 30 PID 2400 wrote to memory of 2172 2400 rundll32.exe 30 PID 2400 wrote to memory of 2172 2400 rundll32.exe 30 PID 2400 wrote to memory of 2172 2400 rundll32.exe 30 PID 2400 wrote to memory of 2172 2400 rundll32.exe 30 PID 2400 wrote to memory of 2172 2400 rundll32.exe 30 PID 2400 wrote to memory of 2172 2400 rundll32.exe 30 PID 2172 wrote to memory of 2800 2172 rundll32.exe 31 PID 2172 wrote to memory of 2800 2172 rundll32.exe 31 PID 2172 wrote to memory of 2800 2172 rundll32.exe 31 PID 2172 wrote to memory of 2800 2172 rundll32.exe 31 PID 2172 wrote to memory of 2740 2172 rundll32.exe 32 PID 2172 wrote to memory of 2740 2172 rundll32.exe 32 PID 2172 wrote to memory of 2740 2172 rundll32.exe 32 PID 2172 wrote to memory of 2740 2172 rundll32.exe 32 PID 2672 wrote to memory of 2388 2672 explorer.exe 34 PID 2672 wrote to memory of 2388 2672 explorer.exe 34 PID 2672 wrote to memory of 2388 2672 explorer.exe 34 PID 2172 wrote to memory of 2740 2172 rundll32.exe 32 PID 2612 wrote to memory of 2080 2612 iexplore.exe 36 PID 2612 wrote to memory of 2080 2612 iexplore.exe 36 PID 2612 wrote to memory of 2080 2612 iexplore.exe 36 PID 2612 wrote to memory of 2080 2612 iexplore.exe 36 PID 2172 wrote to memory of 1780 2172 rundll32.exe 37 PID 2172 wrote to memory of 1780 2172 rundll32.exe 37 PID 2172 wrote to memory of 1780 2172 rundll32.exe 37 PID 2172 wrote to memory of 1780 2172 rundll32.exe 37 PID 2172 wrote to memory of 1780 2172 rundll32.exe 37 PID 2172 wrote to memory of 2612 2172 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5bfd797bffd0d482122f914b16ea6b0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5bfd797bffd0d482122f914b16ea6b0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2388
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f51e29bc9a38c2e497f6042cd3634a9d
SHA18d217221ccb642f2d85f1476be58805ed97c843a
SHA256c35fa87b820993975f1e686ec4e6946f948ad53debbad34aa89870093df4a9ab
SHA51204f758f9d3e0c4c6f8a995ec4073cf28c8c95620e915b213230d5eea875b97b935dd1ddee595903b0bdf63915f63dbc52b67975da4dd4dbbc1da9c5c45ee47aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704ef2931ae065df211ee3b6b556f64a
SHA1affbf18260d570fcfa7efbc289186e67a731de87
SHA2569e76d56160a3df210731168e1a6d7d3d9d0cf93a6701709fae5f41bd3cc4d495
SHA51284d4c51ff563a320d68f627c8fbc0d543d962855e2eb5626025f6fcdd9faf2d0cb77139c0bcbb2282db4a689ab73a6b19336392475c2548908bb0351d3f80993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521c7f59d6505856d7fddd61af9be0f9f
SHA163bcd41e7ecd07ce99f5f404be3b57e19f883dc6
SHA25601f4090152ae5d05f19c478605ede085cca4ca5520ab6ead727378d87160fff9
SHA512434e2c3739395cb08f41ba48fd85c2423a4d91f0a7dcbbaf2def2b1df04662c8b5a1ecf5c1658a2775d1139da6e04f443620259aa0cbb1ab0ae976c6aadef801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57afdd62a6ffd07aab3fd70effb313344
SHA11a0a6813d900c4d1bdfefa42658a2d5ac2bfb018
SHA25622b3bf3e36760bc474a56e7a747486a318eee3b1989cba79e6cd89a9fdba0640
SHA5126ed99185807b789df2fdffa426f254ba721ac5071931e2e677fe2f2e2d2d0c2e5e77224070c92aec7fe5b7d6a562be55f026698b532423d941f53318c3e5e7cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc9a4e91a2ca9ad6799b244954543f1
SHA16d9f9e16a4724bbb7c4fc6f72e7cf0743b402d59
SHA256b767b462f8c62598119f8c22f9a43952a61743535cb21b9ccea4953d48946b9e
SHA512fba489d7cedf48f477393674fe22577f45ee0d583714b1a34f48fe41776ec2cc986e7b847b98b77c9369c499400aef3f482c8afd8fb05e8efa8a3577438f81db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeaa56f3f50516658959d6f7a70c34ce
SHA1c8dab62d98de88f6f86f345c3d5ab6b94820c774
SHA2563de188ef5163f7ccfdd0101369e388bc0247a069e0762f546c8195bd7463ca4b
SHA512be2fc2da70ba4850b399b59ae245f994e7965468a506030bb8a864870cf11a027be915e6ce6ce9f34651bd5b65166ea6cdb4e3bd73b9d8a273db99decf699b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d203f5bf23b9de40db2fd24a7b000e03
SHA1662bbe0b7ae17b3b0b7110d9f24548292aa89b18
SHA25687b17c371f067e1f84f59cf6bbd2992031d6b5ad93f8ee2d8dc9bec50ecd3760
SHA512d5d97edd689ddcd207ac1afd8f50905579f6ff9a5dfe3560b74f48abaa700bf32fc78b78dbef218f339256e8306c168e2acd3200b2840740c600e8181c22d79d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5fd5407619f5feb255e0b012169d98b
