Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 17:08
Static task
static1
Behavioral task
behavioral1
Sample
96ec34f5b2cd554a71669facd69b18c7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96ec34f5b2cd554a71669facd69b18c7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
96ec34f5b2cd554a71669facd69b18c7_JaffaCakes118.exe
-
Size
387KB
-
MD5
96ec34f5b2cd554a71669facd69b18c7
-
SHA1
4529d31f60a48d3c22574898ee4b0e3842b48458
-
SHA256
a5d7d532b967d8be31ccaf214310790f5d021c3b47daecefdab6df6789d53615
-
SHA512
dfaa519a34c2e8353c5bdbc73d21d6428906e6c24b3ebd394978d52e83f9f4f37def13b0babeeb07289bcd7e99bc2956af78c3f52884a0347561827b129e16a7
-
SSDEEP
6144:Up+r5nORSAZmddbWkBBzj/Rd+UcUft1B/UI99p8ynBbet/FWlfqy:y+9nORS+dkBBRQUFft797ndM8y
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96ec34f5b2cd554a71669facd69b18c7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0415C01-5A5F-11EF-8BBB-46D787DB8171} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429817172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80eddfa76ceeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000d37da2cba115b3ec9112cbc35e1da384e4789dd71d5005bac4915f3b8b00dae6000000000e80000000020000200000009aa857912d0c1324c0988e163a09fb8881178a2dd8c810543e6fe4a19025626120000000d0ea2e439ae20c6a8e37208bb6641e394d93a4ffaef35e8cc6e3cc564c20b50340000000267c173d5e575494200ca2c8b74be8757b7d196ccb386d341ddaa33bb0dcedbf7e1c400fd5f67befd841f83ce00cb1378a650c74ac25022d0eefa88a37405c77 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1116 iexplore.exe 1116 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1116 2272 96ec34f5b2cd554a71669facd69b18c7_JaffaCakes118.exe 31 PID 2272 wrote to memory of 1116 2272 96ec34f5b2cd554a71669facd69b18c7_JaffaCakes118.exe 31 PID 2272 wrote to memory of 1116 2272 96ec34f5b2cd554a71669facd69b18c7_JaffaCakes118.exe 31 PID 2272 wrote to memory of 1116 2272 96ec34f5b2cd554a71669facd69b18c7_JaffaCakes118.exe 31 PID 1116 wrote to memory of 2660 1116 iexplore.exe 32 PID 1116 wrote to memory of 2660 1116 iexplore.exe 32 PID 1116 wrote to memory of 2660 1116 iexplore.exe 32 PID 1116 wrote to memory of 2660 1116 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\96ec34f5b2cd554a71669facd69b18c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96ec34f5b2cd554a71669facd69b18c7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.hotmail.com.br/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f61d2b69c73aafc424ca4219d253ea04
SHA1ce0e4d2385750ea25037743c97fd50b39743a98a
SHA2561ccb47e23757b64149a2bcb2b6161a8a842465c8704266e479afedeabe1a9402
SHA5123a3ae9f2744b5453076abacd2032b5c5859feafb66ff0807ef51fdeea91845f6f7beb83b4358deb2837c978012d244343d0fe6612588ecda502236899dd141db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b9ae4617de47903b3d08bff9548779
SHA1a60b62c755a62a6a6a448b14e5c720a70f3e0699
SHA25621afa3ac8170ebef32a76d0c95c61e4ca7de8a0fe78cb07656009044a4fd9dd0
SHA512417a00d05c7df6f9d110f943542361684ce6a58036e6db21b9166941e5530139d0b94026ce4f7f33c364710eb04e53931f7cfebd8faf71278aa756f8bc000cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552b629c848940bae1ea2e48c09e4346a
SHA151d9398fd09361d2995d97ec54ecccff5ba1ec65
