Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 18:48
Static task
static1
Behavioral task
behavioral1
Sample
3a54aadb1f24cc16632f1cf0d35feb3f_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3a54aadb1f24cc16632f1cf0d35feb3f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3a54aadb1f24cc16632f1cf0d35feb3f_JaffaCakes118.dll
-
Size
254KB
-
MD5
3a54aadb1f24cc16632f1cf0d35feb3f
-
SHA1
f72242f1a96127ac277a708fe87015f090cd88bd
-
SHA256
512b04aa1c75e4d4d4de5aeb0c4a483ba2dfd6845f431100c83ffbce45613f3e
-
SHA512
35e93270bb6eb2868aa083d60779a10ee2b1ac134366d8e698f5aee7dbf5a5e44502fe3de414469a2c4c75b84e6e02f800145b0f67eb97db7367e480b4c923b9
-
SSDEEP
3072:DqHLn7oFbe7z0zR/sHoEg8El7Ut3SJ9DLa84CFd73yOjIyZrG0og3XTo3VvApN85:C7z0SHFfU7YCLl4Cb7prC0oVVvWipz
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3AD91631-3FB6-11EF-AB78-F235D470040A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 306fff10c3d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000005e1cf7083efff58b60adb150343cba52993515eaf1e9d5e15d05a92308eb4c40000000000e8000000002000020000000a2f5afbdd000d48c51b0dfc7dd14d582a19f93b424a6bc9b103ba0f30334a53f20000000b6c1af1f0f64bca40010cad97b86d1c5b2f8e84de58821857e8872fbe92f6ad840000000c9375192c9ddaac0b2016f0f6978f6c61b0c166bfec4149dca2c35a4dbc94d161db25d1428db50092aab7f7a0864e8ee3de17b5cf27bf538cfcd2db61967d964 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426885605" iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3004 rundll32.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2656 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 3004 rundll32.exe 3004 rundll32.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe 2104 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 1744 ctfmon.exe 1744 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1356 wrote to memory of 3004 1356 rundll32.exe 30 PID 1356 wrote to memory of 3004 1356 rundll32.exe 30 PID 1356 wrote to memory of 3004 1356 rundll32.exe 30 PID 1356 wrote to memory of 3004 1356 rundll32.exe 30 PID 1356 wrote to memory of 3004 1356 rundll32.exe 30 PID 1356 wrote to memory of 3004 1356 rundll32.exe 30 PID 1356 wrote to memory of 3004 1356 rundll32.exe 30 PID 3004 wrote to memory of 1272 3004 rundll32.exe 31 PID 3004 wrote to memory of 1272 3004 rundll32.exe 31 PID 3004 wrote to memory of 1272 3004 rundll32.exe 31 PID 3004 wrote to memory of 1272 3004 rundll32.exe 31 PID 3004 wrote to memory of 2104 3004 rundll32.exe 32 PID 3004 wrote to memory of 2104 3004 rundll32.exe 32 PID 3004 wrote to memory of 2104 3004 rundll32.exe 32 PID 3004 wrote to memory of 2104 3004 rundll32.exe 32 PID 2384 wrote to memory of 1744 2384 explorer.exe 34 PID 2384 wrote to memory of 1744 2384 explorer.exe 34 PID 2384 wrote to memory of 1744 2384 explorer.exe 34 PID 3004 wrote to memory of 2104 3004 rundll32.exe 32 PID 3020 wrote to memory of 2368 3020 iexplore.exe 36 PID 3020 wrote to memory of 2368 3020 iexplore.exe 36 PID 3020 wrote to memory of 2368 3020 iexplore.exe 36 PID 3020 wrote to memory of 2368 3020 iexplore.exe 36 PID 3004 wrote to memory of 2656 3004 rundll32.exe 37 PID 3004 wrote to memory of 2656 3004 rundll32.exe 37 PID 3004 wrote to memory of 2656 3004 rundll32.exe 37 PID 3004 wrote to memory of 2656 3004 rundll32.exe 37 PID 3004 wrote to memory of 2656 3004 rundll32.exe 37 PID 3004 wrote to memory of 3020 3004 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a54aadb1f24cc16632f1cf0d35feb3f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a54aadb1f24cc16632f1cf0d35feb3f_JaffaCakes118.dll,#12⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1272
