Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe
-
Size
28KB
-
MD5
463d801343bb2d0e04dbf28fe6927962
-
SHA1
df97c82d8cedf6c264ea354df8b33ba135b94037
-
SHA256
0f7e0835ded73f8e7a147ea95a8a04b84231d38dee00271b091245355f9b1009
-
SHA512
ffe8faead422a49756878676158f41921032d1d62053ef4e81f17ad0af1720a354d1cf58f3a35a3539aa587088eb6b54e1eb79600b177805501bb457a8a58585
-
SSDEEP
384:QVPOXUvOXjzIStY5kR0ZBjBNp0WW7jS5m9QgV6nmNGw0Fi6m5O8bQrBHNW:5XUWXBaCQFx05WEanm4w75lbQu
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oqtkm = "C:\\Windows\\system\\oqtkm.exe" 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yhnxv = "C:\\Windows\\system32\\oqtkm.exe" 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kulil = "C:\\Windows\\Tasks\\oqtkm.exe" 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qpqmt = "C:\\Windows\\Fonts\\oqtkm.exe" 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\cmd.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\wupdmgr.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\SysWOW64\regedt32.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\regedit.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\SysWOW64\regedit.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\cmd.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\SysWOW64\wupdmgr.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\SysWOW64\oqtkm.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\regedt32.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\taskmgr.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\SysWOW64\taskmgr.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\$NtServicePackUninstall$\regedit.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\ServicePackFiles\i386\msconfig.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\ServicePackFiles\i386\cmd.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\system\systray.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\system\oqtkm.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\Tasks\codm 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\Tasks\ma1.tmp 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\$NtServicePackUninstall$\msconfig.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\$NtServicePackUninstall$\cmd.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\$NtServicePackUninstall$\taskmgr.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\ServicePackFiles\i386\regedit.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\Tasks\oqtkm.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\Fonts\oqtkm.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\PCHEALTH\HELPCTR\Binaries\msconfig.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\$NtServicePackUninstall$\wupdmgr.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\system\msconfig.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\command.com 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\ServicePackFiles\i386\taskmgr.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\wupdmgr.exe 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File created C:\Windows\Tasks\b6.log 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\smsg.cUk 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F575571-41EE-11EF-8732-52723B22090D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000f50d4ed9774990fd6afc81e08e6663c6a34c2e08279cf06c9f78c29ae15328c2000000000e800000000200002000000051927db1a06ac5ada16e737334682b4fee4608bae22dad959489fba8307d6ba920000000a52de4c09c8b975764ccac0d3c3ee0051b4efb27866d2fa674cf9706c344bb7540000000a4c56bd8ac1ed31a29c5bdd8b48b4cb3e7f7578d8e1b37d3b8947fe95c8cfb5dbb483541a4cf73cf297b283fcfa9c7de9e47eede87f7ef50746137946351aa78 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8040fe65fbd5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427129701" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2880 