Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_43c9b064c53cca14a5fd69bb454883f0.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_43c9b064c53cca14a5fd69bb454883f0.dll
-
Size
163KB
-
MD5
43c9b064c53cca14a5fd69bb454883f0
-
SHA1
1bbe4396f9c91f34422bca99ee539144f739227b
-
SHA256
b5bde0d2915bee434e3b5f57c6a2198e0e83aee3aedfd0164ffe34df86e80725
-
SHA512
7066f3e30b18a08c22433fb8e996ca443f2885a4aad6c12c4f8f51d65d9125421ff825f1b104f8063ff9cedfc0ac32da7f5a496ce761bc1af6ee7db8173056f5
-
SSDEEP
3072:Au1+M9LMWrgturUN2z9hBN8rT8UxdcIK8zzAB46eocmfLSZ79ha125m5FMpED74T:fjEnmcGLSZ5k1XFUX
Malware Config
Signatures
-
Ramnit family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} rundll32.exe -
Executes dropped EXE 2 IoCs
pid Process 1376 rundll32Srv.exe 1068 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2396 rundll32.exe 1376 rundll32Srv.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini iexplore.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\sysprep\Panther\IE\setupact.log rundll32.exe File opened for modification C:\Windows\SysWOW64\sysprep\Panther\IE\setuperr.log rundll32.exe File opened for modification C:\Windows\SysWOW64\sysprep\Panther\IE\diagerr.xml rundll32.exe File opened for modification C:\Windows\SysWOW64\sysprep\Panther\IE\diagwrn.xml rundll32.exe -
resource yara_rule behavioral1/files/0x000c000000012280-5.dat upx behavioral1/memory/1068-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1376-12-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1068-23-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1068-21-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxB2AC.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Suggested Sites iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Suggested Sites\DataStreamEnabledState = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LinksBar\MarketingLinksMigrate = 9001bd29f45bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Migration rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Suggested Sites\MigrationTime = d03eb829f45bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\User Preferences iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67306B71-C7E7-11EF-8C85-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LinksBar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TypedURLs rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\User Preferences rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LinksBar\LinksFolderMigrate = 9001bd29f45bdb01 iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Migration rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\User Preferences\88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977 = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{0633EE93-D776-472f-A0FF-E1416B8B2E3A}" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Suggested Sites\SlicePath = "C:\\Users\\Admin\\Favorites\\Links\\Suggested Sites.url" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\User Preferences\2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81 = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b8687c9e760b34b8bb27c31fe60f67d00000000020000000000106600000001000020000000fa38125ea6825f8fa5af5657bc9866bd71db9a37f02a1a9aa1e63fe0f53ac213000000000e800000000200002000000080f12ae4dcf2cd065dd1be0abb19fe9a7e2216c9a918b4d3b43fe2024f8ee12d10000000295a0f0e37db2f66011336baad22ac5b40000000113a69be76e0f3e61ced9e83d80b36c09d9b74961a867d8aa8327f305fc10c18611db1e1c9d04a23bd1d287874f392cc067461ab6b1a4da5987f4bd5956d3dbf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441860083" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1068 DesktopLayer.exe 1068 DesktopLayer.exe 1068 DesktopLayer.exe 1068 DesktopLayer.