Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe
-
Size
349KB
-
MD5
73cf2dadbb9c2f2a3b3747d33402b9c6
-
SHA1
21db5e11374a489ec82ee93969cbe33692517c38
-
SHA256
1a39ba420db7a5356c65e17ecf7f37bc51fa216637cbeb37a4814b6f76e5dab9
-
SHA512
51a8c58976a646942aaea006918c8d48cf9a54298a19f09a43d7fc5d4b8a7bf5654dcfa738bdb16958bc1ddd3683a86b99275ce6d8cb61f0942596fd2c65251b
-
SSDEEP
6144:ye34Znu/EJXAF8u1qBhGNy4909VezjiGF+nh9CUZLcb+FD:REJXs1q2N1906jidGUZLcb+FD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1704 installstat.exe -
Loads dropped DLL 4 IoCs
pid Process 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 1704 installstat.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\EditPlus\kk09.icw 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000412bc319155e8ae28cacebc07c5c8aca24693d7706e6a7f18b401c553baaa15e000000000e8000000002000020000000c70baa793a203f497122224cc20c82b75e87222d5e2d9234e7d391de9dce266f90000000b782ba6bd050202c1b32465a7e3d449fb7be0062ef62af24056d7486c4bf033514d845f0a85e47dfaae7d0598eafb048d0ff70b9164476ca77dae14d08fc2661681b1f1216ab7cfe00b510f8051bc060c90783cddc3f278d228c2ef1998e53ae5c5d3012152f4a4d1c90ba74b2dfe272bc609267d6177d99622b19250057f8e0766bcb84ecfdc59ac1d91744663049b440000000baa389f8e019e4e49accc843411436023eb1fa3d55cd6ad273f84de51f79e98e807e58d53d46b68f72203f399081f638a30fe8b64f53a752511404091b081230 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0bbe7e14cdfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09C8C731-4B40-11EF-82B5-E297BF49BD91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428154255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000021040282ab9e5355123c70b3186719e16d6f78a3453d8acb9e2ff18add1208f7000000000e8000000002000020000000ab4984341df2fa9d18a02e787a940bffcc9eb70fe43bb5b76a85ce9d85c2eadf20000000eab478e3a4e14cbd08c731e5bda45d83f0fa021cfc053ac4634bbe97d04d49f6400000004cfbdff33bc693374a240dfc743d77d1bd3565934ee4c914089fcae39571a4f0cbab27b4574fd9f373765a1c6f1d436d1c94ee2fc942447833305251678dd9cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.icw 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.icw\ = "icwfile" 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command\ = "%SystemRoot%\\SysWow64\\WScript.exe \"%1\" %*" 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine\ = "VBScript" 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\ = "´ò¿ª(&O)" 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe Token: SeBackupPrivilege 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 31 PID 1544 wrote to memory of 2704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 31 PID 1544 wrote to memory of 2704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 31 PID 1544 wrote to memory of 2704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 31 PID 1544 wrote to memory of 2704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 31 PID 1544 wrote to memory of 2704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 31 PID 1544 wrote to memory of 2704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 31 PID 2704 wrote to memory of 2712 2704 cscript.exe 33 PID 2704 wrote to memory of 2712 2704 cscript.exe 33 PID 2704 wrote to memory of 2712 2704 cscript.exe 