Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
31f4cccd3f13fe67f5400cca470766b6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
31f4cccd3f13fe67f5400cca470766b6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
31f4cccd3f13fe67f5400cca470766b6_JaffaCakes118.dll
-
Size
206KB
-
MD5
31f4cccd3f13fe67f5400cca470766b6
-
SHA1
ff929f82cc44d442212095e2f53b3bdfa73f3692
-
SHA256
80759514d7c26a7c025f570813e353423d6ced9bfbf6a086098c2bfa64db900a
-
SHA512
f1e4ba2cc4814affbfb62f9455c60097724c84595bbf106c07e015c5cbe6684aa6ae6549163079979ae9c046e2bc882af23132727df39a5897bad8d1868a85ef
-
SSDEEP
6144:MfPKpU+W9rek0Lou56IzYmDWm2RxwwbDr9b:M3x3/0UuEIzYmDR2jNh
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c10c3d4ad2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426723758" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{669F0F11-3E3D-11EF-BBF7-D6EBA8958965} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000399924db86d94893f003699952d7526db58fbbe8cb3c8a9b342b3d390d2ae1a4000000000e80000000020000200000002a94d3b5a2fd580d6f5abf00a3e1d1aeec78ca86be0d4dbadfa5faf75c20605f20000000a325e6022158e2bc53c803ec658f116130492264edfb959539c4dc4885956c56400000005e53e1333bb44c90cfdc055dc26b6855a90731b584a88bdbe4d3087e60e384ee857047591810e930a33e2c826666afb9becf2e594437ae3ae0429e577cecef4a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 rundll32.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2584 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2032 rundll32.exe 2032 rundll32.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe 2712 notepad.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2716 iexplore.exe 2716 iexplore.exe 2716 iexplore.exe 2716 iexplore.exe 2716 iexplore.exe 2716 iexplore.exe 2716 iexplore.exe 2716 iexplore.exe 2740 ctfmon.exe 2740 ctfmon.exe 2740 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2032 1840 rundll32.exe 31 PID 1840 wrote to memory of 2032 1840 rundll32.exe 31 PID 1840 wrote to memory of 2032 1840 rundll32.exe 31 PID 1840 wrote to memory of 2032 1840 rundll32.exe 31 PID 1840 wrote to memory of 2032 1840 rundll32.exe 31 PID 1840 wrote to memory of 2032 1840 rundll32.exe 31 PID 1840 wrote to memory of 2032 1840 rundll32.exe 31 PID 2032 wrote to memory of 1304 2032 rundll32.exe 32 PID 2032 wrote to memory of 1304 2032 rundll32.exe 32 PID 2032 wrote to memory of 1304 2032 rundll32.exe 32 PID 2032 wrote to memory of 1304 2032 rundll32.exe 32 PID 2032 wrote to memory of 2712 2032 rundll32.exe 33 PID 2032 wrote to memory of 2712 2032 rundll32.exe 33 PID 2032 wrote to memory of 2712 2032 rundll32.exe 33 PID 2032 wrote to memory of 2712 2032 rundll32.exe 33 PID 2620 wrote to memory of 2740 2620 explorer.exe 35 PID 2620 wrote to memory of 2740 2620 explorer.exe 35 PID 2620 wrote to memory of 2740 2620 explorer.exe 35 PID 2032 wrote to memory of 2712 2032 rundll32.exe 33 PID 2716 wrote to memory of 2580 2716 iexplore.exe 37 PID 2716 wrote to memory of 2580 2716 iexplore.exe 37 PID 2716 wrote to memory of 2580 2716 iexplore.exe 37 PID 2716 wrote to memory of 2580 2716 iexplore.exe 37 PID 2032 wrote to memory of 2584 2032 rundll32.exe 38 PID 2032 wrote to memory of 2584 2032 rundll32.exe 38 PID 2032 wrote to memory of 2584 2032 rundll32.exe 38 PID 2032 wrote to memory of 2584 2032 rundll32.exe 38 PID 2032 wrote to memory of 2584 2032 rundll32.exe 38 PID 2032 wrote to memory of 2716 2032 rundll32.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31f4cccd3f13fe67f5400cca470766b6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31f4cccd3f13fe67f5400cca470766b6_JaffaCakes118.dll,#12⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1304