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 2396 rundll32.exe Token: SeRestorePrivilege 2396 rundll32.exe Token: SeRestorePrivilege 2396 rundll32.exe Token: SeSecurityPrivilege 2396 rundll32.exe Token: SeSecurityPrivilege 2396 rundll32.exe Token: SeSecurityPrivilege 2396 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2396 2148 rundll32.exe 30 PID 2148 wrote to memory of 2396 2148 rundll32.exe 30 PID 2148 wrote to memory of 2396 2148 rundll32.exe 30 PID 2148 wrote to memory of 2396 2148 rundll32.exe 30 PID 2148 wrote to memory of 2396 2148 rundll32.exe 30 PID 2148 wrote to memory of 2396 2148 rundll32.exe 30 PID 2148 wrote to memory of 2396 2148 rundll32.exe 30 PID 2396 wrote to memory of 1376 2396 rundll32.exe 31 PID 2396 wrote to memory of 1376 2396 rundll32.exe 31 PID 2396 wrote to memory of 1376 2396 rundll32.exe 31 PID 2396 wrote to memory of 1376 2396 rundll32.exe 31 PID 1376 wrote to memory of 1068 1376 rundll32Srv.exe 32 PID 1376 wrote to memory of 1068 1376 rundll32Srv.exe 32 PID 1376 wrote to memory of 1068 1376 rundll32Srv.exe 32 PID 1376 wrote to memory of 1068 1376 rundll32Srv.exe 32 PID 1068 wrote to memory of 2288 1068 DesktopLayer.exe 33 PID 1068 wrote to memory of 2288 1068 DesktopLayer.exe 33 PID 1068 wrote to memory of 2288 1068 DesktopLayer.exe 33 PID 1068 wrote to memory of 2288 1068 DesktopLayer.exe 33 PID 2288 wrote to memory of 2860 2288 iexplore.exe 34 PID 2288 wrote to memory of 2860 2288 iexplore.exe 34 PID 2288 wrote to memory of 2860 2288 iexplore.exe 34 PID 2288 wrote to memory of 2860 2288 iexplore.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43c9b064c53cca14a5fd69bb454883f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43c9b064c53cca14a5fd69bb454883f0.dll,#12⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Drops desktop.ini file(s)
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eab35cdb440861188475bedd958f2f9c
SHA1321de361d8836176c2104445fcc2deeed8adcf75
SHA2565430cb92e7d2b32e0f0013c95ad890a076b95edaf7ee8b37eb72fca9f48256db
SHA51299b020a640506cbe54eb408050bd3e978b98a127eec369e2f30e17409408a7f692075141a35921b5da0bb67b553b20678cbfe936c7d9fe26c3fe6ce4c29f7eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efac68e85596d22411bab555a3ff889f
SHA1e8b2c22f95e259cf8eac2fb80eadc24fd68422da
SHA25643625b2b2be543e83f8a8be6b61c009eef0194f0c4f0dd24aa74f55a587dd369
SHA512b17cbdd8f8073ae230d46ba0293ab10a0e5dbfd5f4e3ff1483d37c16bc6179ea0a1f993fd505576d5d5bbe444fe768afdcda069cda1c38e36832bcb2454f0adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59faa688a8884610db6afe62e9d283ca9
SHA105b92f8e4cc88e2ebcee63a4050e86da9916c3a5
SHA256355674df135b437b8765fb88cd09030f254bdf9c4d593a77e7f966fc15eb95da
SHA512b00a7ead253116e3859fd038ddb40613f5fbfbb7dad2c1b6ff22df71de6c190bbfd57d021977aff5144134e8008a464e94059eb67c35d36b12eb755fc3483e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc643e6f609178184d48436648baec5f
SHA1a0de1549fdbd5c3f90241b950db0e013cf51938c
SHA2562250f9aa1617b252f33a165ff2c2c796cb9065df093b9608a8cc2929fcf4578e
SHA5125e465d4faef8736df128f848b35b25644e3688a93a74c2b9964d16024774fa3f4bfee0ee92e0281715df899d6e140a7c6a8f85f0ff36a6fbcb88ea6d97227a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c0260e66e7099f1c1f64a9d1ee309b
SHA10b74140c0a74e1056c3928fe66654a0d54f865fa
SHA25640ee914628cbc948e562c23225a3983c3ec19bab7d652e09f40f1aa19f9f4bca
SHA512edd38135f6e76fb90120e0d2f6a4fd3c6b56f80270584562a4082e42ab8e45f96e11c3671aecd315dca5e541c0742abf6ba37495739bb8c78e3b0b651bba4c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad5e8110db657837196f61add0556a9
SHA100232f089d4b96f852d804ee5f74e099dd401a28
SHA256245011d93d51147bc7aa04315200ba78d725f687977a3b3ac3f9c4776d4b21f6
SHA5120253b1eff279937d7e82115a0bfc629245fc55b24a0ad7f9902a02c8c85eca18b2898795965fbf8e2db8ab46f261648afc982846d4010f0b5dd46d98b7fb3fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ac914cc586c1b8e5a221e6628744d8
SHA1352c828ee73234307ea7cf3623a97799ceace485
SHA256a246a593954122ad8a52003aa303a0f2a097862ff292d4a279f04ac80bfe8695
SHA5127f29c61f31c6f379fd1d31e485e12940407b54bb5a5416262c26e21938d73d42d4a6bbd8bd0fd95cfa14f459cc8ce057aa4e6bea59a8505ba186a3d629ad3d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d63e19ab60fab785c5ae6fc0d665e6
