Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe
-
Size
298KB
-
MD5
a89c79ea16938cede9b9b52a11d33fb8
-
SHA1
0d37a98824f6ccb470cc39c73c809e336fb5543a
-
SHA256
a85cd0a43faf0de59729bbe5b3189087e08ec9138cf5acac4e2cda9f9e567b19
-
SHA512
3d570ac5798de05ffb5acec91d807db6ba22bf7aa0c0e83798ee706808f5207a31c3ed1f36dd7c5b93fd7f013a1c9210e4a89454eeef104bd8d8dfe691cec380
-
SSDEEP
6144:BdILOUcqGyItWfpMKjjOOKy3fvpPMJ/TFF:BdIXTItepMKvOOKy3mJ/T
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2540 firefox.exe 2524 firefox.exe -
Loads dropped DLL 2 IoCs
pid Process 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1928 set thread context of 2540 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02f565bc4f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83E74991-5DB7-11EF-8FF0-DAEE53C76889} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430184692" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000054c904b3a9a27c108f5fe67bf3bd236f53af84d359376bb47a4d89fe3924f65e000000000e80000000020000200000006fba4412ac70f9acaf3d87a61248de1986bd8836de0525c568972aae2e7df7bb2000000032bd1ce531d75d813c591f4a1b22dc4a275508e9b906321f8fa11e038826de0440000000094c69aae79ed9cd413b4b62a99d50b6d670e786df816b093c5bee06142ed86411ecf994ab8124f26203ff2f2e1d94de59368ebfce69d90e2bdb17ec986feb8e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2524 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 30 PID 1928 wrote to memory of 2524 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 30 PID 1928 wrote to memory of 2524 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 30 PID 1928 wrote to memory of 2524 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 30 PID 1928 wrote to memory of 2540 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 31 PID 1928 wrote to memory of 2540 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 31 PID 1928 wrote to memory of 2540 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 31 PID 1928 wrote to memory of 2540 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 31 PID 1928 wrote to memory of 2540 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 31 PID 1928 wrote to memory of 2540 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 31 PID 1928 wrote to memory of 2540 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 31 PID 1928 wrote to memory of 2540 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 31 PID 1928 wrote to memory of 2540 1928 a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe 31 PID 2540 wrote to memory of 2872 2540 firefox.exe 33 PID 2540 wrote to memory of 2872 2540 firefox.exe 33 PID 2540 wrote to memory of 2872 2540 firefox.exe 33 PID 2540 wrote to memory of 2872 2540 firefox.exe 33 PID 2872 wrote to memory of 2732 2872 iexplore.exe 34 PID 2872 wrote to memory of 2732 2872 iexplore.exe 34 PID 2872 wrote to memory of 2732 2872 iexplore.exe 34 PID 2872 wrote to memory of 2732 2872 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a89c79ea16938cede9b9b52a11d33fb8_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\temp\firefox.exeC:\Windows\temp\firefox.exe2⤵
- Executes dropped EXE
PID:2524
-
-
C:\Windows\temp\firefox.exeC:\Windows\temp\firefox.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=firefox.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
579B
MD5f55da450a5fb287e1e0f0dcc965756ca
SHA17e04de896a3e666d00e687d33ffad93be83d349e
SHA25631ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0
SHA51219bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C
Filesize252B
MD58cfbe7488dadb1722c04cecd23f09808