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2740
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57a232fb65f57d28521560e93d09ec991
SHA169d5e92cbdfe6f82a2288b10f0c84356af11615e
SHA2560e6757651270ef083df2448144bd25b543765129f5c05f1f1b89d15d71dece2d
SHA5127bd87dfab3af99c0d67acfeb68120b740172e1113a951b0bebe47a9ab5adb4cebe39f9215362b0c117a51606c82bd3cf47048db002961329d1ee65911ffa790f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5663c1dad940129427149601f6c8f9ff3
SHA17de969c6b74215248573114716882c7e2b5d5576
SHA256a17bc7cb278ab2da6ac2b8466af48784cacdae69f975eea02feeee029c987692
SHA512a8585e0589b4f514ae04bbfc2895ed1f02f39cd08ceac86f9b5db062571fc77732fcaf59914e68e3013f568245e4fd0c0651a27de98a0bf789e36254abf82e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eb190595d64b5491ebdefecb1bb94336
SHA15292f35cdeb4e5bb2a600cd5fb6b15c9e0418c72
SHA256a5942c36c5f8a7444564b6d4f1d5485bc43d9315c27bb26d85409f3dd67678b0
SHA5129e4afb0058f9b40f31045b8ea8d14ad37c768613100634584205277898bc7ba70bbfa6ac5ab30a3dd0b3107781cb8a9b655951aef41ae3fef14f093ef08d0d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57cf9993ed4b7c713168aa8a1bc02d365
SHA16bd23da0288e26da5aa28095564c9fc97b314b91
SHA256da9615931f9741978d9e80f681c8bccd77e90f9aa07130e3e86ab91543734347
SHA5125c171c812cc9a746ee42ecb3f437d56c443b5edd618bfcf6149ecbe2bdaff51afb947bec32edf94827300dc655e890a93db9503f32852db36b3d9b8a11cfdb7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c6e2f33a4c1401553526c3f278ce6509
SHA15ba9552c2ff2ca9b8fdbfaa0f00652377cb9c8d2
SHA2561d31feb97dc1e1cb60c2b2f87a8da990328bf777f51462ef654e14eca81d1061
SHA5127078a41288c9fa550c0c05edd8500c8ebb7f32a5b2588cab415b1b9d692fb346e201a19db87bb7abb859677d9a78346e08bb94a37eb266145ec1e00121a034e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5adaf75f4256331da427407ffa1458c27
SHA19ff2ceef8a4dc43c3caf6f7c3493f44b929b0470
SHA2567059adf3390206647fcabbd37a18596dea1d38e3c7b9ac10be8a595ae1d0f561
SHA5122df2b9dacdbbc2e9b007211c9c21402988b7a2e35da65c1a17695835601ce7b0ba3b0d7d71e8eab895c1c4d89a2b72ab5270b0622ea5ea36de3c4b1f7458f471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56add37bf8cd2dd69808df77b175f4e02
SHA12efd88c84fc3ab0aba5052ce1f54da1648fadff2
SHA25678eda62eba24a477837c29958ac92fbd79d9a02881390b1a4f0373923268bae1
SHA5128d210042419936e6e423d56fa9df99757e53b6b0ffe03f1e5142e36edbb0a8cbcd99d1c59d8660cc9ccbef38180ae1f46f78f698523335362956a9e32fa3c40d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f39cce28cc4a807c7041102e2235e881
SHA14affc8ac14dc663ece3269aad4602a7f7bfd2d98
SHA256891fff2bb5ff1abae10c0154b9b3e838508e3ea6f6c3b7977455406f6ea20fbc
SHA51207cc2107e314c671842ef9bc084e512083a26f49017cde15b35b330733978831f132a95145eb6b0aeaf2b5c88f175972cb257d71869c993e00c5d4c6bc678e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55732829dcb102cc272000f0a28a3eeb4
SHA19cd0df10eae4fdce0a8b56f2221aaab5db6d6316
SHA25694783c85dd1edf221f7b00efdb8f5c61f8f25f8f2d1b74f2bbe0725e1692efdc
SHA51251f362b1d2deb852706e097efc57071d3f331d0e6e98c4ca96879e4a7be601e0c04b0d0949ab91ad61b795d5f671c6c6553f2568ab9263d06d38096c301f7093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51506ff486ad96e072fe2e22fc4c29a69