SHA15e5caafd7ff9a2b2c5c39015e2187b433d60ea58
SHA2568a08cbf4eab9eb734a96c632a2be682658a7314c67c7542862e32824d2431b9e
SHA512fcc606dfc857c79ffec754bbfacd63e31e2f96f8f9161d9396754ee9c448a520fb1c44692b6b053ee6faadc7a0df85af1485a6e4b8e9e92ad831ddcbb476244f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd33424839b9af51cc9f9dcf51bbbb46
SHA13753cf75e7767dd0e1570d061dfc1b42a0f04b9a
SHA256fcb7fe8447409d14590e1f6856357264b107d6c240aa5337c897919c33190fa2
SHA5129eb1ce4b2689a861370fb0b0a2e9a06c20aa9f4f0938d0f3cbb292fc89cae9fb8943679a5ba5ad71273364fabd25a6d98e45e82e7a12876b430e996bca5ebfe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9375536d0b770dd3ce985936aaddeab
SHA178f5e8fc5ddf7b4da9117aa47bbeda71d6a94548
SHA256cfc45ad35dd2e0177ec443c477793f75713262dd13fe6ce01c5c34afc641e159
SHA5122a3351559740743d5b815238521da3850be4f08b888e86795d070b839eedf55b27e1c1ce4455f26b965761eb81153d5bf9a40b9906a8dc7fbd1d87d5e1d517a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b24da82e48c5366695207a893b8546
SHA1988ec33f7ae215e634dc90380196e352954a6a20
SHA2564063bb1729cc4778221e5eff11ebcbb27f0a25dd4690e540ac2496ac6c40fad7
SHA5125c978efaf6433427410bbd446575d1054c753c550dc0d080a410b069212363fd54fae1dfe8520f40f0992507026802512f564311ad18704531be8386fba4e1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f45ab7dc73947b2fee323db5694cf7
SHA109711841705077e25ee97d1e0283449fc41a83a8
SHA256a00d8f28c736569cc33a50efa78424bc9ea6a0f71ebc108eb80b6ebc567126fc
SHA5125be85c845e1722a78a87e4494a73080fb79fbd7396d8d651ecbac2b2cfef2e4f820d0ba8050be74746c143f20e8331605f3d19891b53b2ee863d47984058ae8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006569d57f9b169f7331bfa113aebc3f
SHA16fd0fa86853cfb6a583ca5b2bbcd5a1ca6953c62
SHA256b87c0a15bd4a5e7a09d8bfc37dcb4aba2b477112605e24312466eb8309f19df2
SHA5121a451ba3b83a1f14c62318f438d1c3377d4d4d6c007a9d87df6c0d8c3d2100af72ca565515f0c78a3b586d98f6b16219adae632cb5f3a2af36113fe1ed46b303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feab55cbcb3fabb1e60aa05c18602fd1
SHA1157843693170a54882e70edb6ead8d079a05df24
SHA256dda2793871d5831b2450e3f3e83bdd218d51dd0bbda2c96a76887724e02318a3
SHA512bb1eac14898ec1df7377ed72f5a16a9f52ed391665037e33c44e6fde5a96dc920c7897d2935b07147abab961fd12eff842547c98dc4dc5e6f3f07bc4bc9f9fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db420a934bcb23d7b642f401c1661e2b
SHA1ae2d83300477dced2d10c27191c9019d8a3e4f36
SHA2564c1abbbbd3486e197cc578b2b0ae43fe68280f565cf222547bc7e72d6c8b0d7e
SHA5121c4e4664e0ed02616e17dfae9f3310f71954c6fe9288a0c8a8a4f2626118099d589b0ab2d520265413eb1882ecd70150a3a31b43bd15952a39d13cf6e9cde986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86dc9d4dc008163ff1e8dfd14b01374
SHA120ff7d977e53d477e73a422e96bd19e521fd1b0b
SHA2568e9094cd7847e3f0e4211745f5a2a82f2283a8fb34d4953b3346aa2e59a2bf96
SHA512946fb5c1b74a83c3dd4a534953592ce185a3864bd8c07c183225a0b700e10503d6e471d86889b5426e02d2dc226a77690453c7f62afd274e9517a7d2683fda6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a41e72e1fe01c481f7f9547019f1ae
SHA1dabd77a69da3da51389c26d27532fa098160eb4e
SHA2563eda143c915f0c79957ba50eef7d8cfa375a393d20a2e06976b55d6c98eb28f0
SHA51272e86d381943eb731b4b00e5d0b8e3e3366e4ac16528789ebb0ab41d8ff3a636c6fd8901ea3e543b602b35e6fe661c230aac211b8a69fabd91f9dcc654c605a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e456f3cbd240daa68b757a2265dff8de
SHA1644d927349ae83f146cc4b543643ab936d8a7241
SHA2563dc0af5a8cccdc97f25750b3d45e8104e9fd0fe31d97fa4d519adfb85cec55c0
SHA51274d67380a8ccdea03b6f9d679169435130c48637de4d9d66583c6ccb3d47307f828007f58bb28fdad6c5d0efd5f9faa011a2ed0db5ee5903d2eb6be871574f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2efeb13b91c59625b86e57499d04385
SHA1b00540a6b2c2386bc6593513d3d6c7f86b5a397d
SHA256d786fa4a864228af59a49904d82866db3511ccb783397aa34a8341dd54266ea3
SHA512a79c5dcc6a1461e31dec1dfc326f457faad3f0f806cb67afc19cc3c781138a6732009f3d55951e3557bd39bb74ac0d1dd7005f6efdcb7701d72e349055a89acd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b