Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/01/2025, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe
-
Size
1.3MB
-
MD5
62f71140570e0946e49e9792bbdbaec0
-
SHA1
e3cf9eef5b6528eb227bb4b561550a7c88a3ea47
-
SHA256
5d7818e9458ee31d2a5aa63b27fbd0593c6816f192774a3f8e8489af3026b2ad
-
SHA512
b513c456bf4e13559aa2275348fa2c1964e03a71451d9d1b3937c1be1c4bf859fceba40fd2457fc22fa1af03227ee6cf2a960b252e1250133612ffeea1d8ac87
-
SSDEEP
24576:htb20pkaCqT5TBWgNQ7aLwKuJJZ8IqhnW2+KEHJHUuYyYp8bqZ0cOyKEYZ6Ai:yVg5tQ7aLmJJZ8nkJHTYsOecex5
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 3068 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0Srv.exe 2320 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 3068 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0Srv.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2672-1-0x0000000000900000-0x0000000000A5A000-memory.dmp autoit_exe behavioral1/memory/2672-20-0x0000000000900000-0x0000000000A5A000-memory.dmp autoit_exe behavioral1/memory/2672-450-0x0000000000900000-0x0000000000A5A000-memory.dmp autoit_exe -
resource yara_rule behavioral1/files/0x0007000000012116-2.dat upx behavioral1/memory/2320-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3068-8-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_62f71140570e0946e49e9792bbdbaec0Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxB1C2.tmp JaffaCakes118_62f71140570e0946e49e9792bbdbaec0Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_62f71140570e0946e49e9792bbdbaec0Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_62f71140570e0946e49e9792bbdbaec0Srv.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441957809" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0FDA371-C8CA-11EF-9982-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2320 DesktopLayer.exe 2320 DesktopLayer.exe 2320 DesktopLayer.exe 2320 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 596 iexplore.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 596 iexplore.exe 596 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2672 wrote to memory of 3068 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 30 PID 2672 wrote to memory of 3068 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 30 PID 2672 wrote to memory of 3068 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 30 PID 2672 wrote to memory of 3068 2672 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe 30 PID 3068 wrote to memory of 2320 3068 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0Srv.exe 31 PID 3068 wrote to memory of 2320 3068 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0Srv.exe 31 PID 3068 wrote to memory of 2320 3068 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0Srv.exe 31 PID 3068 wrote to memory of 2320 3068 JaffaCakes118_62f71140570e0946e49e9792bbdbaec0Srv.exe 31 PID 2320 wrote to memory of 596 2320 DesktopLayer.exe 32 PID 2320 wrote to memory of 596 2320 DesktopLayer.exe 32 PID 2320 wrote to memory of 596 2320 DesktopLayer.exe 32 PID 2320 wrote to memory of 596 2320 DesktopLayer.exe 32 PID 596 wrote to memory of 2684 596 iexplore.exe 33 PID 596 wrote to memory of 2684 596 iexplore.exe 33 PID 596 wrote to memory of 2684 596 iexplore.exe 33 PID 596 wrote to memory of 2684 596 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62f71140570e0946e49e9792bbdbaec0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62f71140570e0946e49e9792bbdbaec0Srv.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62f71140570e0946e49e9792bbdbaec0Srv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:596 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5709415c7684b52b7ac64d64bc1b279e2
