Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 08:47
Behavioral task
behavioral1
Sample
21c1616a67aa89ce66655a97dc240c9e_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
21c1616a67aa89ce66655a97dc240c9e_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
21c1616a67aa89ce66655a97dc240c9e_JaffaCakes118.dll
-
Size
168KB
-
MD5
21c1616a67aa89ce66655a97dc240c9e
-
SHA1
7fbd6478da0b6e6cdb4e2e1f3174224c6337dfbd
-
SHA256
4392b540e76a9f5f48424e5bc589f958a4425293374068dbd4fec0275a132a21
-
SHA512
19a8d0131a8ec00b0895a326c2687d4a1b5b19c8724293025d7da2cd4a55a1d4de1ab50747bb1a296740d431d7268306b7243e0eded9e235895aa4343f47dd2f
-
SSDEEP
3072:e1CBjTbN7xBQs9GcmbQzNsGoC/bKLhu7CC0JFn2sCjmv2out8:ekJHNVB1BE+N9rjKw7CtH2svv2oS
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/1704-3-0x0000000000210000-0x0000000000257000-memory.dmp upx behavioral1/memory/1704-2-0x0000000000210000-0x0000000000257000-memory.dmp upx behavioral1/memory/1704-1-0x0000000000210000-0x0000000000257000-memory.dmp upx behavioral1/memory/1704-0-0x0000000000210000-0x0000000000257000-memory.dmp upx behavioral1/memory/2072-9-0x00000000001E0000-0x0000000000227000-memory.dmp upx behavioral1/memory/2504-13-0x0000000000840000-0x0000000000887000-memory.dmp upx -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0F5F541-3918-11EF-8FA5-CE57F181EBEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000033d52c32ec741f788578f448bad143a9f983a7bb698a2c0875098a0d48185892000000000e800000000200002000000052925e5a10934ba52e9d8068129452bc8e61ed942f922ddc61f7c2b9c9f2261a200000008a18fc2e359baf64ff4ad11cee38b3701f980fc9a96f14f07dcc4bbba90cf7c040000000a57e22122adf87cdcf12183a8c575abd7a3e983cb31c9ffcb2c032ab1313f74e589b56a6bb743ed8eaecb7cce2e8d70c7367fe4f28cba9a84c9a03a0d63724be iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6082bade25cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426158342" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1704 rundll32.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2504 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 1704 rundll32.exe 1704 rundll32.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe 2072 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2372 iexplore.exe 2372 iexplore.exe 2372 iexplore.exe 2372 iexplore.exe 2372 iexplore.exe 2372 iexplore.exe 2372 iexplore.exe 2372 iexplore.exe 2596 ctfmon.exe 2596 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1704 wrote to memory of 2308 1704 rundll32.exe 29 PID 1704 wrote to memory of 2308 1704 rundll32.exe 29 PID 1704 wrote to memory of 2308 1704 rundll32.exe 29 PID 1704 wrote to memory of 2308 1704 rundll32.exe 29 PID 1704 wrote to memory of 2072 1704 rundll32.exe 30 PID 1704 wrote to memory of 2072 1704 rundll32.exe 30 PID 1704 wrote to memory of 2072 1704 rundll32.exe 30 PID 1704 wrote to memory of 2072 1704 rundll32.exe 30 PID 2600 wrote to memory of 2596 2600 explorer.exe 32 PID 2600 wrote to memory of 2596 2600 explorer.exe 32 PID 2600 wrote to memory of 2596 2600 explorer.exe 32 PID 1704 wrote to memory of 2072 1704 rundll32.exe 30 PID 2372 wrote to memory of 2936 2372 iexplore.exe 35 PID 2372 wrote to memory of 2936 2372 iexplore.exe 35 PID 2372 wrote to memory of 2936 2372 iexplore.exe 35 PID 2372 wrote to memory of 2936 2372 iexplore.exe 35 PID 1704 wrote to memory of 2504 1704 rundll32.exe 36 PID 1704 wrote to memory of 2504 1704 rundll32.exe 36 PID 1704 wrote to memory of 2504 1704 rundll32.exe 36 PID 1704 wrote to memory of 2504 1704 rundll32.exe 36 PID 1704 wrote to memory of 2504 1704 rundll32.exe 36 PID 1704 wrote to memory of 2372 1704 rundll32.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21c1616a67aa89ce66655a97dc240c9e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21c1616a67aa89ce66655a97dc240c9e_JaffaCakes118.dll,#12⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2308