SHA13503dd5d43c2ccd879704c2c4b0741943bdba706
SHA2564abace0c901efbb72626f60880a7f34324a4a9d53fb47ed4a02b1dc0db15f562
SHA5124c4268e15b6660f954135ab58c16d93c487cdf93369e6af2950705aba4df76c3bbb6f00a9178bea2a015afef4b2f7c86ed2314a6771783cf0a82995ecf177d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520151eb3143b8f70d16ddfb85838ebea
SHA17a3488d8a950fbd71279640426496289d8844448
SHA2567c2bdf5e7dd54009df0e609d4297fe13a0356a9b39e100a16d46b2b2a382e440
SHA51265a3f9c0b52cd1300111ddd490c52da5613a75ee576a9cad174b4828d4da7dcbb1fb691a9d7392cfe416680ab32c283dc84af252e43c4f28e7a8edeee2a83ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d9b5cfb4e573bb8aaacf2ff0d75bf3
SHA155ed3bf04733dc11fb310836a8b7c06f939fdaae
SHA25612ce615a664ea65bab1c6e28e15a2db5620c043fab8c603da93274ba9876434c
SHA5129a42946e8c0206ad4b325b98156c73effe681116328bfc29e4484a9555113843cd7f71975299d39bc49a9b056ba52972cbe614e5624918907397a6d1d29e496d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a85e1dad6f891d37406081c3e0746518
SHA11c4253132291b2a151d4210273deec6f6e30302e
SHA2561e2025149887b7e3cf31cc94611f2bed8efe241365137eee1226197fbbee56e7
SHA51227471e34bc505704c3e2401e5456e19d28d825472ca61a06e144b3c81e619e5d19c9e70aaec77b8a76c4b86e813e951b43ccc54c5935d66ced49cf6a664540b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572a91b0ec79e8c51f82bb7498bff7ea2
SHA114e29589a13b7fb21c54566053b5bdd33bd9ef6b
SHA256d951d8b0a185597561fc065042f951fd3adca893c568627062d1fa8f2a0769b5
SHA512bffe61df58211698fa07cab17fda8167e1c2587d9f80cf27a9a1b98bac7372f5fc0ee229f1c2cd5bc21449dc08e662e68f6ee6b30d37fafcf014f167c7153571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e55f0db7b63861e365a17b0ef2f26669
SHA19c44aac31ae4b3ddbe64140ce2e28294dda46241
SHA256be55e8735457bc463a83350140b4e12015dbbe5c0f57a7f8a35b1044a1d9b8ce
SHA51291475c94b4ce32fa795f26c6dded8a9a19f26aa2104f90dabcc972a957b419fd8f6ea3b8b92f5d6a8512249d4a59f16534954508c4972b9d5583b7143c6f8996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056a07c42206ad79c2093bf5549bb5cb
SHA11ed746077215387ada2704d5c1fbfe6628ab1957
SHA2563b5e625d6fb09eaed4ee1795636dc46daac5808a3dc39d03280515e0b62c1e09
SHA51206139ed6c6b7e1b2cba8e46374ab8ac5a87da50cb450b6be68aff829f2ba51a5a5e21cd3c12c6af7534b6117a02ac8b9d84b942c571d8543c1372cc14a55b014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585dd0ccd3db52efdc2ce68d25401c693
SHA1c5f22a67abf3737366090d9ee0fae8959c922492
SHA25677c04345a0222ab45c715c62ce8ee34dc8a1b6f2557cc907c506ffe6c2ba3873
SHA512526a2b0808606246e8e592e597a017fac61f215802ed1496cc0154d582a34833e337d15f0c81cc053eaedd35d0d3b512b1429b82554b1eb02944590cf1818287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5505498c77ed7997c90d7396492fedf
SHA12d88f436802071e42bc51f2992655bfb1d323e35
SHA2564cdde623e7d20f68c2dd861fb0db576968b0e8b3a0f684668aa169d5b754011f
SHA5126630b27ac7fa87f55cc8afaf9176cb5d680ba74dae0fc2e9f04f52e46c230789603018f70c5d263b9e1f65b48d924d0066fb9cd04c40413a76b8f86a3bea52cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5985c89f6d3252393004f1586169196a2
SHA109413960a5baf13126b78d30832eaf5187f932c3
SHA256321688e3bd0b3b68ee431327bc937cd7a9267b24f896bc74eb3771b75d447dfb
SHA51292c544395a375c6cdfa10b2ca2771b0716d77e5302768adc33f8d45835f0b94e1f1098f27e492383d66b9f62046d949404954ce1cf755ba7089bb94d7cb446d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e285efe92070707cb88f16c87cf9fca6
SHA1fe5c47b9040816aa023cf9cd097451c40f9d426e
SHA256c899087cad15a966ae1d15cf65472a0958f9ae05c64c1e3a381fd6dab2a5f5bf
SHA51299edd3f80d7b0448f2c60c5b656c87ed8ef802a48c8d50fda14102cc45bb25ddffc39c7be488606e35c17f425aa5b8586b5e3c159f983fd13419bb65f70cde9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502ae67d195dfa348d6cba4b9022d01fd
SHA16981b8b6f79b562dffe405017e3ebc50077fd3c2
SHA256b60c7e2be35159738950e513a98c93180c4f2f9feb3bfa0fddebef7918b63e96
SHA51268c3c26738ca9a4351c04317b97e86f819bac7617a152890d8a4fd50a5303da2d99583b5620e74572d60010db51833eb204bf8425c27825f2cfd3d857842923a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a