SHA171572eb7a455432d63d7e1e6431501cf0c9d14c7
SHA25649b5acd749067b95b2d3bae0d3e69c13bb47db132ba0a47da258f325ae35383e
SHA51244100f86168e48719e60a106dcbb00155f6bdeb12b3d743977a81fa7bb908774601db5b5047e181bc17ba3dab309b3398529df99e0297b65ae8ba4978c73830d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de52ac61b158502698dafe44ac57cceb
SHA12960cb8617a3038cccaa084c4183f8bb96566eeb
SHA25651f337d935357555a754e15f756cfcb8a2b02d9aa783800b6b00f9eb8d17aac1
SHA512421e541dd6e35833e2acf123a39cd1561d8297c5d68643ffe9714cc0ad4e7fb9112cad2a941e1091a3a3041f5d6d7cfcb049cc01a905ab0e0f9f0a5e90381363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55015d568eb8698c876062a8b2715792c
SHA16cb350d0acd642ffd5e5f66dbb5137d958cb1536
SHA25682adb179a8500d052b96ab7875de0d91b9bc6fc42cb43b5eaae8023fdc96d5c3
SHA5121d31c18f34553e2e9a2584cb5c80417b162be4f352788be4f3433a808710a73f7e99043e3463744b2db3411cfd8ac557101c8a6577524e829ad7d922a31d90c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5014be008afe8734d4e17fcd5491aab19
SHA1d0e8d812286d189225a1d7478a951babea9f67ba
SHA2561cde85725a32022794fad301580bd61b9b62b4ba1462425fa535e4d520b34fd6
SHA512687b9345a445e5e555aae053d70b2dda9aa40d79c6b52f38b53642519dded8056a8e65824548cab381facbed5790d5317ea338fac416f8d808f1596cc35c3053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595b5571b415f35251273f7d5011c5dd5
SHA183e9507a975dc0efed9689665fd7583c569d017f
SHA256afd0e15f34849095e605913da0fa842d8cf0c14874f81e66c831b10da06fc3f0
SHA5128be62816d5b65e0ed06eb79c42a40545498b3712785d9f7808d3d4b23e42a0989ea2011ee2e6918e3e62a3462c6c208992d357865ecb2065dec97036297a6690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539b7a5b51ddb6fb4834f9dc5df5f2602
SHA159b10f2df6134ab0f38211bd3abb942a004c03bd
SHA256a213525d12aa0e3f3cc35ea815b1cd8d9cadd5c861b00179a525f0e0248f36a5
SHA512c0f0e3ea7d8996aac7af1dbb7fa02c60077c0d9a42853ef8c10052d35998b9714442fd6e67a183528c05e310b6f7e841259639ecb8d390a90b3d9d9842f021ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adebda445bc3f92b53c2380a7e26890b
SHA1b53c9c7c8e74d9a9612a3489970e993c2b982bc2
SHA256046df732ac33a361663cd9f4b886b646630f3bfd71943e67d33a339832af67cc
SHA5120a8455abb07f96cde920ac1d20ac12d4b216c2b69be8e05fe18d30e7fe31e4c837e830c42f6815d7b9db6a7781c65e9ea41ee6953b30af7a66a72709be51e202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9fc6fa27c268679c0f8424f7c4e444
SHA13e4f974e6fe469fee9b2c888b00b8ca661469024
SHA25639f1329ab9ca2413cf2501329f9ebc5800ae3bf13300d116beb6a72476ef1fa7
SHA512aec78eeff5c27a4a7211aab9934dfc59a29005e670a6b3ad673a76083cc69feaf4d74142d83460f336083aa83306c1e454c9e14875b5809fc3551a69c7738574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c21a2827fed0e60948d543ac8ab8ecc
SHA118e3f6c5d8be4847ec7803e11b366b852c1ee2e3
SHA2562a022d04110ddc5646d239158ed5e9c4f2adc1608f5a96bad319a158ccf590ea
SHA512dd9bd950314378bc2ff8755641ce98608417e0dbad105840f6eed59ec9da804d4454a591e320ea3a2d8096c54cb4d2c01814f3ab27ebbc9288997ee6f6417032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557390dc8673db355d39fe6d33b476f86