SHA1b3d0ea7fceddb53974783c920261ee513acba2b3
SHA25683e2621d873fe14ba73c8a458d18aa37863361359c68aa827a07f146d7d433f8
SHA5127b5d3a90130bd5ac75ae00b9e00e521539dc5369121a548d9e7bddc0ae708cc483ba6220aa0a1caaf8beaa813644925feb736fc78f49046b0d7bf546ac74449d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cdae9d5e0e83541855e73e4d3bd1ba27
SHA1b0b4d2076d4756734124ab68b903e92e15cefe38
SHA256a2c5c4a0be1c0e4d37ea3dd85935f6e908158d4427043787373c3dbc84ea6d26
SHA512980c30a709e49ae2a455c0d3ffa0f68d6601086aadfc3bddddbeb4c001bba27ed9b955877f0135a4566091762e2cab0d51471fe92265138038459251139a7855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5022f63073ee26e1208b2c0b8c7b294cd
SHA138dfdf67b213d1e92bfd537d8341c748c17024f1
SHA2567ada8c73a615c5408b635e9fb4cbed625732cc71a91a0e02262ba7129656df98
SHA51264c9669c44745e3e477afe6917a5474a151ebf346fdb635dda88b2aaa7e543072c4ce40c959b3368295ab369a14881655ec0adff4858b98ad57de36febc02052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e8ed2e764f4abaff30bce8976d9a96d
SHA1bd6ca6218a9709d7a588c732a65eb0b91255a3fc
SHA25620333749177b1d8ce7082e199504cfd42e455461a67a951e6c605d5276b39d24
SHA512fefe053754823801abe88f475c5a3833df6840c4631b9e072185f74cbd756e6b0ae2894f8d426fd373a24352163c07f6986b7f4e35d1dfa685e744919f38b768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58e4898009956af41b0e33309a3c24f18
SHA154aac38f5b2ac85fb3cac181cd0ec0d4b1c45fbd
SHA256c4e1f3c8cab5e15fbd22cb418baf3a75fedf77d3e0088404bda2607cb0730a10
SHA512d605574e8b590297dfe18d6ec4ba1167bd1f5ada79e90359f39fd140b31e5f0fa9e569aa3dc4a3a8ec3fe3fd019a46aa94547f6f0427d23fe172aea0ed5f78ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51da8f7e8c00d1538b01abed72ae87ea1
SHA1d9f1bc7f4840fcb654b5cbaa59cce73d79044b96
SHA25631265272141179b112adec5f27c3e400ca6f84dce51559a060aa5a16cb1acfce
SHA512d37ac5a2c7d36b79d5fdcbd4b25790ae85269575a820f2b3917b1f9cfed7d7a198609db2c13f562c709a691f5d3ebba9f3bfb0bca9532819e65862fce3b844f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5319bf6e8b37099c95dac0cdad3a59902
SHA1da47b661069dd033e4fc17fece7e26095e6db3de
SHA25664b58fb2edcab86390d19584282792fa7cb6ab1bb6b3a441795b057d3ca5b342
SHA512836508ba05635ca568b3edf37b7d21eef6eb16f4bda5610dcb4dca1127c4f504363b51fb05457690fe19f05b47cd77510bbb585e0cbd39dfe597a0b4e39b1819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51e36ac3c79014d112d0dd30e617b4ee1
SHA1f1ea928140e7765fdf8d5453ed34f9b8acb55f96
SHA25682432414bddfd8bd8c163ef8f4503d6c5a559a7c5319e493f78fd5aa1cc0e274
SHA512ae81a3f75e5a9e9572aa4882f485b033d5714ba0b172f827bc29583ba10854f19fe12e4cbfb044334534c56a21401bc49fee76ae33ae16bb9c25071b41163870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD503a9ef8dc045b7284678d374590f4c8a
SHA139b19f96caf095671afb5b1f79704d3a5e81f1f1
SHA2568423dc6cae06762bff70271ed99256032431d28007847691618a42ae8004e247
SHA51223ba8535bfe96c89ebfd0d0a46bc80aa885c4628578adf67cc888480d6411da59b02215f720798b396e0e5caccebcb68187b5d6831c0c2c4005fa2dbe546911e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD599e1926edc97593bf63c9fcd81226c67
SHA1b84bc7cc310f87583b3bd7d6771c82bbb5e58cc3
SHA2569f31bd03672cef1e6444835eb1cede62017e7b81fe8331f8ccfee89177b09193
SHA5124581cfd695ef0ef599d8bfab75008f56d34f699839cf251e9f2f26822ea213a383dbaf2c7d97544c726a1a34c1a7771e7bc9d1d40ad837aaa08542880f30875f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b