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2596
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb636076e5bab8b2c946e8b743a82786
SHA1521df1b189ff3bf9931a6eb325cf2e48e4ba8c2e
SHA25626127b68ae1df2356a452e0a9b3ce89d69939c1de1793ce91b85f84ee30b1f84
SHA5125659d3589b5b0fc3b0321be1156b19fa0ec724c71cced87489042d291fc44085dea546f619c40bed560dafe0dd3d58f4604dfcba4057dd44544d99da36655886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c769fb7f01ffd06cb30a2f16167fcbe
SHA1805d375ce04457bfb35c83ac680b9e2c4f5508c8
SHA2564b618daa20cca255897dc4e86c785514289a961bdbbd9ca6588c629f679c3227
SHA512c81816af547ccd131930d57bc3bfae8ac15dc62b088936ae751a2d118c3809333d901ef3466ad84e17874a621b04063e2d28c9bddaa3c9d1bccbe6e0e32ede30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e541dbec927bfd6fc50e891aee8f8e
SHA11926dda1fdbbc646e8519bef912822c579fba895
SHA2566f41789276b356c8dc971150ee67855ba295823d81c46d1db5cd377a8bb035b4
SHA512184ae69eda8a829f3d23f191529feb11ab51634de51a410d8f9dba9cdcee53ffa06d1c28161b5be736b756fdbcc8ef227040f1850b57eb539825597c0511420c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d72ae890c4faa66856a10bbc9087efd7
SHA1af7c4384a8b48a982b95e7fdde7f8b9626c4ed73
SHA2561ce2f6e9d8cb4ab7539c96c4cff1d5c6e1e2354c6de571244bc8c3b32111dffb
SHA512021c1b788bb9eb82f4b09332a7c416e8189148e70549b8618e674c7d3c0cf48c9fe31e2a1f246152728693912e9506c504da1e69ddfdca89850fc57599eaed35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c79d7c95740e63684c11d0ae0bfdce0
SHA14a4f269f97d2883a7b60e69da25fe1b1f9758650
SHA2568e8821ad494612c77ba62738cebd8c1edb56868cf9ea88a05d4bf0c5e21448ef
SHA5122feea295dc815cc57074bb489aab01d2454dff6d7c356c125676bc3e49e20a8bef9986f9227e43573c419d2600ee4a9e64ae69e17e10ce02366be09163fc2f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fbb86b7df05eb3ec86a9e0e719ea808
SHA126c7be50be19de8cb067a2edd24490ff69f7a1dc
SHA256a5588211fc7e96e3e5bdff401c3cff14d255525743a28bd0cdcd7bbf74ea0974
SHA5123ea0634ff765e602d55ef60129a924ff65adafce5766f263e7ba0693f934a8f3bac3738476ec6daa7ad98803b42bce4e2e3e33c3e703752f43c7075a7b0345a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a213a3a8ee897102cf14c81d7ddee9a1
SHA1816fdcd7d68de18f5b66adf6283cef00d0002edb
SHA2562f5c54932dae0f40c738fb2b2c555a43424fef4e7bf8305758e5ef752be32390
SHA51276c639aaf402e0d63758301238f827d1d0f9b08a0d0097ee93ee963b7135f19f68ee000e3a03580415971899cbd8cd06545368a2fb21d602f18a31958fd5b7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467c29d8e2e8045bc2fcffd3c06c5755
SHA1d06a487bebdd18c5412c07c88928ee0e62c6a4eb
SHA25693fd64c85c20ff85fd78cbf13cef16cdc26eb5bd4fbd6675a028c6ae0f4470a2
SHA51223061e9eacd40778d42d3a6927d48d8a4c625bffa84b503625a4024334f8b40e0b940d59d2eeaf02413174f6fa21eab62c2597ea9a44f9f4c50065c83d55653c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562a63cd729d9346635502d8b2aa83ea9
SHA155640c19cd63b67c17dfde9338ed9e2aaf5519b6
SHA256896b507f922cb1e1a9c685bedbdd4fa58a36e7a4427c68b76154ce3a1a83f00d
