Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 02:39
Behavioral task
behavioral1
Sample
9ca13dadaf32bca689ec86dd5c69bc5c_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
9ca13dadaf32bca689ec86dd5c69bc5c_JaffaCakes118.dll
-
Size
216KB
-
MD5
9ca13dadaf32bca689ec86dd5c69bc5c
-
SHA1
1c6da178f7b9c3ae28a2370fa797385e993775f2
-
SHA256
88da80af3cb1b030e5264bb64fb6e8e33fbd952c88be17ce3c3d064bc641e287
-
SHA512
f9856044417e7e1a1389d182d40f2920080cfee4c1c7cce69c2b9d59fbcf0d91f666c2f464576f9fa87326c632562915eee8fd26ff5b2b9816e2619c8fa62aba
-
SSDEEP
6144:Hj4+5PYFPco1Zq/TSucVWPo4Bpof1mslhx:5YFRZq/TdUWQ4BCmsP
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/1972-0-0x0000000000190000-0x00000000001E6000-memory.dmp upx behavioral1/memory/2408-6-0x00000000032C0000-0x0000000003316000-memory.dmp upx behavioral1/memory/2592-10-0x0000000000860000-0x00000000008B6000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2F8ED61-5B78-11EF-B88D-EAA2AC88CDB5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000f75ea8c9e8698613438f7fd597b2d9c0b18e0122445c1183e8816ab5a3f00f57000000000e8000000002000020000000ef1acbd016886ef761b48300029381203111939dafa8e1336211703b3b98f48c20000000146011445fd8739b9a8d3414c5a86bd214047c19e804092292f9cc5df5a279654000000003f3780e45cba0d1385528da6d8ca877e4e38ab743bc43bc05cd52dc01e32ccd2865e8c3da54451c664d23e6ba37ba0d975c756cf02d9f6c5782b0efe5253b17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429937830" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300eeda085efda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1972 rundll32.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2592 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 1972 rundll32.exe 1972 rundll32.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe 2408 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2924 iexplore.exe 2924 iexplore.exe 2924 iexplore.exe 2924 iexplore.exe 2924 iexplore.exe 2924 iexplore.exe 2924 iexplore.exe 2924 iexplore.exe 2864 ctfmon.exe 2864 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1972 2240 rundll32.exe 30 PID 2240 wrote to memory of 1972 2240 rundll32.exe 30 PID 2240 wrote to memory of 1972 2240 rundll32.exe 30 PID 2240 wrote to memory of 1972 2240 rundll32.exe 30 PID 2240 wrote to memory of 1972 2240 rundll32.exe 30 PID 2240 wrote to memory of 1972 2240 rundll32.exe 30 PID 2240 wrote to memory of 1972 2240 rundll32.exe 30 PID 1972 wrote to memory of 1984 1972 rundll32.exe 31 PID 1972 wrote to memory of 1984 1972 rundll32.exe 31 PID 1972 wrote to memory of 1984 1972 rundll32.exe 31 PID 1972 wrote to memory of 1984 1972 rundll32.exe 31 PID 1972 wrote to memory of 2408 1972 rundll32.exe 32 PID 1972 wrote to memory of 2408 1972 rundll32.exe 32 PID 1972 wrote to memory of 2408 1972 rundll32.exe 32 PID 1972 wrote to memory of 2408 1972 rundll32.exe 32 PID 2352 wrote to memory of 2864 2352 explorer.exe 34 PID 2352 wrote to memory of 2864 2352 explorer.exe 34 PID 2352 wrote to memory of 2864 2352 explorer.exe 34 PID 1972 wrote to memory of 2408 1972 rundll32.exe 32 PID 2924 wrote to memory of 2596 2924 iexplore.exe 36 PID 2924 wrote to memory of 2596 2924 iexplore.exe 36 PID 2924 wrote to memory of 2596 2924 iexplore.exe 36 PID 2924 wrote to memory of 2596 2924 iexplore.exe 36 PID 1972 wrote to memory of 2592 1972 rundll32.exe 37 PID 1972 wrote to memory of 2592 1972 rundll32.exe 37 PID 1972 wrote to memory of 2592 1972 rundll32.exe 37 PID 1972 wrote to memory of 2592 1972 rundll32.exe 37 PID 1972 wrote to memory of 2592 1972 rundll32.exe 37 PID 1972 wrote to memory of 2924 1972 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ca13dadaf32bca689ec86dd5c69bc5c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ca13dadaf32bca689ec86dd5c69bc5c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647e23d3a71693c0da765da390039fc5
SHA1c37bf9d08ef76f42046c50760929853e79f58a5f
SHA256736430d9ade0229066a8aa45c065ce409a3d785eb6aa62b254c62837d36d030f
SHA512771eac6cd8db7e4dea28be8c7494e44a4f00b62c1e3fc0ac0b1685740d3b51cff7277c507be27ba964f213d8ff55d6f9fbf85ddfe57611b150a506e3e211b70b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56771af1e79ae2a50fab95f9cf81c63fe
SHA12ecd5d0db38e6b36c225a18f4d79cf6ac963c064
SHA2566a2da9e2abdd1be00c4c3da8577e54bb4114740a450c7c65ecad5f946cc1d7a8
SHA51272693b587abed9797abae31be565949cdb4fb4b7531c18c113a46d7eb69312d10908f876163c953ee40fd385ad3582fbc2a0cec79ae38a71e2acfa631b4eece5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d552c01dee9995c3179fcb8ee749959