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:1744
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58278aeac9287a1aab7b7194d6fa877d9
SHA196207f4689fb228d40a2b9691a17113cd74bdfac
SHA256823e33d8a54a484905bb840fa7471a4f6b6f884ef867ebfa665d7d982fd9c6a8
SHA5129761cb7b8c5afaf86379593e2cf71ccfaca88d9946203c140ec6bd1c25581163677ba95d92c4d6287fa39244807b3301db7aad0396c72e051dc87c6c064c51f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527ecc2d47cd5de9bebc53c6865b6a287
SHA1c42d6bf1346ba9d5e8bf1581d7a76b509e9ecd5e
SHA256650eb4d3a89d059e3811e5ed5d9d55223056dfc324c30fd86d8253ca5b1e0f24
SHA5120d7b7f29ce34fc1ecb607e097be950079a7074a1fabac886d68c490c79d378be60a108c58e2c5942190dd6a388af9c23b81fd22c9ee808aa4785b494d243921e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5566cd41d49c978068e46a2d6f186efd2
SHA15deea6f020261b6882852c5a5257aedea8b92e46
SHA2566d1a7ed002dfa6bda3a694ae4b6f8021cd8c5e303e756c98cb08191501318281
SHA512d37c2812902564fe1954d62c2963e87f12c69680ba63ba34d7f27f05da621dc7ca76d0f1cf6161799d59347ec727200e4bc0cef62f147d5a151839423e46bfe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ddf317738c2a8dd90ecc3af1898a02c
SHA18d2f9a333f4435fa7c0153cd035f43d9c4fc988d
SHA256237089db8957cad5404b6fdc537153506ed9e24fb4be98fc1f8e1c1884adac28
SHA512e6ad5c7998d6af1ac90ed74b2ca5800fa87ef77d9c961816a1916203caff919a4ae876d82698a19dd0f59c0252725cb978041f5717ba606eb0b1eddbb51d189f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53304b04aaf072ce626cc437f223d7a8b
SHA12295a28ac6dbbd958976b909e41ccb0c0c37f521
SHA256df73835bc8faeb656f09c8873f68a95a2bf211416c886b63994a6f1a3c3843cc
SHA512826ffb7a6e1a9f7d07ae619331ca5d41ca461c2127df9df2b4818698a71d65a36fe13694ea89ba8586a3ffa35f37fb38eef06f65aa5226c0377781aafbaf2b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb09f7c630e3cc640c8f1fa640b8682
SHA100660c491ca2c8ddd9b153cbf9c4cf06b4f59549
SHA256ebcefdd631343ffaef7353dbc47997ed1c94281e3d7b0ca25d4a4a302e25a79b
SHA51256c4ff83e7ab519e0a3b79061334d170fff6450f490a657b7537181a17683da99ddc0a9580697209bffa29612c610e03d32cfd3e461f93190db03112c6d190c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc49f0bc219e2d66d7c8ed9727ca2a1
SHA1f88ec57bd74486363e1f3ffa89ea0cc9e271a261
SHA256c8e71acaacd561409ecdcc17d081485cd8314404d3ad3fb26c280c25d203254d
SHA5125be0bd77d0a2713955e435cfd8ce69d9fcec21f11c228dd357f9ba44a6180421415f608d9b3917452f4f2f0076429369eb928f36f3425df7d93a07f1a15aadd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e46fe092296560442bb0f0744f296e77
SHA13924e9b0aba0d924aecdab54ff6f5a68873dc133
SHA256092a42fd54262408c96cd9a34314fc4372be1c54c44f02562d076ba9aecbf250
SHA512bbd4444e5c022beb847238df23606ffddeb1eb4e686e1f245433b528971a122439635b6708dcbdf12d233de245b9f6d21b5c4613a6501292b6a730b2f20a7d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f259a2af53388409ebe6351a579c8eb
SHA1304e244bf497fd1f5844560fb3dd64f97f55fec7
SHA256ceb55227c9ecf8a4298951132ebbbd7bc5617f620c0dc7445893651dec9ca0cb
SHA512128ddc6ae5e78722f3f3f0a8775d5e5ae01e2bd78e86a7b99fa05a5b0ed23e35a09ce2c7c20063c7b1f1f5d782bff8837584d72f66a53532ca1d92cd838b0eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a67c1c165ddb9ec622a33d9cd65a4ad
SHA17ce02ad2b4047829aea5358fdb7b1b2a3e0271cd
SHA256683b2ae14821f3e60b6baed92bcfad880e9d3624ad916d35ceb6506671fedd9c