SHA17ad966c8d67fcdff286cb63f81a051802644654e
SHA25690f41aba18ab192eeca240b0f6739ab50458cd232b8a65a101be3fa4576c6457
SHA5129da6b24b092164b7399f2a6573b01559d0e152cf454fc55c6d7db3bafd6c2821c56396dae1e0624b0c12fe07656fd9c593543cf6c35eecb660799fd248b8dc23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311e6b478ad84279ffad478cb7b63f9a
SHA1ae2b8ecf957a6c543fbe62ac599a9589505ca4b2
SHA256e5b89d8b6af3357724bc0ff773e82484fd5bbb16e4585c73239cc778a842a7cc
SHA512832ef6d31fb70efc25b34dfd5751bad66cdea0aaf63e2e8385dac6c260d425a68e6e6abbfe6eba7717c47bd1b5c789a760e9e9e68d48ce44d99f28db16430626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b654cc2c1b361344c63d938c5f9992
SHA14219fb9a39ecf45e00bbe00ec66f6203ebace55f
SHA2561d2e5929057812b659fa9e51b4411d2d97732b479cd83df281c5892544119420
SHA5123e39d46973e411261c8bfce20817f62b468053bc5b5827c3e52479566517ba8c72d2c571687f8be5f4b1ff1f87525a578a19cb6b87b1ccba2bdec2836f666efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54518e3c01c1a36f9dc80acecdfb98767
SHA10b9692a45637b26ead9ebb377e1a7efa4483d245
SHA256ca696e5f7e17d30b5650080fadd1bb4f56468fd6d9ee2b9308ae9f959c3953e7
SHA5121537c276a35046019dd215fcb868d4c945059d6097a34412d469113ec7afc5e1b2e109e49ccd5b835d6302197f45046f9519b9a7b2e4907462dbf6682f950639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f05844a61406858f76b8b677ee31fa9
SHA1ec190720be9b3ea9236dedc35e4e4e736754b5b2
SHA256bceab112aaeeb3ae17d4860f9238b645e685cb7722df25064fa5bc7c6d2d0604
SHA5123c0bf5f673155d9f449b9773a2f4603e21aca94e2c79f8aa5d06caea14a7f8ad17ae947834d4974d7786558f07c2e68439bc05d64f627acb91cad13c6451b5dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515fb9c94297bc9dc182abbd0b475a3e5
SHA1995e25e3a6f4505963c0ec3f52e08ae914eba1c3
SHA25615a6fec273713102dc9a0de11b4e57922d2d880de52b06377bb8ebb96ea9e47c
SHA51289a8931b271f4fb103dcdac68ea7261b4f22f7165e7589e6517f6c54f3283380dbbd1391f2a186a7ee8f66076c4b0dcac29abfa64c03f9a187dff5334c3b0860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0f06fe3d456ea74445ed321ee7464e1
SHA11439b1378bac62b7fb4494b18356e4f1f04cd615
SHA2568c65f225c9f793650fb5545d198c0ea0637c7e1de8001a8d1684c991778a200a
SHA512bf8c06d3028f20201a64cca960d8ab898356f1cd34225dd3f5700c21dc9dd6737c148c9165809b62ccb7de1223530fcffbbec39a2a174b1f07aec519a4a5b996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0da4677120dc6681131ce28abde50e2
SHA186552187dbc2fae3af9514864e61b3d4ce0f765d
SHA2564a337b0d0501584a704e6cce541ee2997e30678b74254364d0630157ca468b87
SHA512e5777a3239eb1e38755b6e0ddac4869bee5dbcffe934c8b6bc279adf29efa902aafbd90f86eaa07ed480e5c7257a526b5e3cf7883e031a93a98fdcb4fcb49291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a941740020e8d92caf0dcecedc22a1e0
SHA1b228b7b60043217d325ce90565abb6e0388f5e84
SHA256c2fc9ed8aa4a69062b462f234328fab481f71b471b7b8d9dc0c0e2662303f3f5
SHA5129725b8997ec2789cef93bdb48aac7022bd56c9934d9e5d5848cdea90203f6203aac911eec0b60fdeec8da08a39512c6a3d9454df34e302dbd1e93ac328bb2d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d858fe885b905ba9139e61dbe234c58c
SHA1c434bc139e222df368bae9b4e6b457c3d9708337
SHA25696319e76c45dffefa53af1d646af3d6a7fc45dc07e761194dc443b4409ef1ad1
SHA512a7e44ebea3073369ca980d4c40d10fb687868abd57cf40a4ca9150db16c474bbc3e1c462e07eeb43467468a7ea6bcee234937347cb5d7a1e4dccb4abec34a1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b35f4c06b5a097cd69c9ad3faf426af1
SHA1e11cec2cce0fcc54184ff7c7a3d0380b77f44da9
SHA2567c58fdca66cc85560da1e8ea04f2b489c4aa27d4508ea1413ff99ad5f05fc062