SHA2562b04656a2a426811da3f3a440699e3b8f6b7aa5a1e80ea0baa68e6abc8ae2185
SHA512908d2d9c15983dc432a26a3c959bb8ef5c0fc7fad9250c21ecd9829497dbea522c9f26788b68ec47102847293bf3c5a08bd516b9a61ebd499232494ae0c70803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f16ab90b0c7b9beab10172d73e651264
SHA1e4d479c32f5429b287379cf67858f95af4abf676
SHA256d2e50dc69f759b63ce1c6ade897c415112bf882a0ef9d289bce850c526eb0886
SHA5124e6846ac39c5c3cdb508477bbca929c1b10bd920e3d2b7eb2e8e474f399c021a05bec37ebb74d5502aaa110e38ef292740eb3f49b70969b398ef6c83306e8919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57162851c425215c5a25768102a9c225d
SHA15c9546927c17bed1c20cb72a1993fc397bb20a09
SHA2568d47337b1c63f21907be686183203df99590f172eda3fb904a3418514552a3f1
SHA5120178ac7caf75e3203e74ddd2df2d72879535158b6dfe3d37145630830ddaa8df376380256a3bfffa0fc427ed578f46763543e525a3cd0fa42d0bee0f67df5dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71f442d4ec4a59c62d45556f0eec928
SHA192d7fab99b32ce1114822f883a31b51ee8e11f16
SHA25660cc9cac273bb09eb4b88fbe44802a35c76fa5b0a06cf8b36ccfb93b83725bdd
SHA512dfb0a13922064bc827ced9e85290263bef92d01bf5cabd6da95197c20986223afc744ba91f3b0932d662c46c93bad23df1104207391aac352d6f9a70c0e69d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52912661dde8a8ef36f59919f696c9162
SHA1cf4aa4cf7c79bded2441b49c56334b06e7f93e01
SHA256a3e8789ddee222796a2a75d158981efa3d6aba8c39427ab783336b28d76890ab
SHA512ff5d1201b9341409c47490b49437247a77d26d1c39b6c6f44b5cf21946a1bcf907f5b7d1c0c718a4741e8bd32a739f06741ea3aea171e7b85c0d2638c9d544bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d182ca07bdf9338fc063bdeb97c99fa2
SHA14480422c3078a14df3181ad28b46187de0cb1bc7
SHA2567e0c3c506915ac959d5a091cc8e3b3e5cd7649786719f34a19f94af378f21c00
SHA512981b1ab4a23c8afb31d30e0dc71b7d0398f2a5c2c96fac70268127b9f0b225152f314ead1080a62ef40c768ebd6194aea410a227ab2d583e24806cbc64f5a12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d6114020f1e526d2b1e341fde06cf8b
SHA164560d4d3773b2d6e6cc42b8e756bf3744836d32
SHA2562de72f0ba157d1b6ae98860c669d867146e3a642ebef880a66286aa4f521045c
SHA5129ab74d4646e5a96628cd09dc058df04522ff3b6b7bf1759a493bcec2dc84c5957e527e23ce03abc8d47401c797f19fdccc81386292c17f2109844f1cbe87a773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521deaac9fefbc6577817512df4c8130e
SHA1997cb9fd781681d3c499e365faeaf5dbebc871e4
SHA256f7d4e70310e57704efd6d5e211d77f209662c5706bfd623ca960abd4b96e7327
SHA5124e350292d235143d64961fb55970e247c58a4e947d536d50ec0395df184f665b1e3be6531efd5609910f7404b1e905121164d46eef64aa30f9ba36c18c0cdaa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b19a0650ddcbba429ade8a145b14feb2
SHA10ff3581e772faa07cb2a41e54bdc654d62e5c83b
SHA256b66e11724c62b99589d4cc21d446638d8e80661ea4e488c631f5b472d659e494
SHA5124ea16d2a95aa1e5091112b0a5d426aecc865a1297a0c8a339fb483a81478d59691d396fb052c3222e18bd44bbead1476ca1671798ad2c869b2a355a3f1762571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5025291bac5e56b906c1601bbd1317440
SHA1cac90c5f7b2c0c08f8b2454d49b6c70b61f12d0a
SHA2569be34416d8b44011ee4dbef29cdea62a911a6ad9c613f5a2be96868988040152
SHA51248708227cbc6927e0b2cf6e3ce51cb39a7884d164cdd10ffba73702808dfc6784aaf190141f2791fd042ac936fc2b8360fc18697e63729cc97fbe2c490bb3a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c92fa602ff5936d758cdefd4711214