SHA51267d0b0d4f1ee924b5b7c509162b30c4937866cde5043d4ab837b1af48f9f28bb3e7e9d5e36ced3caf78f7d1fdea0851dcabb7774fcccb4cd93951220db1e9f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fc49d93e0d2f4630394eca215f4f4d9
SHA175c65a2868d7d70ad638e276d6452119e238d64f
SHA256fcbd78844ff7e909f2a375ad097aa76931447bdf94b095d5007c77f59f004394
SHA5128e728d36ac2c2d8f9da0c5b0b074592a430d8096fea4ff4e73cea50a8832723747fdbf02207c376dcb1270974477603731e1356f40065faf2940b185cba3f036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53843a536b45319d62cbbc55465cf594d
SHA1c7988bbd6e944a3c83ebf029bef06bea8c5348c4
SHA2568771121c98342fa82c62e5fb13365d47532a737ce76006cc7ba8f0048669585f
SHA512991c42debfcbcd40b4d873161aea72c50eb2701c1b59fb15ba04f790808dabbfbc831c405c07731b4107d269e27508bb6ab931ac58a006fb95f13ea6f93d9b9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525cc9bec8e358142b97f13bda60b8e09
SHA139848edf1e3fec8e8890a67f0ca81aa7f7477046
SHA2567867763780b22ac199faf7c7e6411806e79049fb16862989bfbc3758b26679ff
SHA512a1ac11f6b9a4cb035c9e2c8ddda33bae5e65e836064ce3bb6ad955ed24f861792d2ec3edf3a9d6a751c3ed3b10155f0ea356043a85b371c797963c689cf002e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7b7e20801dde308fa8b5374761cc570
SHA19f8f0efd0da8f07a744caa6e89cef756d5ed1543
SHA256167a91a21f5aea34269b4b484b39462194604ea4a4b8b708843d0d7c3fd47a4a
SHA5122884e2d1f750fa7a5aa95c1e9cca75e98f09056e9a7927f4bce196d83d0426a9351fea78ce0c6e9400a4614efce803c63bd147d623beabe6a0927d95c458d977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d29d3a0b2c9c6f0a66fec1a4cb4bf8f5
SHA17a3227483c3ddd87efe3bdde79575e4b7592b938
SHA256132a1d4aaaf52a2449fec597244a3bc36aa8dfd2d3d2f72dc956a20021e0d3bf
SHA5123ab12feb187339a35be9759a26bdc0db62d093d705ab92f41e180fe8c36abe287d9221529a57b3aecee7ad9741de4f69939290bb8eea1914db5da37c4a5390a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552cacdb0bcf520ec763b71466f767a4a
SHA1a1811586b7f8c3f5dcaf766d1093cdc1d26d4480
SHA256a67e13d03a36213a82fb5a8da7f25778a0b91080a1ad08d5e06f9e8274fe4d07
SHA512c7f640dbabb27d65d9a0f91c394d03da9037a40a02bcc33fcfc1968ba981401fc5a059b405e0d079e0d6cea41933cd8267297590edf3603efde6dadd95765986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a05a1d8de79579d3946d4083ecf46951
SHA1c69377792e1d477861decd8820c49c386e76901d
SHA2560a37f1a0df728c991c196b73b49fad6d215b7c99a776904fb0154664cd95d44d
SHA5125bc2442346808c54ead3945d4bf458faade6feee1afbc0a83a2e334005811dba1d3211909da816172ff47f1eb6b7b6bf339b206e68c68376f174e7cb7af0c816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53407c6a0c10a194e1286b4292fcd01a4
SHA169aecd99aa76e87dac6aa6bfe3b069a7de07e692
SHA25678f822feb1ca15ccd106154a09aa7d20034e269d1481b22b12ea3b56140834f4
SHA512e34851e8dbf7127ba8ad250296a1885f95169a76b817e6e575ca79faf9375e6c7c49e67dfc2ff9c5c201cbf1386846bae872faff4d45c4007fbb6f7ff6028c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f18a0d593d7104a9e9e05c18fe1602b
SHA1cc184e3aeff075e3ffa61eda5f2a274a8a54569a
SHA256d70504f3311405666e039efe1193e7b160ca0166b1b22cd150d3ffc498e93b86
SHA5121593a3b671428071e5c0506003ee49000c8cf657678941f496e202f6b223ceb3da4cb3f0d654b5a42ed8a9e878e8856f98cd4703d11bef6948a735233a742056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b147be90acf0910fe723b6ecfa17b8bc
SHA1c38a15f65c1cbf9423f59ce981f06fcfcb37ec8b
SHA256fdeb739d61083a8a9c548be143b2973ff80bf1fd50627cd724aa56b2eaafafb8
SHA51252f3bc3d524ff0362f0fc50c572016203cb625293439904b8e13e709c4cf62ab95a5774bb1f6bb0348923d419ee8524aa752f4aec5e795f05c2dfbba0f8c6d64
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b