Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 18:05
Behavioral task
behavioral1
Sample
b47b4d354451de40bd3e1af90e3cea3a_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
b47b4d354451de40bd3e1af90e3cea3a_JaffaCakes118.dll
-
Size
211KB
-
MD5
b47b4d354451de40bd3e1af90e3cea3a
-
SHA1
daaefaeb2406097b9c5c8370086a97c786cd263a
-
SHA256
b233b16da7d28e8b611c00e799c4fe6513c6b9658b492ff334af78fb40604124
-
SHA512
b3bfc70320f61fe6a878ca0ab441ef7671d0405e021b4e5d16b14514b0403e9a54388b7fc551fefcf91ab183a0ea686481756cfca09dcd07cda1dc5feeba33ce
-
SSDEEP
6144:5+30fTfVKbk4XzgUUwvbIBcSRZOnniqwCdkEh54:5Tcbk4DxvMqAkS/E
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2024-3-0x0000000000230000-0x0000000000283000-memory.dmp upx behavioral1/memory/2024-2-0x0000000000230000-0x0000000000283000-memory.dmp upx behavioral1/memory/2024-1-0x0000000000230000-0x0000000000283000-memory.dmp upx behavioral1/memory/2024-0-0x0000000000230000-0x0000000000283000-memory.dmp upx behavioral1/memory/2244-9-0x00000000008D0000-0x0000000000923000-memory.dmp upx behavioral1/memory/2080-13-0x0000000000190000-0x00000000001E3000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF2723F1-5FE7-11EF-BD1F-566676D6F1CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000b7d4258e2279577e626c38840caf649e5b3a11b4b3ac7772c3275886c5fe21d1000000000e8000000002000020000000255708f980b82e49142314c0c7cd05c408918ab2b0d476d407aab87b4dcd4a1b20000000eec1b96c18e341d95d75c4d2c4c5481ee1d22d3205202463a17e93fec6a413954000000051d7826525a2062ecfc28759fe7de259f3f5765c07c68f8ecbe0f2385fc8d15afe935f2502ae6753fe5c480e8eca25114bf7c300d435f51027638544e2455037 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430425419" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305699edf4f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2024 rundll32.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2080 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2024 rundll32.exe 2024 rundll32.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe 2244 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2660 iexplore.exe 2660 iexplore.exe 2660 iexplore.exe 2660 iexplore.exe 2660 iexplore.exe 2660 iexplore.exe 2660 iexplore.exe 2660 iexplore.exe 2888 ctfmon.exe 2888 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2024 1932 rundll32.exe 30 PID 1932 wrote to memory of 2024 1932 rundll32.exe 30 PID 1932 wrote to memory of 2024 1932 rundll32.exe 30 PID 1932 wrote to memory of 2024 1932 rundll32.exe 30 PID 1932 wrote to memory of 2024 1932 rundll32.exe 30 PID 1932 wrote to memory of 2024 1932 rundll32.exe 30 PID 1932 wrote to memory of 2024 1932 rundll32.exe 30 PID 2024 wrote to memory of 2732 2024 rundll32.exe 31 PID 2024 wrote to memory of 2732 2024 rundll32.exe 31 PID 2024 wrote to memory of 2732 2024 rundll32.exe 31 PID 2024 wrote to memory of 2732 2024 rundll32.exe 31 PID 2024 wrote to memory of 2244 2024 rundll32.exe 32 PID 2024 wrote to memory of 2244 2024 rundll32.exe 32 PID 2024 wrote to memory of 2244 2024 rundll32.exe 32 PID 2024 wrote to memory of 2244 2024 rundll32.exe 32 PID 2864 wrote to memory of 2888 2864 explorer.exe 34 PID 2864 wrote to memory of 2888 2864 explorer.exe 34 PID 2864 wrote to memory of 2888 2864 explorer.exe 34 PID 2024 wrote to memory of 