SHA1ec1c7a4be02f2993a4af29f9b3ea9c06a05cb8a2
SHA2569b9c7191006ea54525d2f872e9540532874b856abbc67218b30a8f9e521df279
SHA5126e7dc3c57a96316d0b85d73ecceacf9f4114552cefc64e2f703280ae522773b4d1923cc70eabee03b10bbbf6f374ecca504a828910241e1c1a22103904c64a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e26909e78db9af13b93ff66d9d29aee0
SHA1d31b6234ad450f6968327ef2b603d9817c6e120a
SHA2565c230e3c63722c3f6d67211a1d74c2a53ba6c7ffd76c478ef7a3a40b5e57d7d1
SHA5126d764c4d786e95bdc2c3d5649bec5f257eccc290c4696372ff52881fa9572198104f0b8098c0d64c64691b773a79b8b43312658a7798f45b08693ca44b55252d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5d08a959be3be5c2d28b9867d0faae
SHA1ffb723d30bcd4efb71d4d504f084a18ccf764193
SHA2563bfa76be0819252118d7b080d80b4f45aeb433c8dbb81d684862805585ead4ac
SHA5128d9df9468801c90a09fa0f20b55f5beadb559bfd3fcc4c70836cdc82cd82cead0c717cd7d07baba76123829e60a1446b8979580ff6f37edaef27cc937c88aed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559bed0ff6226dbb096ffa44289b75d45
SHA1fd9a804fb920e8fcc10bd28aee0e9ffead246059
SHA25697542b497c107efc89a4b64da2e1f34a61d24b8354492cee5b1b68449e7ba23a
SHA512ef46626546a8df25027ddbde8fc4aca8451ee59ea579884cb230b90fa480bebca307a0e241474e4d54f039f02242520b835df19a08169682f8dd94e92528b7e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d9178ca697467d3ab0e6458495b4a9c
SHA1b1c0ec8b9b7e9ebc0563d4d3044220e867e4ebb0
SHA256821caed46719bd6050a07a5ab147de7582929b7387f19263f4abba3de27045b8
SHA512872d19538eaf1bddf05ceb7c7579222cad90f142773c5401d8237e78de103b1471930af10e8904ada4a5bd128cafe10713e951fd5084d9af10de1f0703d7dfae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e524c884162868f23b6d7685612b933c
SHA1c4be18773bb37295722c05dbdd9d02861c1a649b
SHA2564b25c0c9db24d6b80fa364f1f655fcbd36f235e44aaa1fa34ca8c399ba6a8966
SHA5123d1e9cb6a4ccf3bc7aa769e1dec262c9251591cc9d2164a256c2ff47be52bdd7fe886f5e87f9a7c412e08acfc115ea560c750868214168185e097ad716328864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe39ce8b17a0344913b6b2ba69f7c475
SHA17cfa3f889c6be34b6032faf365ed6cb64b750d6f
SHA256cf3a9a13150297ac7ed1c6ce6c2a2f78c942f4488e4abcb3bf908da3b939d75b
SHA5122375be442e9dd21ee2b53e8090aaa2b7a6bd7425e044266f40615b322d63b9d5eb14c34135f53513fe32844b75b854866793d25f68a2325da0f7e53204483bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b877af137090313e65ea55efee0df993
SHA11d8862e591e7e6c9fdb49ac4bb7f1a6242444fd2
SHA256f833d82cff04df5d776661a96575701d7e5ec15841253343a71256e7ae2bacc9
SHA512f50232746c1b0e427b340074f548b7f3294399296f0ec166af7f0046bac811ae77afe69040a936077603015fff49a5f84c1b266de0c39b112f0b08cd0d249799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566e1a6b209d6671e73dfcce1d304355f
SHA13034abda5ebf021fee94baaa34057240d3dd5a52
SHA2564837cf639858f4b523a2c8e8815e203f94ffdaa8ebb9d41fc473cb6ed0f22841
SHA51265a6e027f104312aa3ea40a7bc5907243088478b1bd84f7a8f0fad4e334a6a6867cdbf60eb9ebd158a8a7144242d077ecee4ca7c27c68b38f063fea96dc0f9fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53577dfde30eac143a7e49a75aab527d9
SHA1baa2c26cfcdf40adc77ea58a8acd8ec441d71e97
SHA25682a352e46ba79e440b243ea1a9e40659ff2fd83276724701a28b765b53252e5f
SHA5123b53b126276b017aea0194ccf59fa4a615e4027fab447f2c93cfad39cb04fb7bf872cb7c5626fea2674d8a2e62e498873914f8d66d23304ea8236083ccd7e13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8cb638645cd392cbfa07cd439b22d6
SHA108c29043da03a0275c412a22c00838e48973565e
SHA256bbc5294605e6f97f486e1fa7b3a3c63569a16b55f32cc7fb0bfc540b238c8a0f
SHA51282ec54e4dc765804836688861855a73037c119603bbc7821791eb00111f2f91d73265cf3fc76bf8cc5afa0e1dc8425465951b7b4484eb3a3c2872a636aba55a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f3aa6a234438bfeb16ce97e4b0211a
SHA1a8394c49238fe1e497e444259da1615e59f154f0
SHA256ffc55d99e2cf67aa8bb98b075c4b4daf056a07ff34c1a3d63d8be2262dd9e3b6
SHA51274a128256f8144ad7051c6f419776b60c634f9dca6ead1171e358d358ee2f1d430d587feb35f41d10baa399f5aa8217399c4ada54a3e06e6daca37189437b1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e513a92a377e14d0228006c9221d4a47
SHA1177487b288399d41686bd5a35f19cb762db23d0f
SHA2569ed7f27640f6d40b98b2d00c2bdd00ad3d47793d8dc4c32bf218962290065238
SHA512e8e4c1e2736ccae1018f64a952d51ed821f33e8627284a0673702040dd2c535b29686f0b669f045f2b4f65660122d2116a8d6a017ab08ad1c054c24a08216de7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b