SHA512ca37a7d9cd300622fcbbdaa56ee394362ad7f2d4c1d54d4030aea2fd7eb68f76efda994104f8a51911ee4c4c6f82b4fdc86545c1d7cf2eed459e7c32ade366f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccbd31bc09a8f067803c9bc053083882
SHA1ebd6becae8539d530b43dee38246475871f32fe1
SHA25608735bcf47c3a6be33a329c16f00eea057c6511870b94fff4308f0bb30c3d83a
SHA5121ce1546b5495e99c224ab0f0fd34cb8fc873312a0c8ef66c3cf84e124df8b05b03d8adb25abb92be23052801ad799b082f1f196ac89f709f52b8534cfbecc908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d363f89c6361cd29676650e4206d92
SHA1152bb746f3c075534a1ea639a96a6afa4d58cce7
SHA256162ab5673e8a443c35fc5a11afdb4ecfa71094eb0dc08fffef36849b77a2c806
SHA512bdd0a945c12effdea7a7ac029fa90e574c219c4a3ce5924c60c9dcb05c363d56c7214ee8e147d4eb195cbf0a03b16ee99eead70e5091b9ccfe79f234ff3c8182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5242928b2843e469ea7b8855747c311b3
SHA152a46c667910352084446f33b1da880c30d4285d
SHA25640490a129e8613137d66e03aa2ea95ccb67a47edadd35d7276a41c80024c1a91
SHA5122856d414b8ff33a39e80b411914fb559a9728a1be40daee26543631f4070e4a0aef6aec07f8ec1e67739079d0f3ee4bb713278bf193d4dc003d7a032f4af7950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f224f30886d766acc4da185a44262621
SHA1385cf70b4fa748d3677970f5a7b69839ac6477e5
SHA256d0f7deb1b38544e615ce0cbd11ecd4e2af40434269ee9d2858a3b180abdd7f90
SHA512974a8afacf003e82002e766878880e1390e4892508f5c2514b9cacfb7f3f7fccf024c95c9afb656f16f1b63cec9e7072734a213b8e483fb32877d11bf30a64b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf21070b477456e81b44c0d0985869d
SHA1dac73c74815f941d30a99994ecd44b9355bafadf
SHA2564caf6b0e2aeeedac761086ea16798aefb36217e66957a504aa4cf25a3c7dfaa7
SHA5128f43f9a1299c69ed298eb34adea18f474e1669dce45d6b437ce2cd5a5dcbf186b5753a6c5bea459d377895c3ec034ae887d478108f58c3fac637bdb4ec0801a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581bfb94009a411e8170b141db20bdb3f
SHA1acbf8ead41136a3f65499f3417d9df894d7ef500
SHA256b77ab6c4acff07aabbc388ca93d3bc654c00ba6d524a1d313cd00435eb971a4a
SHA5120c9ddf84dd4b254f000731611d6566cb3a94c4d4704a0da0fad6991758780e3ad1b94dbde4eb762e9f47e5f4acfd10cefdab56725b0280c3c98e7e6b07dc55bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296af4d0508238234a2f0eb46a4cd9c4
SHA1f9a1bbadb32e8eefcdc42925e51dd360da76cb7b
SHA25659d2174a54a91c1ab31c56e024d05f2d16db126dd8ad9ca0ea9a3b55a6da1bfc
SHA5128f593844dc7407c912ba3145d33362ab1059ab841c39e565467d73e6a1f61f97c1934453d2c12b487a6b879b861d9d6a16c9638d6c4f468fc6c74061f4824de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f4dff1100c089059e2b90cc18b7025
SHA18a9db9fc80d3928c6d887acac09f403f4b7299a8
SHA2563b9462e26f7936942691d080d9df067cfe5e2cf559f5aa3a07dfa507907cc23b
SHA5121c0ba961cd659e4ba483349976c146816b68e7caf94ae0904c5ebcf8d027ffcf9ef2c71568123b30f7746aa5200848a5869cb65f6d3bf2f72ebead1e5845f93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c8d753d098f278f3cf0a548783dceb
SHA1bfe013e18c6de4b78775e5b5ca8ccf51964f575f
SHA2565c7ecbff234f8ffc101e584141798fe8beb35aab3fccf3e9ae3de986a0fce7b5
SHA5123971f2a008db1a507b4393b32997e3345fceb8b9948d7436e9b749bbc83d142e882ce091e4ce52032c69a8886afea23f0deedf98d8edccac7310b4fa7cdd7825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636fcb6eb094f67ea6c439b3ff06f95c
SHA150beba01a38da6b72fff2e8acdae927f3254fdfd
SHA256086cf225cbb1c8e61196e34f1bd74d644b2195ff565ab0ecff15906bef2bb925
SHA512c2ae84878084f6548f522ee42759ce73e615a5477248f09d64527fac6e02bcbab539b980e4922999ef992540f96c29084bbdc82745a88fd352ac27ae85712b02
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b