2244 2024 rundll32.exe 32 PID 2660 wrote to memory of 2640 2660 iexplore.exe 36 PID 2660 wrote to memory of 2640 2660 iexplore.exe 36 PID 2660 wrote to memory of 2640 2660 iexplore.exe 36 PID 2660 wrote to memory of 2640 2660 iexplore.exe 36 PID 2024 wrote to memory of 2080 2024 rundll32.exe 37 PID 2024 wrote to memory of 2080 2024 rundll32.exe 37 PID 2024 wrote to memory of 2080 2024 rundll32.exe 37 PID 2024 wrote to memory of 2080 2024 rundll32.exe 37 PID 2024 wrote to memory of 2080 2024 rundll32.exe 37 PID 2024 wrote to memory of 2660 2024 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b47b4d354451de40bd3e1af90e3cea3a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b47b4d354451de40bd3e1af90e3cea3a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2888
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aa9a516a0725868bdc78a5dcd273549
SHA1a6c3c4e80f2caabf6323970054557c1d4f4d6391
SHA2563ce73c2ef2757bacb120443bb8b5b2edf01a0c19d3532b5ce133179dc85a03e3
SHA512c3ea4bc5bb0209a6fdd1fd0df2101e6d5f8660acc634fe227a254f6502a8708ad2be755e482e0772540ef12153a4426d52c9a8d6f0170571e2abd6d3833ef6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d012313e32673620b2c8bf9947675ac
SHA12b78141b2c583e898ff36046956a5eb73b76d32c
SHA256853a9cb6a6d5db4efc9c71ad1250a36fd4a7f3383d5f964049f204cd22cc46b7
SHA512174b253587e4f7f157325fba7bb43311116a2e13ae7f3b632eba4483358add11e4a2a831160b65a7d391a34608b5a3336238b678a6eb992673f6364e1d8fac32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5837ec1ef494182e982377d0172adb4be
SHA1cde6a0c4f7e23715c3f6c8e11c6ae2fbe8dc9f44
SHA256ea9483b5474f2ae363c68f60ba4589e7508c60ee78410702c5287a418158623e
SHA512b1ad36308afc1d629db963051a4c29c10622e815f58fcc02599633b45ce3002c661c7ce2eb723748c22fc0589361f35917ae4163378d1bd0d1b7ebcd95fe504e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec37c0e31361ba0e48bb41614bf53901
SHA159aaa26c8cab9f7610613d1f241f61e269ebfaa5
SHA256dbe06963cd65cf641ed37a9c03138cfbed1020bd616db213749f7561c0ac8ecb
SHA512d7e470a23e2c23f57f9e36387e552b5037926243aaa00151fbdcf624fe0d6849c27e9f4f21e56ea2840377fcd5a9657b21bce84877c07e20cc950d2062c96aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dd7b13e0d2532077dd3a928f68fc1c8
SHA1e58cc8a618eaef3361c6fa939285bb4421fb0639
SHA256c0e19f09c07b0cfdd3bd950f4f817f852d87adf26c2fd84ecaeeb70e36da5859
SHA512d4d9837681c8592d14366b389aa5d9b9991c08fb09842cdd1ace74b196079a2db0609988c99aaea8af7cf32849b33377287e9eedbd663218f72fbd299f8370f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dade537208cf2f38482992be42ea41e8
SHA155435c954de1f08a3abf9ed0af263fe8fe54880a
SHA25630e8a8632355606e6dc5515ad48ed6b01b65ccfda705f0adee3c6762ae1874fa
SHA51210d02034509573431a6b8894c46af86b3c268c3f63b4e2c462748ba222fb3e2df4d352757a85d18b42863df3a9786b3c107f252139576080707af8f2b23f2e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d78cf73ad8a83d4c068a06a7dc662504
SHA1d7ca90e7d248df91671e1a6ef0b41356140c6672
SHA25674df3c5b50f4ecb7805b646b6cbe4c4180e3a75cb09e701b94e2bbc90bb37ed6
SHA512c0d6bad2e4aa2c74460461dbcf6b52756900646f20335372de7da967184892777c1c2e8d009ad014241bd2ab8f108ba67034922a86af6fab6ca69ca4ff11685c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f747fcf4e35e72ab590cfc347e99123a
SHA182680cb33cf4b219dbc99eac491aa0d733a059b8
