Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 21:41
Behavioral task
behavioral1
Sample
4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe
-
Size
250KB
-
MD5
4b8605483e64ded7c0439de8aa0bde7f
-
SHA1
96d5ea931da582a10c3deae5ed09584041654e60
-
SHA256
1d6e10130d7464ccb948cd5f63a088a9dfa62d368902b3da7a420228c7058bae
-
SHA512
eccaf45da06377471877f6f33bc5f945aa381af170bb63c0442dd2c158eb011fd87c18ef6c175a9f8f94b5045e58f1248ab5016f329e8ca9f00050679ca9b1e0
-
SSDEEP
6144:OhieuJDr5T8b2ufqBLjSB/MS7irtIa6cwoD8ZroSfjGFA:beKrJJuf86AYcwoaoSbr
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2628 cmd.exe -
resource yara_rule behavioral1/memory/1928-0-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/1928-36-0x0000000000400000-0x00000000004B1000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1928-36-0x0000000000400000-0x00000000004B1000-memory.dmp autoit_exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\WinRAR\winrar.jse 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe File opened for modification C:\Program Files\WinRAR\winrar.jse 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427241558" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000009e286f9ffe19f170aa0d6ed19fd74590af5c98aebfabfb13a1bb8e07e5b9205b000000000e800000000200002000000018047952c42b1cbda15cd74a071a90810bcb4b95105134732054f23348f525832000000061509bd4d98478e9e2848041185fe9cbaf341b1876de79a9a159308b64285e6340000000d4e620d66af03b3daa4e10ce6e9a088684a26cd692e642abd94fb318fffb8eb24b199966b6542f8f792634c59e124340ef249ffdd952355cf4e5277f55552601 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3046e4c4ffd6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF874261-42F2-11EF-8FF0-DAEE53C76889} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Modifies registry class 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\shell\ = "open" WScript.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\shellex WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mmc\ = "mmcfile" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\DefaultIcon WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\shell WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\shell\open\CLSID = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\IsShortcut WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\shellex\IconHandler WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\shellex\ContextMenuHandlers WScript.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\ = "¿ì½Ý·½Ê½" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\CLSID WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\shell\open\command WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\shell\open\command\ = "WScript.exe \"C:\\Program Files (x86)\\Winrar\\winrar.jse\" \"%1\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\shellex\IconHandler\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mmc WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\NeverShowExt WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\DefaultIcon\ = "%SystemRoot%\\SysWow64\\url.dll,0" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\CLSID\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\shell\open WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mmcfile\shellex\ContextMenuHandlers\ WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2624 PING.EXE -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeShutdownPrivilege 1812 explorer.exe Token: SeShutdownPrivilege 1812 explorer.exe Token: SeShutdownPrivilege 1812 explorer.exe Token: SeShutdownPrivilege 1812 explorer.exe Token: SeShutdownPrivilege 1812 explorer.exe Token: SeShutdownPrivilege 1812 explorer.exe Token: SeShutdownPrivilege 1812 explorer.exe Token: SeShutdownPrivilege 1812 explorer.exe Token: SeShutdownPrivilege 1812 explorer.exe Token: SeShutdownPrivilege 1812 explorer.exe Token: SeShutdownPrivilege 1812 explorer.exe Token: SeShutdownPrivilege 1812 explorer.exe Token: SeShutdownPrivilege 1812 explorer.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