33 PID 2704 wrote to memory of 2712 2704 cscript.exe 33 PID 2704 wrote to memory of 2712 2704 cscript.exe 33 PID 2704 wrote to memory of 2712 2704 cscript.exe 33 PID 2704 wrote to memory of 2712 2704 cscript.exe 33 PID 1544 wrote to memory of 1704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 35 PID 1544 wrote to memory of 1704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 35 PID 1544 wrote to memory of 1704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 35 PID 1544 wrote to memory of 1704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 35 PID 1544 wrote to memory of 1704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 35 PID 1544 wrote to memory of 1704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 35 PID 1544 wrote to memory of 1704 1544 73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe 35 PID 2928 wrote to memory of 2616 2928 iexplore.exe 36 PID 2928 wrote to memory of 2616 2928 iexplore.exe 36 PID 2928 wrote to memory of 2616 2928 iexplore.exe 36 PID 2928 wrote to memory of 2616 2928 iexplore.exe 36 PID 2928 wrote to memory of 2616 2928 iexplore.exe 36 PID 2928 wrote to memory of 2616 2928 iexplore.exe 36 PID 2928 wrote to memory of 2616 2928 iexplore.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73cf2dadbb9c2f2a3b3747d33402b9c6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Program Files (x86)\EditPlus\kk09.icw"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWow64\WScript.exe"C:\Windows\SysWow64\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kk09.icw"3⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD5ede73472f3c869029fe01a79be00b57d
SHA15618b7e4a2b70c785715ce4ff7c917943715742d
SHA25670649ce17caca17fb153d1b017fc7f66478a20d4158f8e7fdca91273ca9e4a8a
SHA512449058151dd8004f6f3a6cd3f7efb2f1b520daa4fdba14df945680d3df9f0589899b6a9c60f232b968ba40b1683765d077c693b1a07f39d972012e9fde756384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5924f0ca995c159276b79c8780597e74e
SHA1ed13f8a6dd89a3218d2a1b172773ac2a817d2517
SHA256fb05cafd784da390d96b82a279e49e7c68378393510c89fc6ae0c29f17c45af6
SHA5127b44b03b73554caa31344aa86d308d17597a993c3ed5b873d460e141e33fb2e304330e6dd0137e9c5caca1ee2948a7b56edaaae3086a4fdede656a63821e9a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0fda9f701a49cc052d266d79a9021a8
SHA12c1a155e21c7c4d38159ac5df17491c15188b8a9
SHA2561e64854caa6cd3dc9eb314af8c072a74d268c793133ccf3be59890782747e786
SHA51236ca69248f71095da9dc8f78a548623fb509948352917cc8c9fd167467afe2f1ac41e14c38d4d1092664789542d4da6b444c0334bf4711b299efeeca50a9365b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c3f603c6a93fba64266c916542f922
SHA15bafcabe2f038c42bd8b413805a588d801429132
SHA25699e41333a76a7b10b1c99bc0701eae484695b0eed2adba1bd35765b7b1818c1f
SHA51240f0c0d21a18a6ab58cca4b3d2525dd104af05cf83821f5a85229880979a214c190d03b06c2c6c11c05aac4fb358e74f42ad52ee60f29f68d7f32f94b3b659ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50147e88c09251e0fe43e4f7139b734a8
SHA171f672e6a4807737f2c865ff20133f8bd96880ea
SHA256f52c7f19f7da5603bd1d9568f6adbce635a9ae59eca8898f3626255dbf6adc5f
SHA512e5246785dd2823e6cce682858f0d05cfb4c64555933066d4bfbb1f41dd291cc17771f505eab8a00f4a5571cb13886a202ad33ec8fba0792085374719067590d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78fda3e104278d812d4f9ab04458792