SHA10f583e5c309996aa26f5009bebfe5cf66f1c2ab3
SHA256556141c1526030059d65c8db7f2f327529eb1b3527b0a2cffda3adcaf780782b
SHA512724caf5b6bd56eda8cd5588807cd9c0a46a02195b248c33484468d4adf5924adac7ab60ebc2e61dae1b95a67c7daa63873c9f756e5998c28e0caf63365b90a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5336cce852ca5f3827ec486e467b22242
SHA1469be32513775f6a55c9657cd7cd7695314e431b
SHA25687d0086c5c0b0dfd529c12ff54b2b479a73ea98e71f36eb27b26995909147cf4
SHA5123fb6fa944661715a7017530ef1d97e3d73eb284042133e5dcdd8f99570390c564c6e9da97d51140179eda6374854895dcb4982089d16855bddb935725df73c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6b1ef371f1a95e784aa5bfc5303aaa2
SHA1bd3185ec943756a3811bedba2f3652d0512b84eb
SHA25625f42a32a689c55b9df31ae2c11427451d42c859b718ec771d74e90e1f6567a2
SHA512a702df2eedcd14f3c3d4cdd55891c95c4cc22bd2d92164522ee5b3bcf5c11a46c094cd195471099762055069694914373d8ff2dd2cc6daa1ce572d4f3762a355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f472383e29e3421e2bfbdd2694048f
SHA13e5d535fa4f42bcf88bd814b68ea1e08e96fb856
SHA2566d6a079a0efb3e2d0857ff3032de9dc47089d4d7572541f77983469a25b2ae95
SHA5125e1a232da1a1fca99ae7cef57ffde84a7fee7284a11ccd74b66872b06771c39f4a429dc8ec93b7e1b970c7428761c92be85dc1a682e3e1950598e05f60d63799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca0c9885e31e4c8a6020323452c8f704
SHA15ab15483916032ae469ca4fca03a7d15c2045e2d
SHA2567cc0baf5baa60ca3fbb5a08b7787f1e6c044994a2f6eaeb6e03c21f109c588cf
SHA5120afc851a8ed33a13abadd15d881d84ce44ee5d0dec55c0f4d989ed7de10a89cc5c4cdafe39a2cd0bc93c48ec1b4cc045de515b7c1e4edd6cbbb73e6a3a975545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad180561e7ca0f7b6526b9b288f3610
SHA1fcdee593f82bb811a85b90359cc53422669595e8
SHA256cb300422d0d21e3c033efdf64ccc2e41250214ef0a225f4b27711cf8229e024e
SHA512735475b06adb9f31f515b4d3b0829faf325808b307224b65d0f68bb380f744c55093ca64fb17e603f5dd08ff987c945e4b69d697eea8037a4256db3daa715a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b5b7e0e6d41aadd36e889cb26626b9
SHA113ff350828900eec83bf73286b643100d69db7cc
SHA256fbe018cf3cb7b2e09091f3fdd1bc70f69fa435399734ca284d4da5dda2a8477a
SHA51269167274a4edbd84832b42a0f177fff7e2b48326614495ae95330976ac59965eeb20020424895d01afd22d242a8fd52e85449b84824de46a901ea4053d1bed3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed7cc95dc1723378751646a9d730439
SHA1cba909fc2ae70a7f64d3c2c893c579ffe74af56c
SHA256692a380347accabdacb4d23b0bc84048f977b61e8262237311034112708adff7
SHA512c32c03315f7c51f385deeebce098498dbcc6781f5dda6cc1aa76936ceff64bc5c3c58ff2cd80a962c970d581f2b68087ca1f694bb6d2990281ad9e901a474db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599477b2e7ecf71d28548eedfc968396f
SHA160e74ffe255cdaeb70fe7a3a18c0f97615d61755
SHA256862ce10f7962a170fc3996debffb196d39694ca69fcd0457f2131d561e316eea
SHA512ba9560f6348783f5b6cb2143537c5500fe5acebd906436e0134583d23a74ab38b534372eec9f42ac6af78d1c756fa87426a033aad55e0041a8ddc9bcb91266fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728c8d3b05c73401dc2ed1a4e3b04952
SHA16587462a1335bd679636a1e462f1e6f67f60c125
SHA25697be7bcab27543141df0315f716979182c2f26d13000c02c4d410f9cce5794e2
SHA512d0947cf3bb358b80bca7661dbded6a7bd742b6cd5673973d88e09d6dc50efd11780c2aed77a03cf23e4d7e0f406a8304a909b5525f63cfd43145e42fde91e8dd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a