pid Process 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 2760 iexplore.exe 2760 iexplore.exe 2760 iexplore.exe 2760 iexplore.exe 2760 iexplore.exe 2760 iexplore.exe 2760 iexplore.exe 2760 iexplore.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe 1812 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2404 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 30 PID 1928 wrote to memory of 2404 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 30 PID 1928 wrote to memory of 2404 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 30 PID 1928 wrote to memory of 2404 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 30 PID 2404 wrote to memory of 2760 2404 WScript.exe 33 PID 2404 wrote to memory of 2760 2404 WScript.exe 33 PID 2404 wrote to memory of 2760 2404 WScript.exe 33 PID 2404 wrote to memory of 2760 2404 WScript.exe 33 PID 1928 wrote to memory of 2628 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 34 PID 1928 wrote to memory of 2628 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 34 PID 1928 wrote to memory of 2628 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 34 PID 1928 wrote to memory of 2628 1928 4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe 34 PID 2760 wrote to memory of 2636 2760 iexplore.exe 37 PID 2760 wrote to memory of 2636 2760 iexplore.exe 37 PID 2760 wrote to memory of 2636 2760 iexplore.exe 37 PID 2760 wrote to memory of 2636 2760 iexplore.exe 37 PID 2628 wrote to memory of 2624 2628 cmd.exe 36 PID 2628 wrote to memory of 2624 2628 cmd.exe 36 PID 2628 wrote to memory of 2624 2628 cmd.exe 36 PID 2628 wrote to memory of 2624 2628 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\WinRAR\winrar.jse"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.go2000.com/?g83⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 4 127.1>nul &del /q "C:\Users\Admin\AppData\Local\Temp\4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\PING.EXEping -n 4 127.13⤵
- Runs ping.exe
PID:2624
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD59208c38b58c7c7114f3149591580b980
SHA18154bdee622a386894636b7db046744724c3fc2b
SHA256cb1b908e509020904b05dc6e4ec17d877d394eb60f6ec0d993ceba5839913a0c
SHA512a421c6afa6d25185ec52a8218bddf84537407fd2f6cabe38c1be814d97920cfff693a48b4f48eb30c98437cbbb8ad30ccd28c3b4b7c24379ef36ac361ddfdbf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f5a1b3a931f98466cd2e8b784fc202
SHA1e6efe51dc170b118ed7bc940132372f6a3e5e2b1
SHA256893a998d2ed30d36835bef57300c9b224ba83f3639e46378f22ad5d9cc712414
SHA51207090cfb1d5c9a9e40abe472ef8185292d1355dbaaf38c679c9379d6f944ff420e27e9ec849ff1ca7687c4efbb9a86ca893150cddf3520b55b611ac5c6ad7d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50122b9fb8c60334d0b803cebe1926236
SHA14809af9f3551eaa91ec402be496de678dbdb4ff8
SHA256662c8ebad46dcfc5a8f1be3e684cc761315f2276b9273386c51e974ba0950d08
SHA512508f051599cf9e0887e52978a161b7be75822750d460b990cab4434a0212db9ecda49b87389f703f6f8caab5a0910a9641a9cd2bdf07bc0cf95515d0710e45e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54756f1cb890792732115e57e7a9e06cf
SHA109c0e11142023cef7edc0f95387c98be1eb999a4
SHA2564dfe2251c96e19ce0be42966bb9be5f411ec281201db4eb7625ab47d842e2fdb
SHA5126fd41cb78bafa95c6792fe7348a10d72effacf67ff75ba7003d85a850878ddb138c48e39c92c8eac4a557822403e236fde901ee6eaa69bd0650ec6d9785f56e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd9ed36b9b8023597b6ca6b825f07ae
SHA170d7d84a3ca710698e17d0fcdd64b5eead37e199
SHA256cb8a46f929e6bd2d1d90a2fe279281670a8acf4f9d983f247123baf74f39236a
SHA5121219743c6ed5da614dbfcbfaabc21b2ea6d175203644a3b5688b92497d269fc94e1797ad288906ee08d7127aff7b4340e464eef26b7d7897dd05916c689139aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a65c9a9146da1803d9c607b0026ad2c
SHA1a112c86f4d35edeb7c19e047162ec92832f72511
SHA2561f0f06676b83dd61e500bde28a980e77dd01d87d96fe1eda708eb40802875733
SHA512c3d455fc0f10f5a21b14987d2185e3b265a7497cd8d9375b0f1c5c4d4459d1687aeaa0c8c5ff8780b420f37b216547d3d7f326dc5784333fcfc1bdd7cbe2ef27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a4ae66cca34f628eb7d974591665fe
SHA1faa25ccf4fe6f6fc8f25174f4b457b5f7c7285d5
SHA256cf146cec1c611a25e0c05188f2174cfe2e7283fee0600df3657f706c2c32160d
SHA512b17f6bf3e30d062f29fbebb08ff1ce47bfc5c601fc383f74e7cdd4448aec161baf706f5c2fe73ee91ca33910d4a38633f3cf363d5b32ffa0fa000621b5fb73fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee968cc58dc442da8b051f91e31cafe
SHA15573d8b41b9b2d38674ace24ab75488b1f4c86e2
SHA25670bfe6a3fdc47ec5708e4f96aaf70f90363d19fb9fe2d479fa3bc2271be111d4
SHA512b6fc1796a825970e6ac3f13c33b443454c064ea6bd209bcf3d3bf81d4fc9ad051c1656ba417b79371301cafbb0c6f56bcc5e49eaeb001d5b1c86656fdda999c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504025ba656013078d39025c19eb75a94
SHA1834e2e000e363b5fcad40f3ad533a96a1add2758
SHA256d34d56e8a19fd65dc78d29fadf3f9dab5dd4df6427bf64e50bccb806ec00df97
SHA5127988f8aad8744847d49ad9929799e6197a03fc06769bb0de0feb7b5823935da801a7dbe67abd78b4524dc25fd9b12641b0157e6b7e8abf1fcd41a0cd02a7dcc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592407844075a5d770c18381492eb76cb
SHA1d979e20c9d01eb753688d8314d97bb5676eff54d
SHA256b109f22b6825f131e3d6326f6858a5f0e0bf26f9b42910f0db82ba6b705aafa1
SHA51213b0332689d725ef26691b60a9a59aeb5f9a4c6767ba3096f3ca0f1a7586eaeb7303b172120ac2328b611edcc5e3d8027e42b2408b86e90ea861c619f32067e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caeae4dccaef584f5929e4f64f2c97c1
SHA1a90af738cbb771715542fdba3e749638cd35e054
SHA256514f211305c0c1935d0fa059cd87cf795d30572c320e0539fc3d1d35adf8f587
SHA512b3526a0188eb0cb39e6940b054d9eac39475445017adb430e28c7660d3c9758d17a3f8e96d99cf6f2ad69610a00add30616cc82d698d9ed1bcbfbe55bff7a0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5d7f909e0558ab18078c7e06fd69c8
SHA11640e31a2e630766ba377eccdc8a761167c3ef80
SHA2562603ce4d4e77b6421377171bf677612ae5249b3f2dc65811bb216e18726f6231
SHA51264cebde973d29bfea78c74d2c9d9a215d15b0fe13da896ba3e898ea04f7de4842c0cc6e4f04f26ad23c1aae0db35a56546ac52f25e5c13d34f7bd4677a7917b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f59655595ac8506738753b49e0fcb58
SHA113039dcf95d06504d5d1135ecbf9e0a675b7c3a2
SHA256677887324ed845149f21cd21062b7a56086794b4e0573fd1d2067044ad0a3715
SHA51287ddd0e27d99d84593292e332270e531dc82e525237cc0d1470748b72af0999eedd77fbef620805918b5d0a91f66ed5d475cd910fa86c36f14e64acab29d5697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50645495c286e918cc831075adce0e7a1
SHA1620f81fbaf2d683127b49a9752d59313ffdbd1e1
SHA256dac2ac8980ebcf3e8eff2685c2287e021f40c465f848f3e8867e025e2fdbaad8
SHA512eadad166ec6957c023b5216c014d156f2a8308ee8af0602cff43722f453b8019088a88ff1d351fa2ec6709b8c71e9c31f2dc1b80f7366ab7f6ea7e96e72483cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a928d55b3cc84412498c4bb23fed00d
SHA10468a90bd83cb0e6da7ec9cdeaafe9b54a5886db
SHA25679f3fad68873f5d8e12053bd5479ceca9589e2b2b8440a84b8a64383628adf32
SHA512dc2ec3a0cd9e84493a965e537ca99d7f431854401eb7d6e3a97c85a3dba6557f56b02667b6dbefe284b9e7b693aa5575e37bea109ccea23956f68eb12d3b5d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36c620bc225e9c7ffde46b31b446170
SHA1a3557aeef7ecb61987666e18c97817069687f02d
SHA256339a85d05d697a143d40f82e20a2f92d9880ff2c803be65400a504bf7e2535cf
SHA512ea65f84f83499b02ba96906c73e1ec52bdc56ed6f1717e6511b249703995e3c4db5b73e85c2e1d5219d54c0cfdd44a4f06ec7a47d26a3029c9e3d2da4a755b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68109c7d0dd49f15de5082e307954f3
SHA13f87fe8b0efb114467fd67bdfd3d51236a1585aa
SHA2568347b0696ec712ef481743e83af928e593823b4b99e584570748a3c5b19f3994
SHA512a1ee5af9fded5fe717ecee39423e9c53474396ab871c572c011726c421a32c588b573847d2e9845e33f08952dd4a00aad3eaaca09903ab86602677149a2d0ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a71ad9d7163617b52244e72189a3ea8
SHA1891bf30a2d53af8e5d78f8251799e5746acd6d1a
SHA256dbdba6fb2ea6d1dbde962001fc3d6cd80122e8514bc0218c0127cad6e76d66f0
SHA512436adba6ae8f418973c95138824b9ea6faf48ac5c0d6666badd068f448491d209c9d91164013dd2b85950a66c45920f36b1fe338d6185c04570511fdf184e2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b84ba5ac4bff316007518960d9ea9446
SHA1d065d8eb69c62f3af13ec9349258f30bb49c5762
SHA2567ddec525cc6f84961398e755415dd6ab00448d5ded1cdad75312634fd0a7c46c
SHA51246d54cf21c7ab15024eadf368e2d7c647a5b0bcc8915f6d26f757a12df55994d4849da4b136bb922affb0d531479de31b3ee1ee4c03b6e50041ebcdcd0862cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db669a98000e2a98b0766dd522b1e05
SHA13dd2459ea8d1580bfad392985ef00d2cc10fba38
SHA256cb3ac9b97357e9e297d5d7f5638de4d6f3f0afb646c651338eac6b22bb8fc0c4
SHA5127ddb8b1be341cb137dd928fd1cb2d863c74c51a83394283744a72fbce8e1c15b46466982a4456d34b31c3f2676d7712d4521c602e9915d1d5b1668d60ac40c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f6cad870495de67ae48f130ddc1c70
SHA1b8c1e7a66acf11860cb5799653ae4ed0c9ec939b
SHA2569c49d34cf56a90dfcee55b77201d9cbbaf6afbe40dcad5a4946af8903d303cba
SHA512d0f80f8b9d920fd1a2eddbd31cd8f704fda9a9891a5c4b96b3279b00626ce42cac507c78de1124d447ed56f09e97c4829b9edb257c2931ee538d50c74d83a602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc78170290c95664c772f965db861c2
SHA1f7f3f39f3d5a142c346e4cff15ed2cc9461b0120
SHA2569501286484515956db0526f840feddbd07eddae88537f568e8c65e8d7c7c649e
SHA5124ace3e7b860ab85cc8b3cd3143c3eb1459f52121ef552b54ae61b24455af401931b2237706ecbe571bd1842a283ecb1ff8ed9e89b795e0e5f263f4084bd73006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54142baa0cb81cd631718324bf08285a0
SHA1d242d34f80b57182975ca7ff588c2ac314c622b9
SHA256daecba406e47af94fd2ace1f92283c553d6bd29e9a39b07231d3ce23c2f6ebb4
SHA512308de2250c75890cb40ce013c1279ef4260662d1a6e4efd022676199d5f681b5bd9bc397c1a1ba5304e255a6f039c261ce919a3c88a23d6b86dfb67c1dbbcbd3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
255B
MD5a0c4d2f989198272c1e2593e65c9c6cb
SHA10fa5cf2c05483bb89b611e0de9db674e9d53389c
SHA256f3170aeec265cc49ff0f5dcb7ed7897371b0f7d1321f823f53b9b0e3a30e1d23
SHA512209798b5b153283bea29974c1433fe8b6c14f2a54e57237d021ecc1013b8dc6931dedcc2fe173d121c719901045fdf2215177ba164c05d703f2e88a196252ec4
-
Filesize
149B
MD5b0ad7e59754e8d953129437b08846b5f
SHA19ed0ae9bc497b3aa65aed2130d068c4c1c70d87a
SHA256cf80455e97e3fede569ea275fa701c0f185eeba64f695286647afe56d29e2c37
SHA51253e6ce64ad4e9f5696de92a32f65d06dbd459fd12256481706d7e6d677a14c15238e5351f97d2eb7bfb129a0d39f2603c4d14305a86821ed56e9face0bc252b6