SHA14a2cd09828c0dcfc402d75db2192f2319727c65b
SHA256db98971cfb49f59b4348e55d06b2b88ed417b2afbba92debf929df85a52d8a56
SHA5124ff17b42d8ba5a77fd8294be8cbb13ed59259b934509697d52e48751b90d8cc6371f827ed5f8dd636ca849547882f4954cebf54908cf4dc0d97674258eb1889a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b21a1353c2f5fc18a0f97ceaed6ce437
SHA19a6a66a03e0e13b095a5d4fb5f15f8068da0bcfe
SHA256bdea1ddc899823fd22591a3dbd48f0a89bef444d805ff8cc7667b0feaa898403
SHA5123f2ef06b20ab2976bcb03de859d2080e23e8bc4b08e5497be930a726195859105f76f29a321ea40f9bc4e05918cfd8d032b3015ffbc306e3f7a60efe816874b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b202ee78cceaafb4f5d07cb007fa36
SHA13cba9a45add59c403ac0f590abe56c38cfa05071
SHA256a339561d53fc91f06448ffabfbed7eba83b30ace0c4e3ad628bc6ddad5cd92ed
SHA512e160657fe5a131aedc98d09a3bed13714b6d987ece0858cad123ce9171fd6c6cd64cbdc711fbb99e72e84d92b6966fbb3d9a996189ec6a42ee143a27aa28a526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa80838fb14dfff2297e6b7e0ad52be
SHA1d59f8e97d76139ba624d6c91769bb1c40883158b
SHA256ea09ba6fd79943729e1203dc2556bf75ab1af690b7ce53598bf1a399c2f9ea9c
SHA5129b59955de29dc1bd91bd2863d0678652fbda25960ce3b3a8b2e481bac41c4edaebe677d13ca7206b351653b6cfe52aa330f8d690c8e3b82f480aa2b4687075b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fce3ef46a34d356902dc12a00572b26e
SHA1399825db7951d782360c610f5477c3d496c49486
SHA256011de049cd8702e2a0684b55a4da1af2e797b1c29695785aed353442a1bc3390
SHA512934c3ee3fd6da0d3274b68365c11110674d82579aa28f291f2c44371592933c54a9970da37bd8637913793f48872c343db0712bba6f25ba609608b99483de0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3784cfb54837a4b8f1a61859a3969f
SHA1e8523318b641f414ff4d82178b5e911934d2da3a
SHA2568172ce3bf32ccb5b6234a2ddd89e5acdcc6c79edaa4c333481e6f4898c569d44
SHA512882b9e938a9b5da46f934975d9a8068f61a91032c65e6b2680a14152459e82837696919e5de676f7f61e4cec6989b0b2f57db0d93454b7da28160e69a35bee55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568c313fae9807301b0b4453cb7b0bf83
SHA1fa3d6f0ce8ef3402aba09b8eb53f29b0ea13ff03
SHA256ec7426367791809b7635b95557b5beda7c10e084680c4633661f81d2dbb3c650
SHA512596c215ef3b1a0f0acf88749855a894e604b9c196cb4ae7d22f79569375db3a1ce9e5def02cfb85ebd2aec04194397541b014847870cc6ff23c4c74ae1e0fa1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a98ea9d40698d84769180fdb854555
SHA1702a0a94e78845621bacd689f21170e4d52d1466
SHA256dc3d4197eed5d27603be127ee76440de8994c4795cd0ae2dbcb7cfab0e9750a7
SHA512bd776a3a45a248e785690f3a1509d3a86d514e6847e638d6767f319da0040f519f42187d9107915dbffbe53b192be7b688cea962fb1c5e7a816fe1e473e24ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1706064b7fdfe58790efb3160d41ad2
SHA1f516f41adb409bda86783f2937615ae7d360ecf4
SHA256a5ba86fe1439b9e0aacc2ee060b9b75040e4c5055c69f65d541c05820fb574d7
SHA512a0c2170b966a5c99d8f0711df6d0cf16c2e754a98a8656fd4bf1d2f59f7f24474ed5e91ae203c93d29fe658a155217ae73a8a3fd24c30575a64929ce4f2e5ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea454d1566e22b127fca1bf8e3b1ebb
SHA1d80990ca0465897a354dd7ea9e7a17b8a11ad65c
SHA2566bf3202487e0fe259a2a8f8508d5c3bfe208f069b7934ac47d5acd3e8d9f831a