SHA256e92995705d77bae53b5279d7438d4b91407f389a1141322cda004a3b8c5849d0
SHA51287b69f1e9ff70e6d359a282900f5421c4cbac72a7f7086785034002fccecc8436130b9e367b3638d7ee9e46635a7bada0bfb27cb6a726a4d427aa3caf2822d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c06826713f4bdf0c519305d562727dd5
SHA1b337bf31f74e5866771e0b039d5384a2ecbcfd5d
SHA25615b754ec4d7afa6a1a4d349961b89ecacbb36becfe6855375021c5c615868180
SHA512634a1725f211dfb3a4e7245ca25be15955c9e45700d410e3ced5f871bd9dab8cd02a61eeddd27c6136c3ef5357e4db0d61fc4b102fbeeb2f2e60e23b972199cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdba962b0a9a813a31bfc4f3dae892a1
SHA1daa45c0aedf764370679d9035e123d0d3812dcf1
SHA256fa231d30f4a4d759a480f034170f76d832d7376513d0c6e622393ba8254f4cbe
SHA512a250836b59041546c406937e5b78dd9708c744ad530f293a6fa916a394fdac4f0022eab5b58d4f7d274c2004fd376f3c13a98e52a5b5dff562b21eb43bcead80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe51153e1a9f5d6b5cf0553da1418003
SHA1fafc2e5d6e7f19488e0027f09e32ce8f9b75f0bd
SHA256ff97d59e58130122b368d205be7679dac29e07d13c88bcf1fe332140f96fbeeb
SHA512bf9fbaff17b8b4d47c58167b1f6c23d8bfa573969ef47afa9a0f97191b1f5aeebb848c4fcb655c1865d8ed6cdc511d226637f434723834d4c130880014e158e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f413043770879e53fb3e5b1d8343a10
SHA180236434809a86f2faec79219c8e93a74a2a35a4
SHA25635decb0fdef8a3ed8ad9a0085e0ae42c4b1856f7b0713c62242d41da131f63a8
SHA512c9e0ca151d940f7c2e73c2bffc6667fc25c739a8b435cd853cdcfae9d9563bffc72009c2a3624233b6e1bbbf160a6cd93eccb189e9bbbfd03582d15c137c4a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675bfdb2b2a18c7dbc2b602d8c062b07
SHA1c29756a21516ac8a60e62a9bebb0c7a02e129b4d
SHA256c4ce89683216ffe481404b3c951f47dcff9c1530f451c36d7253fd81ec145ed0
SHA512e1c94632728a4c032a6baf37cfe305f1c94bbb87ca2c1fa89e13243109b9324d95195254eeacb1576d29049834adddee2e4a55465c27a5152710d9797d72ffe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532763264ec0938022b4f6efc1bbe6e8b
SHA1b01fc2c2fabea9538dc44e92bc9fdbbc3962a0c5
SHA256346b3827763fc023a8363a05d15c2c8515b4270af8d06e1cbd5c47be72581575
SHA5127c81fc37d4a729b9589e4d0a946f153c208c05ab08e3fb22f4bf6a6e76e3926fae1f26f4c452d7cf774bdd8f11317c8fc959633aae042c90824552b25f632327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c0b972eb6af3d08b59107446b88968
SHA1d0dba676e006ef4181c6aac493dce0ccfcc0fabf
SHA256d368852bf65bb537bd2c1549ce5e48f2124964cf06196d6b056a2bf5f7946f80
SHA512e539746931238f20bb1f1f61154f6c1ecb80b7450468114d19ebcf0ba435a529846e7b2121a900e56ab59d4321a0ad1f5a01df0f9b76280a9f3a8e7aee0de060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53391408b10f8b6dd993d58fa51b9854c
SHA1d9d0121c803ec0f9654a996de05d029ab71f66bd
SHA2565748a9a4663a72b00f74bcfb1cebae780eb15bec4ce191d236210dc9a417f212
SHA5126217a2f43b39550849229112cd01becec4449f99d1b031611ba54a180d4ae85694c65a73cbcad0dc1c21b9ddd350ac7ae017d9eef9019b75f78b98d07a01b3e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af474ce79c6919e211352cd4639b7c29
SHA12f212f4f7a0385f6577ddfeeff47fa3e53f1db3d
SHA2562c846b8dff4ebe2a9545cb3318fb38c9998881f29f5a54351aa4a215092497de
SHA5121044c33e79fa8de3a96d979e76218fb6ed562fc3190ed7220d34f403fe704bcf5ac344264085f26a4cc126dc98ff52f2c80395fb2223c25fe60dc17afdc35db5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b