Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e259227d76ad84df2619c43e04df0aaf.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e259227d76ad84df2619c43e04df0aaf.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e259227d76ad84df2619c43e04df0aaf.html
-
Size
53KB
-
MD5
e259227d76ad84df2619c43e04df0aaf
-
SHA1
64fa69be37ec3a4eff6d247f03871adf9e48ea39
-
SHA256
4d6a30d7541082c22e360a4a2406933a96e0e4fedac57db42a730089a6d39894
-
SHA512
b28b254c8bfefe36e1bfafaf54815b094e16e4f367b0940aeaa7fde6be96a7f5beaeb6abae8da127dcb1a8bea61d814013fed822e0264f0d5f042a2f3fd2c441
-
SSDEEP
1536:CkgUiIakTqGivi+PyU5runlY263Nj+q5VyvR0w2AzTICbbKo3/t9M/dNwIUTDmDB:CkgUiIakTqGivi+PyU5runlY263Nj+qx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8040cdd3196bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525496" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDDDBE91-D70C-11EF-BA44-CA806D3F5BF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b522bd31d67834892536aaf062f2ee80000000002000000000010660000000100002000000042c98b49d3372e10b516b72f7767070099a23d2e52435e85b60d1747018b1c69000000000e800000000200002000000086b33c3abdc8eb45cd8ef0e1f6459b76a0e9e1ddfa98dddcd8a477e209f8d41b20000000ea685269eb9078b629c2e31ca45e3f946b14f7fe5679e2751bb7bc995dd9fa0340000000201ffb9ef9c966dbbc46e2cd9f4cc54c275b996327679eeca234773505b816a47597693522823f418221000a52d80e7dc492bf3bbb4e08e59b03a3f1bf6bd6c8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b522bd31d67834892536aaf062f2ee80000000002000000000010660000000100002000000093140b229600f758da75438120524a6b630660409af813743f3576c8a8ee74cb000000000e800000000200002000000041b8f1e4a80d596bd89e409a711da44f7eec02ec49758e06cc53d77fc0bd0ecf90000000be9d6114f3be8410ae3321b79ae515e0c7f63e819ceb5cf1eaeaa20133634365ca3f127951c03d4f2f076976e0498d05e9c6d49aa1a7fcff4009cd38c2f75fa028811b9082d7aac7723da191d5876163f842d60467cd4f3908db039ce1880ee09e214a96f0e89c74bfbfb1b0d7906d678dbc925d025f8061600c95b0cb92bb2da0b95713032c5e40e319b70f3085ca7c400000006ce9f526634a5cca3814c12242e15f74d4d7e84e887a982c586a16d68948002c8c1559abf2dca8e916004521e0dffc38c1223651cbe5027dfdb9d4fc7571078f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2340 2736 iexplore.exe 30 PID 2736 wrote to memory of 2340 2736 iexplore.exe 30 PID 2736 wrote to memory of 2340 2736 iexplore.exe 30 PID 2736 wrote to memory of 2340 2736 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e259227d76ad84df2619c43e04df0aaf.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc1de75dd06630e9349e59a64065297
SHA13b6d7c7304b80f7c8407ef4c421ddeb04d265280
SHA256b5fe8955f57e0eff07dd7d43e52fc2e22db67139dc9e673e4fade1a77f9713fe
SHA512212d563afb66e793b3bf8534dafdaf3ea87da77710affcbf817ce69031f56505546887cc77de7ba3c7c56250c585d3a68fcb5e19f8e16834f3cf691925e3120b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba45a5b7b8788f80afb4a2d6729f7323
SHA1289e9966afb3ebb29ff13973ba4554b1592d2276
SHA2563f54d6cc8e6a4ab354b2351603bd0e661f3f2f96ad322ca41d8d8b1c57e0bc4d
SHA512ec8e9ab132a83b745e28d332f9e4c82b1f58ae3ffcaad53c05b4dc7a0dca3631a48aafcf8260165514744b70c62d3f8767b77c4b52ef2ce22b8b03be3f9bdc95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52361934b7c8137705827601a8e9c717c
SHA16c14ea6dd0fe97e1cf9b2fdea56e66a1caf8f556
SHA2568ca5a53c3e416ad8822270d67cfb9a125b37e9f62552676bf6b4b32dd35b0b12
SHA512abd21407570cb951f377c539757cf82ae2a8c3128227ad7eb1279984a50a1ef0514e347caeaef4eed33f774defc2dc7146febd479e87eb8f250cc8a283210071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c52753564c930cb3eb53610929eb2a0e
SHA1f4495f4578637b1c4a2cb7c5c17507eff36e3bf4
SHA256525d0d3202369d41457f680d03a5cd1b7243154cd478bc0d8b4a3f12e28bbe1d
SHA5126ad2bfa45eee43e38fb6d210d71fcf16978329398226af1417871b990b2d7cd9182b60f4bc3f50b2c224594186aa78b1a448ef3359c41d5b980f2f075472b534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5d97e9abbc3ff1f3f8e41806cdf194
SHA1009298195ff3dae097fa28ea2b1edda92ca74735
SHA25675a1beb4323492f64b21fa725dfb9b7777927bb21132579b897fb10470f776dd
SHA512e4756fcd2635c103e7524904a243c3521977f6aaecf528b152acf7b42f5dfd25d221ffac92a5eafe13690d105ec1673bc49cf91486826272d45c8d4da61351b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5662e35bb08aadde1f4c9ee85eacf6333
SHA12fd58e24f57890712dfdb0fbe7761585ca828528
SHA256bef17959ea7357a575ca2df0c13161a677f21f3b7748f778a148576ba7dd7001
SHA512f89a6dfa083369dd1dbb6af7cd50c8185b55a13ce302a7c3da43456cb14e9b6807c23f8bc65ca98b8d29984e8a9a72ff96edc2c575d6479595501d46da2874dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa82b0219793510e28eaab19bcd2d6ca
SHA1ae7a1991cf8107385f2e6766f37c39b816b3206c
SHA25667cb18465c582361dba9c155b36e8e989151daa709efa0de5ee800fc5b5c0474
SHA512f200bc32c0b9f92159d7a6fe1b4b945058e83547f198b34141f5100d51ac598acca70413258c27dcef00e1b5e0c2582697ee505370700a25c9f01f9560e145f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540d07f8277943fecea0e72303d1e4e43
SHA12c431bb40d1cb24976e49c82eb423afd6972d3ec
SHA256c25788c54c91ed4a4eccdd947a875e510ff40ee8e36744adf599c3b1d7f14feb
SHA5127dd3e217f4b04761f5ed108c07a7f063ef0654e0a033879dbedb1c9353314ea10a7f91a0d1f1fe61de96502e07b2216cdbe77f675d716afc88977e145037d76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b9cbcb46a7810b5379cf8e75f93cdc
SHA1b87660d96e5a1be6ad4a2f9d97449d7b14e28715
SHA256964f0223bd5b6fbf4f17c0de6c9339ed1b6c83447820e4faee7c14395d2b577d
SHA5126f7440f0ccedf6473aabee6d072ccebfab309fb10fe4857c5352a92c83bc7373fb08a19052ae784d4cd904d59c62f07c6505d3b9472614c55c0e4345c57bc23e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe1d1ca777bde29250c700b8511fb9e
SHA19f2824ba9adb9c2adec816b0a755a431f361af15
SHA256709c7aaa4e29901897e5db32e48c44a1f8080411f436136622c839af7d206b1e
SHA512a3c6b43426b22c06a9ca7ea6047871f8df988eb1094f58748e299d51d55452d1e83add735e698f4e779eb1b086dbef1ec8d46a1903ce13e41baee20575d95e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0a442f24f776d62927ea6238e0b718
SHA182450f3fb9fbefc62e5acdb6186b72480e8a3de0
SHA2563327f21d4616d60347e01540e37eefc02546e959a68de3dc91a1462f9a782b7e
SHA51219d6cfb3cabefda93359ad8e9d1ce9c604378722e1825fa6ded17109d65f0e81f44592f79ebf8acb87d7900502e82eb1836d806df1981be22592d3daaa8f8b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576cd6c4a3e91e7738f45deddd546435c
SHA1b17842a9b18d88658749ec168f304fd001a0a5ca
SHA256e2ed9cf5e1085a747ecd6d5f2c525513d1175711811bb3f606dc9a0e0e981b43
SHA5128f231a9125912b13adf7f7cf68c573ec0f168d7d830299ea4b80d040b22363d4c5810d865e2c5f3fad628131e4307f668afe8bd99d861209c87874e072f6ffeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d72ac073766c324bdd0816a56a496a6a
SHA1bcaa72a50e7f23014b8a8fc87b0a6898acd978a7
SHA2567fadbc8feabb199eae3f118dcd6ec44959ad2fc0e72f682371032a4cf1c6a656
SHA512f8c7a0beb105e4e87dee05a14eeb0e854b2b8a81f7e4ea8d0d5165a7a6eabfec3e6adb2e4151b22f8f7223f1fe99e21967a7f8de57553dfde5e81d1d97a3b5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef5989797e21aeb26a6e10524e602f2
SHA193653a0ce0d3a5432a234883447b499b63887f93
SHA2562846957a31b9e0691093e006c7869d095bd88666ab86ac02801fa10b286ad4a7
SHA5129114598727621b411e6123ba5eafe340cc467d6b8ade0a5f21b462a0975b380f210dad3e14e31d98173932c39fce98ce9e5dba32259a01bc75f50370d438dc1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580c777cbfbe64194887eca7fdadc4c9b
SHA1690ddc15ceaaeeb6979ccb28346a229fab8d1476
SHA25604908eb0de977d905bec10cc3c402a27c92263377b66ddc03576825ba9248461
SHA512fa85e4bcf25c5063ba11b84e59bf74dd802bdb8b16be70274998af69dbbde1c77d3e6d6d5fd46d2cec7fe58ccceb61f3f4b3cdd7da744cdd403cde11c75af6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5644d8231c4cf9aa6c19941c72a90e085
SHA14d99eb21d874f42a39a24ce1d0cf93555e56fc1a
SHA256b5aeb6b92dc02aa8d1baa5291e84def0a6ac75afa3f148490b0a4b4b696520ff
SHA5123f9f5eb108ff314d8d9695df2cfd2bfdc75feeeaa84c28394f89deb19dfb7a27c995ca3e28b107653259292ee0defc4d46b792f60dd7cd4a18578d68255d8452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2949212bc62c85439a62bfc48744191
SHA1e4d3ec96e281d6256887b8ba242ea43be179e75d
SHA2560720d457a250f9831ca3d628f558d2152d2e23e453e2d430d98ef030207e1d60
SHA512130d15ddf6171ea1d25360f55806e9b004c00e0b5f6c103ee97a4a1d1dc57d3b4db7d20105c156ea7c60786b9390f9cb36ee01edd33d820800459de4eeb34973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a44fa21c14f3f24a3672b4c1a85815
SHA148d8d8292eaa03ea111fdffceb4ca123130304b6
SHA25657cf6cd1c6023e15470332e6d146354664db1f13e3bbb786af9ec0225787a77a
SHA512850a7da4032d19f470c562e3331e02dd810ee25c48c37c46df29be520d6b13d87bd6c33dd239b31ccdf889d0e9a22dedc5d28e12e03867d057b353633cdaaf8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597b75bd8afd2b2baccb58a19017d09d
SHA1beb17278d00312fa8451fd4988c86fe391d7cddb
SHA256e5b630c72aed88d1962926e69e173e19268cb84d07085fd9e43d13c05f8b025a
SHA51220831d5c8c568f60e2a6850952d728c10413760399dd77f72d70a546ee7cb3d99d5cf834b543d869c377624de96defd58bdc04e55311ad1a5f064c5df5d6a2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6452385ef15b49cf6970b257a6858c3
SHA1a9a620c8666d68d2661bcdfda3a974e6aed4071c
SHA25609bacb35c5cd8fcb0a46a228f52d22e41adbb265b8eae445c9cae48af8a5d274
SHA512bfded670b5b1ac4fa5e0440f6fba8486aca4fdc53871b95a2921d442cc1f756a486f1690686d9a6e0818a1e033747d2bbb004d384e106a16abb693fbf6d6aa58
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUME8XYE\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b