SHA512be98497a18f74fea457c89971119e96cf833e53da0c2d829bf4355f629bec091ed343f17dabcbb80c90f8e46aa69d9ee1d7f4ffe99ed5cb90f914f9c7b7a198e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055bb5e96d8a75ca35119ceb36a8b436
SHA11823b64774a5c03a45efc6babcdccca906e9775b
SHA256d55feee40ab914fd95c67b39e0e8867582ab8892e990474ecd4848e4bb6c2a35
SHA512bf6bd9653e823ef9d0d9afafa9226981275afc171a99ecfa5553bea1790232ad912f0f90654050076ea2d02da2c23f2282cd39620ab3ce9ee87100ed9f49abd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebdd5b971305739101b7a6a5d1179e33
SHA1efcc5db1bbc53bc98bd4d7548ddd21b2edb383d6
SHA256cb7308d8eacce6610148490cc9d971a96d3ec084de183481ef7069e2092743b8
SHA51299d8ed6a8bf067d9d0e1a98aba0ecd80792f3e53b06d4d0242470cbb6720df65ec9f210c13bdacc5d19d3fc65fe7aa7483be9f5e897bb27fb7425edbee42c25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da7a6abaf1f3830ede8426aeb329154b
SHA18565297a45073913cc4d8be97caba07fa57e6fe0
SHA2567c06c1b76388d3f35af364b1d825f09fc957734a0d6661b76aa272d866dae8b1
SHA5129fee62f5f7cc30a991e9cea33d3e1251d5a1adf325a89c45d4ce1ac26388a33957731d07faf81bc2f3ac153a45b0e142667414b06267805a86225dade4b4e8ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f331d9876b8451ea698e83547f3db7e
SHA1cc2a7376a88d3c9fe0da184a29ad80c584b9048e
SHA256d59f00bd15f35e4518880d3261de8f7fc4bf9efe537364bbce345c78b547a513
SHA512d2c49a4a9b412d109a6fd70f8bd4d262e6b15637e08c1579d177b59dd1a78f98b5bb478079f05f5498bbc764bb66d4bb2c346783b1e3ca3d2837e50227035546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521c9a61678591a91e60012b996039862
SHA10383489bf673a6f48c825675ce494a910650ce02
SHA256f5b686e6b89da4fffa03d4c29e932e6d993caff6d528be93de260ecde9413c09
SHA512e8168cc35dc05307e6789d7c2a998def7c18157cc064ea6d7d083dae9ea5527509abf9cceb26f06da9e9b33f1737357f43458a87ba5e5089a95a4918d172fe79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b82188f2b1c72d6d4d96acf30c69222e
SHA12d17f1fc047205c890cd9ea4e12183c2285b0a6c
SHA256c33bd55879b2bdf6eb8ae4ae9e55f34013b30e4a072685f9fc8b13661e27ea67
SHA512854fc505f7c47eb0cc7e723b2ee87f6a860db0d1d961e182575048eec95f1619280c8a9b1e0efe1f5ae8434822428541e2a7d8363dbb2c30e74159be598a0662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e300c78f7b50b7de89663e4ba8169c5
SHA1eaeef958107e11c3e3816a35f532a25448819165
SHA25624c4024c06b58ec5d69c4ce756ae49f750dc065a5b5c105e621143abf5ea4e67
SHA512efbf55edfc02f4b399066ac109bf48d79079b3358ac882fcc2fa1088ec3f99cd12bf2450c8a749c725a10b5abe5ffa0a27583aa26392d42c041706c28654bddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58657700755b09d6b7e32725c030f57e5
SHA1840969a8724563bd1d214dd16cedb00f58000214
SHA25677a49caa0725492dabb393e734a3eeba9e13f35035391b6da703f647c310bcf6
SHA512a22805a986073d49c91d41b688b83a9c8f9dbe18e2555420c1a36c8b9a19ec67adf5621754ff7dfc40b5371227f6930141fcc6741ac9a6dc8aaeed7136536546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efdb16ea199305697457057b0329b58f
SHA1fdb85bd6540eee326ee2d049bdf90d89c6128879
SHA256dcebdac412035e1b73c958a73b47d9167f87dc2528cc09c28d4251c9ed0389f8
SHA5124228d567c375a0793535378c2e8613d61e21d81c343da579d5c48e9b4298845c7f338bb67333f0473707179077dc6c4d3d527c739bffb375902111d619d9d7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07f1ced4077eaa52975a9ef3292d711
SHA1ed16019c14edc9e1c25deab26e9751e124577599
SHA256b4cb4a5a216bc1ab91b3ec02414aae36e363490150e567d4722163e60ea000d0
SHA51259d64c7772db2a6eb7fd20cd8497743b423adfa94b0571d46529c32ed96ee2a05fcf3e886e9c8f857ee947e4b7437a89ac4b953ec1c5c7fdc7d76fc7af032355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d57ee7dbcad417a9e6671c30d62c51
SHA1337b75908fbacff016327eccd3629e28737c7b8a
SHA25667bcbdde36fa61a41fe5adc86b5d6fa0753914a42868058842d3f9b9d7e40b37