2864 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe 30 PID 2880 wrote to memory of 1948 2880 cmd.exe 32 PID 2880 wrote to memory of 1948 2880 cmd.exe 32 PID 2880 wrote to memory of 1948 2880 cmd.exe 32 PID 2880 wrote to memory of 1948 2880 cmd.exe 32 PID 1948 wrote to memory of 2680 1948 iexplore.exe 33 PID 1948 wrote to memory of 2680 1948 iexplore.exe 33 PID 1948 wrote to memory of 2680 1948 iexplore.exe 33 PID 1948 wrote to memory of 2680 1948 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\463d801343bb2d0e04dbf28fe6927962_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start iexplore.exe http://www.libertyhill.txed.net/schools/Intermediate/Specials/Assets/navidad.gif2⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.libertyhill.txed.net/schools/Intermediate/Specials/Assets/navidad.gif3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5405a634dfd607a4257116bb936b00177
SHA143e7e73d98ead7467ebe677d669dbbc70eaf1a1b
SHA256c81ccb8e86c7a711cce9d1b54228aa1a06c2dcb9dd9c50416a81267a7442740b
SHA512a0b5fdc407baa31e7192c1fece96b659fcedbb2e035d5109f2cac8c63b28e160000cfc490426207ffd17d432a754f1dba341ebd9879b60f1c90aeffd894e82cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553329aa2f6ec55c73628ca954c390f66
SHA141cba5069198277ae12060fbf6625a8d3fa974e6
SHA2569ef41b67a1b4e438006c02bf8150e03203b5a56ac5b3bd8ad75307ac8fef45be
SHA51222205931957ec580cc1e61cdfd4392da8b63b645c5eb9cb3c5c09039c2face24eb605851a3f2bfd65bb100cd89aef5b7453d7cfbb7da516c1ab720507cebab8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5587731a6f2f4b0f5e33b2a7ba328aa23
SHA1eaf1068fc3c57e27744553b6a5160960721b2722
SHA256ee18042de792de8234f82ce2a65079618b70ca9713f9c5a5598eca3d0f56ec44
SHA512c957a8e44dd5ffeb84428ba90842115d2f23e2b1acd1a9050bdf8bc05296dbe406225694666715c729abb7878f1810447f511caf217da0e4e2c284cdc986956c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4afb98669da4465bdab31b4c24fec4d
SHA13f8cabbb2baaef9f66574a5e83d25d0ba29882aa
SHA256bbb8a68701240533ab0ff07879e50d4bff9acf9025dcb9b286b17891ec796536
SHA5128747388531aa17fd882ae2a62985b07a33861b41c592b259ab3b93ecd18d312b5d47ef25ddca564ec2e38984439f1eac0871f9a13bc5c9f979e7eeb4c3317f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576fbb165f0763c599b7b69ac5bbe7f5a
SHA1b2542b99233c099f6496b7d095eddd6a7333d838
SHA256635eeaa1682ed172eb3f65bcbb7ec0295235595e785ce6c930ac22e0041b3af3
SHA51206435ef9702bdce285395e79f97b9d72cb119bc1dbc203cfca74321e67186c685b189ece5de61466cfdaec4002132d21d0d00e816f7d55ba64effea4d9de8b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582904aef36a9ac024c1bbef4ceae5007
SHA1ff9aef01a6d00d4d17e43dad8fbca681f0598167
SHA256ba5ab5e5ad25efb82562b21aaba016dcd2ae942eb7c4b1c168b15b58f3b2f9fb
SHA5126dd2d287f7a8c34d784757dfc4df6fd80aac8f9de49bff79bcc266be22c94b064758ed80883ef034f8b6cef5ce1df094607d69e3fb163043f6f8143baf02afdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c4f129471247797adee689bc24d6df2
SHA109f15d9b24c6b7450f8c9886424ce905f0c5d2b9
SHA256af1cfa9ff795060b96f3281edf6181736cf5e55b0410582fecd12e6a0deb8987
SHA512e17cad26a5fb23d87f248c5961ae546b28bed0891623e0b052bfc98c6905f9230c299e3db205130cf8a7ea9a186d54e5b674d9312da0a390eb51d2cdf24c52cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c020fcaf478b7f93e154e99f240a9582
SHA1f2ca98e5b851904830f52abc4b3bd616b99f15fe
SHA25610f666a1ba84ca42ba856f69ce8c5f8338572b8312516aa0bfd67e067c69656b
SHA512aa4ee4db1081201bb87d243b5404f0450bb24ee10c46e7dafbb559fda03cc9868c29d15e771fa010f562dee26d1ad9169f25b8b5ffaabb34be3524b2741de5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5972db74fd8456e9f8d4190cb2ce703d5
SHA194924c314330ed78aab09494a640353ac4f32da1
SHA25654ab336d6c8d72c631d8eea87174211147918147e0023b9f8f3f60c682cb2f49
SHA512628278b592079ac8e69144999b08bba155a72288f5179b8880f6ff6790aac54f2a954a7163f56406ec55c0924aed2af7b18012197b1e2384b751e3016f0d3f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e74d1d84bcc30c051e42cd158efc9f31
SHA1d41930951dfeabfebf7f1c448d7619d1e7190c96
SHA25687dd57c2847affac4d81aa61a7f0932ec4aa49701aae79503a077a82fabd20fd
SHA512e4c9f2a3026cdd682259e6404d69faa7c150a6bd5877de09faabf81aea4ce241c3a58b3a15a4e9cf7b3ae4bba97236694e9d11de7cc7b736b852b5c3b09889a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597efc67d11b8ea8e1f2d8b54d50c6ebf
SHA15c63713990c1935413233e42a75e9a558932261d
SHA256d3058fb8f5132c5545025286c394851c33100d948b043d1a82c5450628d915ec
SHA51290f8a164e42263af4f830a1e3eb7e128ff8bc5ecdb4e785ef08ebf7258cb2d52f5760424e273a84e3dee24f332771b4b8dde68f7e5ecc8eb4423a4b50613b4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d77bf712a9ca555d9b00c7ef52eb2e
SHA19d407ab7586d2fc7b5efa1df97a5056310ed35b7
SHA256a28072cea2c811501c0dbe18b278eb603be658e57b4f657f429b66f06c027043
SHA5121151883b020e9b1ae9c807cf8e2a8eeb78b5faeac86d0ff0fab1af70fab4f9d79f3ecedce89713b9d2335816be61110e270bac0649f55b4cae39ec556fa3feff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58b20753938665904b3157f8882c10d
SHA18e37aade7069ebf569740f3484d3addb48645da3
SHA256d3fd22d0d2012833746363835b437b27e2bab020c85fba6ee1483aa6f1ad8804
SHA512033e091467ff6500c41f7cd84e193ac3a21a0eec3c160da0509bb90a327dea918bddf757e35e1835a654aadf8888a0001ccf956df9fea9f52f3b420b25399575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206e06d0f347083afaa7936af765321a
SHA112adcad799c8a69f22337735df76c25018a1cb79
SHA256377f6344c9b12c26d7b0ae7876158126d6b6e4047a654636fb89300607661a16
SHA512d66fbcdd94cfe6ce9d7badaf1a4231af420a21b2e5bf9583ce2ec70221e0b1f8cc70f0886d02e1173ef48f6d21c2a7fce87412b0b763e5fb18e8e415626aac47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53476c2b793c126ee2a27ad50ed7416b6
SHA1619a46f0eceb8c76779c5c123937cfdcb313c287
SHA256932de692eccc3bd76b19d4516499b24fe9bc4cf15a331138c9bd34969e8e9ecd
SHA5126a3f73a8dbcb43b2cbe534649ed43440beeb2bdf44f2c58de6e10550d2a7a5f02c9f63e19f63f29fb48a9eb4a6818bb72cb172257a53f07703f8a4f824982289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f3289d74d0775e81d5be8380ca52be
SHA1a49bf874f2263b854209960f9090dc93d8ef8f20
SHA256088222bf5c65b0c54c950caf0092c9015892c7800a1248d5e2596640ab57d7dc
SHA512d7adad7efce1b35894395795c6da19957d7ccd5dd4b67b2aa88780787c60723997c3332b20967b524e29511ab292d2ad1e6d4a0e8dc3f5d4979955925f317b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5233eb1ae48c39fc2d30d03b88ded386e
SHA10d839176e0e03600daadbc5daf364bb1c18bbdc4
SHA256693273c969ee3d8c0e64e9e259865fe951c0fcca634d57cc4fb4ad53200f6b13
SHA51200e12855557a5421c002314946cd9f65ae78e4296555e621259b6fb50c0340e08d3b853e87527fb98cee91cd5667b69ccbfff9978087245ea47d481919ebb884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544c0c6fbace741fc8ee7569e9de59b60
SHA15864a6031e70203351143b5e7f6609ebd58aee7e
SHA25638db2e342a13ceff220c6f46e5df267a7bcbb0d0376277f4f72d3326eee6905e
SHA512805c290cc2ad169219b2596f412e937681d25ceb212dcc76ee4ffed12327c3bf9fd9ea4f5215514f47d52d75b63af00fe66ebcf07bd6fd4b9a6765fbc79ca792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b8df2a067b938d5b5c7db4c4ebfa5b9
SHA168d3de2c26451b160a0ab35ed8d777e54ea80967
SHA2561fe0d79cd57dd9ef1b18cfdb2f30e6e8a07db64448a1000b621eef1ea9451b30
SHA51231ce3f648cf032ac957af9ab2ee755b714565ecc7b114f29d611a096d1c8841daa201c8b836c19afe7bb6ba830149ebc47ef24b7d91c711a8cb82831cf5f4b0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
28KB
MD506e8014358358b74f4dd6a2c6685db83
SHA1f6d96197465fd847fd138c5006067c9b04133cc6
SHA2563cfecf8046e287e6873a90431fe3c46190de75f8f76d8b8c6c2b8188b139e4d3
SHA512b8078978987bbb3f4953dbc6c6c98efc8c87c14046390f80603ffbe98ae33ea08705812316868c8b69311becc1b37e4b48df162fdcfa767efc06ce34089461e2