Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe
-
Size
472KB
-
MD5
481d4ad02cdf2df6eee1c457e2926680
-
SHA1
fc85e85fc427cbd2467d2e5de27364b8b1af131b
-
SHA256
bf7727316de30be25f8345444c04c9946651bfaf9fd9469c2f43eebe2139b2db
-
SHA512
3fb65cac587fa05e2e305f0bbc4101eed6cee7aa18c414cb73b3307564f824479572fe3206aa8ad71ddbd2f1b8884f2b43daedc0e2e6639330539c824cbb385d
-
SSDEEP
6144:1OUspvqn/wU0mhJJqKOrmDt4jIBpLBnBWPzoYQ3jjwmVO:1OUspYt6jEOi/wmVO
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2232 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680Srv.exe 2772 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2264 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe 2232 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680Srv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QuickTime Task = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe\" -atboottime" JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe -
resource yara_rule behavioral1/files/0x000b00000001225e-6.dat upx behavioral1/memory/2232-7-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2772-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2772-20-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2772-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2232-15-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\px1BAB.tmp JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC566091-C7FD-11EF-85F9-DEBA79BDEBEA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441869647" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/quicktime JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\image/x-quicktime JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\image/x-macpaint JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2772 DesktopLayer.exe 2772 DesktopLayer.exe 2772 DesktopLayer.exe 2772 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2264 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe 2740 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2264 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2232 2264 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe 30 PID 2264 wrote to memory of 2232 2264 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe 30 PID 2264 wrote to memory of 2232 2264 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe 30 PID 2264 wrote to memory of 2232 2264 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe 30 PID 2232 wrote to memory of 2772 2232 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680Srv.exe 31 PID 2232 wrote to memory of 2772 2232 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680Srv.exe 31 PID 2232 wrote to memory of 2772 2232 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680Srv.exe 31 PID 2232 wrote to memory of 2772 2232 JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680Srv.exe 31 PID 2772 wrote to memory of 2740 2772 DesktopLayer.exe 32 PID 2772 wrote to memory of 2740 2772 DesktopLayer.exe 32 PID 2772 wrote to memory of 2740 2772 DesktopLayer.exe 32 PID 2772 wrote to memory of 2740 2772 DesktopLayer.exe 32 PID 2740 wrote to memory of 2864 2740 iexplore.exe 33 PID 2740 wrote to memory of 2864 2740 iexplore.exe 33 PID 2740 wrote to memory of 2864 2740 iexplore.exe 33 PID 2740 wrote to memory of 2864 2740 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680Srv.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_481d4ad02cdf2df6eee1c457e2926680Srv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde84863bb58a93a27821631b34af992