SHA51298adee9dba2a724887c3f4143dc5ec30818192016db494dc0627a2866c1324817bf0f44198d697ff6c406199b6f31b6137cc9dc292a7d079760852726cc88275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56652e5d7c844983452ee65a3096e54ef
SHA12dde9d0b7190cdb9e2b78162b9c2003e8ca819f8
SHA256a7fc2cf0d1894716836aa7a12eca97e7a4bbeb68b546a1a22fe652512b8a52a4
SHA512b3e6e149c50dc586987a259235231ed057f7b7b0aaeeae9bf09720d8d69cf2d22663d6733a37c2d10b03e7aabc6bd91e8b3abeaa435c60dde418c3c184202103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061478eda01aeec6e43e70f5bf6fc75b
SHA1476051eb4a79838af89279354c7d136f4b4e075f
SHA256450758134f334086322bbc8391e81bcb7b379d7a5f3dbc29e8e9a261714b12f1
SHA51246efd5f912f9cc3dd62725b5cf65d3e21266c6287a7ea9d74320c2fef5ec24bbab937ead37faeb0810b268e7fcd77640908bea2108011589c24b748a383ca56e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34398c722e431069ea3fc3d8823c65b
SHA15fd28d2f20546a210f5628b01cf3ffcd21eca7c4
SHA2564ecfd6a48e777c077ce460a6b95afde8ba2d181a6fd48caaba25e586fe989137
SHA5129a8655afd0aecc70efd7cf426cb0a0c76b3f7fd10c6c6fc6853c5f379aa512fa4cc8148385d5cc95ee0620265490a06c6eb27ef63e485333c3a7d192953ff87a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568078c0db1afdf7297385f9194d67caa
SHA194d26e67c820ccb8579fd9b2ea49ebf7db0db2d9
SHA2568991857525cdb25d42d921942856be359eddf5e86ad602b710428f22458bfcf6
SHA512ac3c502b6fc933a32e0f2202dfaf7e03281e97f1a139ca19b262f37857d37e007e9614fd4f558b0e72e119ed174852fb9dc59430d61c7922367c5eb1ed077ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0b6cf48281e806e52a0df901107f05
SHA1a54b33b8bbcaa62a8db9ae2b4ee5a363ac9b006c
SHA256de4db9618c599f7abb27bbed4e1460e38f3dd1f823c77ba45175f43f8787fced
SHA512616d5d2c75906e6c2703d0680ef6f2779c93e165a7c03e0752ca8a0bdd07b493d6d5eabfe3679aecea25dffa0e7add04f1da669ac008601e481f47a897072f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529528049d695f43539f1e7d974af23b4
SHA1925cd2713e032443fff4111285a071ca8e6797d6
SHA25699b73a1017375270cba840f14cf9a12e3052752944c8407499ea2f142b07c279
SHA5127684b20f0dcb08ec1d3cbe9815b268ac8056f9569c4246543ece7b13cd5974d1cb133603fb7b81b1f718bd2295a8096f844f3156d91affd96879b893cb6e8727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565e845b820c005b4ea1d613b3d0c37e4
SHA1b6db6d1ef79020622b3052bb76a388e86d0d12cf
SHA256a790f24e5bd305f222ba50bafc1ff79695a0118f6084526a98dda2addd9c4947
SHA5127e68a55106974ef1bd4dc7a97a949412c4105a80194387928f9a695439df7060b8885adbd94aad314dcab7f1e8062bff399ee41930d5c6a73af522c1a6f84ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54091536e85e3e0435e102801dbc28afe
SHA1660f4eda086937fdaa3c7e9d18f847d220fd79b2
SHA2569694eb5b3a481a09fafb987a60a77716df0ddc2b2806b86c1a8166a822355e3b
SHA512150da55f31238b54195c55b5006c2f86147e0d704753ddbd9b33313028dfd5b7804b3218b27475c9cdd564e060630a53357b55977bc4b9f8d556f1cf32009438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257bc68a9b0eb59800167d05e9d77a5d
SHA194aa15c2539f517958a38b3ea35068519817305e
SHA256e7794aec0eaa5a06ea18ced919d1089c67a48f7138d46330d4c969bfd3520726
SHA512165b3caf5c231a2dcd5ee1286e1b6592118d3e3fb42198b17f95b7e6a91dc92590e5954916b8dd3d1d58308a7448836d657d16063f316629e190818b4bb9876b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51666c366fd3d75e9f0716cf1134d8f5b
SHA14c3d033d37ec46dd2f70aefa49324c7a13ae4d7e
SHA2566df4458e4d4aeb99d97a921ac816dd127caf31487c539cf138ab82ca73f2fe3c
SHA5126452eee4a9b9e69f66d0ff143ac3e727be512cdf22b9c189e5e7fbc3ea855086d5cdb3bb09e465713b9854e6e545481f5b680ff3719c1f59a5a19fc17505b90a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98