SHA14c24fdd0f346222b58b1a0943ce547b2c5d8deac
SHA25600b9713946f41f005b18094f7447be771b51f945a83e933d690a4bf00d14c12d
SHA51268856b0be0d9571259383518bcfce0fabe88ea8b37c6410d8f93ddc145b7c1a5e12dc801196be5197a10d3bf2f3e18d614dc095a402d6aa75312005574a00bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250411fc9a4e4643524da97cc538b128
SHA1455459dd9ed6f2e660e25e958b590262a00d2a8a
SHA25642e89601f49dbcc06b1987bf7d86e5b559577da3172a97f8866679519b1efa7a
SHA512688c298d65a5571ad3b0c61f1e55f1869aee8115f5fd9ce51484ca2b9c336ccff602793e723b45416848bbcd3677ccffb6322c5f02cdffe9630a3ed7335dfcea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a92951b7055a6cb05dc7a199479ff5
SHA1b2fde84305ea92b0b7faaf734a30cd9ae3026ff9
SHA256b8543895da8a4d1a6b340630625d80605b71633c0aed63f85922accf8455fac8
SHA512477e56d765c3fa394b2b25c96053d330d04221cc98e89f61e7457963ab01a20214e167fda1625b6387b62d2899225cba5339914cfce98ca013e41f2c69c5d669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d4591ba5898e78cfab142c05cef0f2
SHA14ff99a975e4b280d9ed353664c76b30b9eee16f9
SHA256e5b780daf832830762346bc75e2078c3e6eca46ed4b83ae730fb96a1478d7a17
SHA512e71209950fb29d634e18fe9a6ca3cd6ab9cee5250ad24881e9eb209b6dfcfc58879456839ebb667f995d69c3732e580a54e5bbeaf5a620ce601f4a090714a7f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e979be3c5a909121b8bfee444facc823
SHA1656a1346d231155e2fb169950943cceaeee6ad19
SHA256a7fb54edeac84972a7278e358e7cf793efd39c4ca743fc00f3ec11463e1a69e9
SHA512ac1f8bc5ea8d2b843fcfa7d3a9d5106b13487266ba7ed5b3f13bcef7cff5763eb32c3bd83773969a788996401079eb47d4c5c3d53f9413a732aa114179a8b6a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9b93e52ff09d5c1f3e9109c88f64b7
SHA190084245a54efadc2d6ed9c2e7e534879a1d8170
SHA25694cd86c91760b19ec57a4cc67ddf1f6f849d0e98b9a3370be16938c659a82b8f
SHA5125ae1519d8c889851762cc024a0818ebef3ad73fc30d74cb08ef44fed94ce2e262ea368a3612ffafd0d3cf353305385f07f20cb2d1c246ad0239a75ad0abca3ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d68c6826961844666ded1864bf554099
SHA18d14aa943c72f21fa1d607cb6bcf6a5eb1520b13
SHA256f811fc5650644ca4ecc5dc59820a1f1f07a23ffed4cea1d8cfc31454ca7048d7
SHA51268d77f4a1e31185741165f976e160e96889a039c602e400421e9877fa59c1c7ec016d565c2cf2de2b57281340ec0726510f4fedb66f3eed7b7f199efa51bee43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542dc9ceaf3a9f70383109c79b93c8312
SHA1cfe94c8f43f9e423511dfff3a29e483d728407b6
SHA2567b7da073f6b55b5396d2d31d282d32d15b43e91a0ae93075f5aeb2631875cfbc
SHA51246fa219a028e8cf9a460bd62ee146b508153686b2234580737894ffa319cf685f4114f7321d40a84d2e605acd3f7cb443f8da7c888d66569296f58d5870d0937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a72161cb6129a611e65541a6b1f19f7
SHA166da3cf2b6cdb18db53e49098a35c0cc1fc063a7
SHA256d1c0c94d585c0f87d834342917a475ec4e72412a5bb60d863a5f6e129887785f
SHA512483709c650705bd4d3d6efdf4d9b7546f5a01062c1bcaaba265115da9157ae664bc146d976be3e44b35757d1dad068a653a62c4a823db6938d86085040bd5f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e870ec73a4ec1a31afa7c01d011b08b
SHA17b0a6b1002f36b4815b6d7c97952126e7021f623
SHA256120f375eeb0a5aa280ff7cd986e6272ca17af2c09424ce0e58bf9291a32b1d88
SHA512002bc90eda233ce2d1820a359d657e9e28f86de5457caca0b730db274d9c1fa49f485e60cf869173a2a3747fde5bcaea39e2c52ad74167d2a7a0758d93184c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50551dfc405935cb07c684b0ee04faf9f
SHA166b79799d6d645f3aad70b8b6abe4683681c5b3e
SHA256bb4127ff530cdef7ea927101ed525d79ef6c8601930329c8183ceea645067bd7
SHA51210ea9b01f12f135733fcaa9f2db5260d756dc158a8a878a9765401cf88b098f48b4f3bbca0a1a592705e6ce4b43f6ed7bcf6c76dd9b48b079bdb5c5b4abce359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f94253469fb943250737d6f0389dbf37
SHA1fe57095971d6396a4f760c37031105d11d360e2a
SHA256ffc3dac08cc887dcdc7402794ae9000a8f6d1efccd7d0331fa27ba5f7c331ba1
SHA5128d8bbd4c78e4e0d0b54353b7ae623f3ec94c2512326d7fa40fccf7659279a870ee9ba38df9dfb0e90ccd0e240d99451b224c6148c9214e30c6deb9869ad18764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f1dac81ba67992c165580e7339a7ce1
SHA1799ed0c1db546b60fa7a55ce38cb7f56151804a1
SHA25669c19b12933cef689aef245fadefa82b1cb9f582435ab2199a8853de2e1e9d18
SHA512c553920ac4fe1ab38ac6f9446e193183e59ba514896223ab4bed0a913f3b90430bcdc05e420e3b2b0ca8cc89acb8f0ad8b3d966645df93020edc1dab9ad01c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c51da60c9e147cd33c719b7f4c906b2a
SHA18634a907b926b66dc62a9c1f84c364179b80c5c2
SHA256c06b5b82e142436b1d28417d5e6d153d6cac7cec3cf5a2e6cbe3be90d496c838
SHA51208aa7de564c4a04d2d0018e6039a9fd478261d0aa9884d344e42c8f51ca58d401168ab5da86e15834c377ce19fdfc50e53fc4fcd58857dbecf3a71de9f99df1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9f544da6f15e660bd129e29410b964
SHA164adec16f92822fd4bcb38219127e734b11c636d
SHA2560b69bc7988850fd1d83414be23a3a920e790e779a6baa611ac24c67cb8bfd43c
SHA5126cccf2bbf217dc50e6e856b8f3ca81db750066367baba7226c631be0a60bfe8daae39f8772555de679cbdfe012fc5d6d196ba07bf832e400454fa8c97d78e39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f116e168b6d38870b2b4a26e6c1b186d
SHA1e6a432f97564734c96ec2d9f174b357e9f9d8947
SHA256cbe8ffdd6dd79b28b72cce7a1d1b9d734030fcdcd4284146eee69443815daf90
SHA512541792c7aeeef7751472b0d2383a6b033725c459732ff9908bd61d000afa9fac0272b6eb52427905ff708acf95e13f48d45f7b79a2fa5593cb292b3d0430c1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9526a47d90fb6feb4d16e50d25c1daf
SHA117c40d642964192929d0ade411aa577ff3cc9759
SHA256dda388b5cd43baff7f264bee6e1eaaaa29b59622d3c271ee22a0d3041b53abda
SHA51248f3d57d487920f6d6929bbdefec345394de0a8152da259ad391d96014da6d6b366249135941747c7d5ecb5311366e2b928341000bcf069252b7ab7d9862968b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54382efb5abb0851e0cf514becee97057
SHA1a9618f3a3b82ed3f26b0d572ae206c25f3e470e2
SHA2563c8fcedee8d4242f835a75743a80ac015da8d68903612d01987a45cd28899ae9
SHA5125081082bf4777bfa5ab7ae76fde9f87cbd739458ac8f4d2815f932632ebf29202136012f9e088aac11f4a36fdcdd6346626a06ccc8d34494ff957c070fc39f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c2edcfbb307a3e7ebad178bed27f1cff
SHA14c3c38a2cc3f14e3cb1a6b8be35697e735b113db
SHA2567dfa82d954aef8495823f8ff847966097c3d2a0fdee3385a1eb578e7dac275e9
SHA5121fc1d002079386d53dc8846cb47476d18a1f8a9857a09a23cf4d58b9da1e182ea8873c9aaea203b05ccc0510505c4905759e71e76cbd3946dd270252c8f0c5cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b