SHA1601fcfbeeb0c66cae1a1bea4aaac623418398ec8
SHA2569a5abee1a4beba6de66256f0db772dcdcec76bb5d9031192f6304a317df52fd3
SHA512fd93fbda0b06f8a0ccfaa5a2177bebd315ca6310cd34694f843806ee44d65a474b84f42a288d2eabc71f36cbc26379756de734e72deb6d710787e56522e77fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27bb83346e92d8bbf42e9b6d16caa00
SHA11c5187523fa9990bd9a978f93d52a5fde76d2962
SHA256ec71b0e859d1d4fbe496b053b9f1f78d919eb05f8e2feba5dff22c48b92ef3c6
SHA5125254b82f6eddc7eaf0dfb197496da2439f8bd45c1446c3988fa43efb175bba14b751afa049929889a9d3ef8ad1d62016f7f564fc52d9f88b09250cbefc579df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f244bb14d9f3804b17479a3dc581adba
SHA19ea52f2079515240e467830152b569800a8bb191
SHA256e5a7a7b46cdf99002940dec410af8218c55066a31f7a10d2ce2808d413093702
SHA51218189d24731aac49ed5a52c1f48133f6879fd73029a41a8ebf07459a739def4b666ca62125104ac47915b493ade9fb39d1ca33b7fa144e7c582df4499ff88a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b69c25778245bba8f50068701e75b94f
SHA14d52c5b44a9efd62440fb253d58bd6412bbaa057
SHA2569d60d0f6e6f0f8533329ca42eff1365ea8b8e3d07357e9dcf429902d90b0dc28
SHA51218bf71d7f0ff58511881b1f8e974fd2c7fb0c71b357e4c319b51a51cb7c7e784d072a9ed9df28ee472d292ee9a92cae1ff059c62798779b254cc379539869704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bac9aace249dedca2f91550ecf3444b
SHA10e5245b48c39dee15995c6c0d4131fec23ba5346
SHA25693f6002c4b9fb7ae0ae826b2df710b04abefe2e04b05daaef6cc898d12e2c03b
SHA5122c084d1dc4e01f33ebb1d8c9ae4123ec926b12afd0dadc971b26653472099164c97a52f8301d2351d7779b0bcf6c58e7700391cde729f42753d3aa437ed3f536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14bdd90b5bec19ac37776e039718d63
SHA19811940e1111e5954a5e4ab6e4921c3856e4e90b
SHA2560830389d0c4c570a25550698ec0d2fa46184b55e7d109899abcc2b8fd21c98d7
SHA512d745f652073da2929bebc7909ea586e39c700b0345276fc523e1af29407890def465a7f5c767a060655add359666fbf6bcd5d0449e3a84c0fc87be9484e0e2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320e87124780ab0c3e5674a057381854
SHA159562863b4003e166b12e99b5e2962eea97ffc6d
SHA256aede594e7017b5ef20faf822b82aa2efef8b0d85e5a4099dc8db2de2a11e9118
SHA512cd9eb2a480a2579888330e324fd8fa8920e41b52940b737ae6af0ae6286f33af6b3d41956560c5228212a2176bb5e81b08fd19a1f459aac4181f13b3e341d796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b494497ab53e0b3b43e838c74117d275
SHA118b210e2d386d41f53dee2e8df8bd037c404e3b9
SHA256de1b355a777b25c5956578e6b0947e74742556946d2da40726c909316568f8f2
SHA51227e831ea073c39f59f689e78b4d00536331b837fa8a553d07520499af6d86586fcf35a0366bb12440b044915d11ac0a8a7b4ebae354c28a9af8a3304dc5cb8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584b0f5c5ed0e59c67ebefa0e0a8da999
SHA14eabfc786e313eb62912e3a82bcd845982fcdb94
SHA25625b5632e189a32d84037687b0f9d48f91563e329e2c9db0ad36a8a55ccfd7b96
SHA512f0d0710b0823ca40d696f59e799eb69ac82d419290f24518005f1a7e52f8c21803d5e8d41cf0059b02a29810d7d887d141c6ee8c9621514b7fa205fa7522a77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ebb9913e10e25245976036a46d8b59
SHA1172b82bfada1d1edc1539bcff495df5d642ff8e8
SHA256aaed7c4d24a6fcfb253460b78efeadce435f7ef9a708104759458e94233a9981
SHA512f3d55236653ce3b9ca0ee44dce392ae1fd4acc5b487d4185d3ce7f9ff204a84d30ed66f278e12d9f6cd8b54c685efa7845bd2e3175467aa5fc646a1b0cf62be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0690e730b4db2b47d5de2eec2f0bb7
SHA16f3d48fdcd561ae33bde06fcc866a14b518f6aef
SHA256e480cdc69a8631456b8e4a7d76618c810f03983389d5fe1d96533a0e8e35a11f
SHA512e72681b721537c0cf2d6ed5bfa26cf03250a83e7e9f349e84fd5157799e633fbb63061a65d0475e11da0bf7df7e6de384d3d9c27a61c888dfbf510811893ccb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad89e591c72ee2f3242a3a2cf384368
SHA1c457b52036445c51d1be43758f9fb1baa561b599
SHA25666b901838c81e27b7ebdb0d9d5ee242de6df7c76f1bc3c9f444f7d8e49647801
SHA5120f3cfd012a2117936ab423f5ad46ed842fbb604eb01aacef4fa64da1509ac23e1d2a674a3c24facce3485271c99c99ff008a9d701ab07f03282fa6a89029689e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5e97e75e407b28c1959e38b9dcf713
SHA10f01bd602695fb0af62a523957ffc07da22be07f
SHA2567e2f860085768e5abc900f8ffe8a9c92190ffcac0b5e0ce8f465523b7b7c25b1
SHA512f2787cfa1a0619955ee3409404c544bc1ad078390507d238bacba2e23e30d0fb5c8b69831804a227f3a55b14decaa511b8ef8b50f3549f5dfe51e78badd6ea59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d6014af2b2845d533ad1afc4dd87d07
SHA177ac436a84509a75cdb9d4b8d18a3fdeecc6d076
SHA2566a3043f8f91a2bbd6e271d89f5000c25fc460f22207fc3e623dacbb149e02276
SHA5121d101003bb4fb0dc81efe5646f7bf9fcd4bc3a5d8a1c768a424c1c69aa6dd4f44becdf2e411879995faf9c40b9e642043bfcb7552da72b6720fd40b8c039973a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bdfef0a62b1b3e1d1b99e0ee48d58a5
SHA1dce2db7e1fb9d758864be59884553604b5b2fe96
SHA2566bcc3a9ba1a2ff97f92d98c078002787379bbd00479b7a1d70e460b1cda6527a
SHA512679f50db3311a34a70bc24ca62ac6019a53e1308412158b13dd016599ca41486df82e0a3b7ff31dd5fd0708c6ab28aa35addee8bd22bf784f4a1fc59b35a6e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516396ebc4e4fd12646c595c65305cfef
SHA148bcf2c0dadc22968e89ca50cdb1fb6adf2614b0
SHA25611970c74518b4278314f6b615fc9a50ca1ad19392ee52d92adca86d6a4f8c3f5
SHA51210f09b580e941802367f66d9adfd9834598b4782fa37ad2e2a5c547578e04929211baefffe2387c504ebe3bb2d9d1cd176c9f46dd7fcc9dce21cfc22325ca241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6c9db7d22688b6167d8569b8300f89
SHA1c046218ab85efe75d667ae9afc727387f2375ee4
SHA256a2f6ecb0d79f904facecf27078dbe8e6bf15ce6109bf7b7d7a79cb6ed8a35669
SHA512f80383d2f3865996c8da060f2fc9aa440741efaf7ca15eed59bcfd5bcdd1e44d0cbe265cb41ec629970bf80706e62522935e38104e2b503af546721e285455f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546545f751f711e67ac36ad48e1ff1d50
SHA15a3c166bed98d84d6917661009410f7f8a4df9d0
SHA25675b546b028f79ca61cbcb8f0fb157322eab7430ddb53792a665c04dff912703a
SHA512f49fcd604a58a73d345d0fb2dba9959bb39461650a1371975b7210524c290ae9a2febeca2111864a9198b692c436836b3c5a07addf68a873d1d39c011f1fa5f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e3ad5852b8f6c883f5de1e5ab08430
SHA1a2e4c9cab6ad398236dd7529e59e6a6e5b91f000
SHA256a221c1ad7eff1d3717d80cc98af888d7b19d000f7258db581b7031551a857589
SHA5122ec6a83f26688eed50cccd2c6d575073a207ae9c965821831e9c3233f3e90bb575b854c80ed97b06b4974fc4277d7019975928867eb5684d9726673b4c03697b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8e7236a8ccabbec79e87a39edd219f
SHA1cfb4fa57a1b5d8f7344166756cc3154e32fcd5c7
SHA2563326c2fcee5288ef41173549fbe9ada55868a320d24ac8001eef56b124677350
SHA51233930bf2459c7ab1e3509b5caa7990a75b38cf2e9bd5615d8f186e62de1cd1120d6e58e50b8e79918b61a9c4732e040e0d5e04f4c62e5968ebce8349357df86c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b