SHA5123bed20839e03a37daff07e6aa66881b25d95161e442f8e774d4f812f33b44675e8906b5c011b28406a1a1062de7472101dff9a7ab1ca7e9883195bb9a39f3659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c0c3b1bc7009f0d4dfdcc7388ae5c5
SHA14bec8974338bfea6884bcde52262c5d844542cc3
SHA256d6a0839b25ab7607414c3272bd1eec1329a1c3af576e1de4afcaf3ceb53cb205
SHA512d442df5c62988eb4712945f5914fd9b506aeff00f13f4057c69918b2e7dbadd0bf6e4a68276689a1f311a0d5f1f7107fc12aab5ff96bc8f4392354c79d86ddcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571e59e56cfa5975cc8d486263e861ed5
SHA1f8668860b4824cb18a5e6f3bb8f24c522826ff59
SHA256732ca3b3de52722981670098230f0b90a07af1446309a7fcf86b7478b35fa74f
SHA5123e9f32aafed5aab29071965d893414a2aba9de6fa21e375b7c370e5fb3d4bc0eedfd0271d87f09a29e29b775519e67c4980537cb4d1f4677dfbf1c84b441af43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6081b4ee696a1f037c0e14de7812bda
SHA1b6a9a0d867dcc1a357c8738ea1ba7cfb76252d49
SHA25694c224d39c8e5552cd2556cb53a4ed75d6f05aa5fb820edc499b47447379f5f2
SHA512fdbde1b0808ee762f04ea984c0d2380a05a15cc1d2d714b62c06aded63d78c132ba66e411cf4dc8c5a8106d281b382095391af11b626b9091183ce865de40004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b846f882399c87a022f7832ca12baec
SHA1841992ecb23952e84466607399a6b3998d2542c1
SHA25699594e23c387bad2206fcfcd720b519600da060eb787b7ce70fe84c28654f098
SHA5129e88df58634dda012d1b5589ab81fd69e2570fc886023d828bd97585c92fc943d213381e1d8a3e4adb43d4829b4f4b8c44ac9ccb80121e79941405a66d547b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c5ddd94239bbdbe5fd96ba9265f93a3
SHA194d7743691cbe68bc1affc8b5c60826465e1c317
SHA256d883ae89847d54435011b440fde10f595adebbfa5bf9c5145a36b2b88759c756
SHA512c209194046efb5bd0e0cc41d817db50f655115238b65d31a94ae30c7929fb7355f072c0fb7e05fa49ccd51102e2b9941c7e294d74f1f07f97fa90c5e17073ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bebedffaa8030970604e8ef82bda65a3
SHA14c8d62421536ab3996edf8d03aaddc16b518e5d7
SHA256c09b07cab3a34e3917b0749c02a8a28c9c33c0f3e8651abb86093b1ddaf73e83
SHA51265706a3a37e7a98a30e03ed9dc98e627a252ee8cfc00a36c92e7a63f39b2cb5e5dae9b3ee1005b42e89b4743e928a0372279cd98b11993817f8b07b1a00ac893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592be1047f0bc72c1ae8e17beaf7b704b
SHA127540bfe844b621d93614185f2eda55b3d96f394
SHA25641edc95da805c665fb0f71b0476e211ab36cee51777f45a57491e4bdd3a5be0f
SHA512265d0554211c02fa0865e4dfa4c861a9ad473567041d782892ec1da010ee4571533a585b2445eaed50371dc3dd8b6a1e6fb5e7e13f9bea3387c712a2294326bb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
842B
MD5d0b2b1439e71d96abea7ee31b5c54f1c
SHA1809b8d674d038c78322df852aabd9da75f93aa50
SHA256e3955108c0482a534007e98303be9692e733ea5c56b69cf5d6ab72cd5da5ddd6
SHA5124f82e2860e387a48e7c67121778d2e223eced69784faacc59704db2ff0a4583c05010fb87c4a5aa8d349e1de5f67365bbd8fbbe7015894b830890075e78f3c6a
-
Filesize
80KB
MD55be4eb5fdadec491b400154856934411
SHA108fe0f77953b2f9551f31b866af1979abf17fb76
SHA2564fe92016750ab429662870c03966c4cc0b8f2c9e179daa17a05298d0fb5d4dc8
SHA512d42369fa74df36433b807c025b8214984ba24ca77ab38946664b8b2017f9e5383b83751744c1ffb716206470e832fab72ca24ae8cf2808250af86afef742ce90
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab