Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 01:16
Behavioral task
behavioral1
Sample
c4210a26cc355b64ed5734df960b2b78_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
c4210a26cc355b64ed5734df960b2b78_JaffaCakes118.dll
-
Size
209KB
-
MD5
c4210a26cc355b64ed5734df960b2b78
-
SHA1
d0716e4ee39e2caefc5844b35143a4d7e38ae4ec
-
SHA256
838d2f9aa24bb10a81b1d750e116c443100f2be1093fc138e31621fd5911c460
-
SHA512
f000f29368d3c77c14c901573995b05b3b252134af1a16c01e32e1bfb3d35195f1d220f380f7bf887851495c001d3b56dd86895ef608dac9e43f32f0da777f43
-
SSDEEP
6144:T/q32rRjPhKuDkkLjp+ScgBKozpJ1XVSGuRq9M:myR9rIMHZBKI/XV2M
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2144-1-0x0000000000290000-0x00000000002E2000-memory.dmp upx behavioral1/memory/2436-7-0x0000000000230000-0x0000000000282000-memory.dmp upx behavioral1/memory/2692-10-0x0000000000540000-0x0000000000592000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000c86073405f2f2600632b9f899409a912e75b34dc1f59f16742eddc39ad14aa1a000000000e80000000020000200000006256515b218dc74d2178d82979ec854f6d240284aed20431c7cb0a0644748d4920000000983e51424956683198addc8200a4c0b0fb865e9135fd8dea65d9c4276a17681f40000000058638291d2b9bda523b2cdfcec4568706f80d2db98f744070b891357130a76d00fdf32a5b3f0a964cd7b01d4f09a3def0155b79ce34d768ce550840d31fc0cb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000002b7ded9fba9e13b5c3a6be122fd438d8fd56f1375a2c17e8e885886708bb6fd7000000000e8000000002000020000000ff9bf9a14d496de37aebffaaf9c8fe57b6e5c52ebacd46cfd7b11c25c15c8709900000008201bbea2b6f4ef6c80573c042068820f9711798873be31cb1f4fc17fa92d5737f94a04206a564e611280fced3d1d1862ce9ee02d9b8daa97a2615e089133fc61d1372ec1ac74e070ff7cca25911caa826df33a34f5adca242f2b43a4936a6f081dccc7ca83d0195ee51dfbdf745bb5081647a45fa571054e22b048f8dbe2f5791d449b121b8b80028c1f0a670f267e140000000b5110f2cb45dc1f1d0a227681d0f1fcef5636f9e4192a5d44ed507f30ffe210355f32cebf0c5e7ad3122deb35a97363ae1ccaa4a2f4756fa6772b6b7c5e7d32e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430883260" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF1CE4C1-6411-11EF-BD75-DA960850E1DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09adcd61ef8da01 iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2144 rundll32.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2692 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2144 rundll32.exe 2144 rundll32.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe 2436 notepad.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2912 iexplore.exe 2912 iexplore.exe 2912 iexplore.exe 2912 iexplore.exe 2912 iexplore.exe 2912 iexplore.exe 2912 iexplore.exe 2912 iexplore.exe 1636 ctfmon.exe 1636 ctfmon.exe 1636 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2144 2536 rundll32.exe 31 PID 2536 wrote to memory of 2144 2536 rundll32.exe 31 PID 2536 wrote to memory of 2144 2536 rundll32.exe 31 PID 2536 wrote to memory of 2144 2536 rundll32.exe 31 PID 2536 wrote to memory of 2144 2536 rundll32.exe 31 PID 2536 wrote to memory of 2144 2536 rundll32.exe 31 PID 2536 wrote to memory of 2144 2536 rundll32.exe 31 PID 2144 wrote to memory of 1396 2144 rundll32.exe 32 PID 2144 wrote to memory of 1396 2144 rundll32.exe 32 PID 2144 wrote to memory of 1396 2144 rundll32.exe 32 PID 2144 wrote to memory of 1396 2144 rundll32.exe 32 PID 2144 wrote to memory of 2436 2144 rundll32.exe 33 PID 2144 wrote to memory of 2436 2144 rundll32.exe 33 PID 2144 wrote to memory of 2436 2144 rundll32.exe 33 PID 2144 wrote to memory of 2436 2144 rundll32.exe 33 PID 2808 wrote to memory of 1636 2808 explorer.exe 35 PID 2808 wrote to memory of 1636 2808 explorer.exe 35 PID 2808 wrote to memory of 1636 2808 explorer.exe 35 PID 2144 wrote to memory of 2436 2144 rundll32.exe 33 PID 2912 wrote to memory of 2676 2912 iexplore.exe 37 PID 2912 wrote to memory of 2676 2912 iexplore.exe 37 PID 2912 wrote to memory of 2676 2912 iexplore.exe 37 PID 2912 wrote to memory of 2676 2912 iexplore.exe 37 PID 2144 wrote to memory of 2692 2144 rundll32.exe 38 PID 2144 wrote to memory of 2692 2144 rundll32.exe 38 PID 2144 wrote to memory of 2692 2144 rundll32.exe 38 PID 2144 wrote to memory of 2692 2144 rundll32.exe 38 PID 2144 wrote to memory of 2692 2144 rundll32.exe 38 PID 2144 wrote to memory of 2912 2144 rundll32.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c4210a26cc355b64ed5734df960b2b78_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c4210a26cc355b64ed5734df960b2b78_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:1396
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:1636
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503c9c0a053e1638323b9ff06e25234b0
SHA183dd9ad8a72e828d0c4ceaada98f3ec26bd267e4
SHA256ed444849cf6eb9c714098f8230f55d0f93d9100d413d38f3ee020c8278d1a449
SHA512647acc372c9d3124ba293e57e8fbd990caf67a1188de6c1e266edb9b6fce4225cf0108426f354b9c3392de174e3c429912532498043ec4051f4cf5c44e658cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a33f596e703cef7057afec54f7e305
SHA1e5f5eea0bff5d46ca38b7a25f520467c6388c732
SHA2565da6204c3554259c30e70737704bc7d11d068d9bf33d9e742c6f74c3ccd030b0
SHA512554b46d42aaade7e79a1924beef782cfe6f7ba8ba8706e0167eb0b60dbd9448b0613fdacc0d8d0cc998338c2a1a2342b3b7682824a8314cb2a5a3c23db9a67e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de8d88154b2755fbbf588c73611e118f
SHA19e8345493db9e7062edb94128d93270b1166d130
SHA256e915e6268f20ca96ed300dae608d46996229685f79738b1478d5ee8f16be30ff
SHA512df7d9f77576dd5d2ebbed7a68da68eedc0a63b52135b13f1e1b16c225981fa971c0034478089e6c959d53bb8023b847fa7b816b8fc1533f5d315a2a32d490c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c17b470c8263ac47129851a72b450eb
SHA15edea41819dc06f883f178de8cbfaeecaa0bdb0c
SHA25609c98faeea382713ef609faf29f6745ec4519ad6baeaca3aba2905a80d29964c
SHA512e7a11315fab7b2e1e7f18b725a7c654f93742d344a5e5932f357b0c5d8c593d5a5275d5801dcb31e84a52ffd9cd761d2512e4725a9a60ea6f4be66ddd7639388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49a0595d99d790d655709cf9305d18a
SHA159a968e318cd38ef199892454ebbbd0a8aa3cf10
SHA2561a7ea958d0e50ee85e5ac84d3f06f4a473e1fe523ef4c7a661b21a3e7831b58e
SHA51208d89d0a4db043d18cf47f070fa93a2557e0786074f3f754bc5400335daf858c3a697da6387163a4d5cfca94709fc9c445354731c4a421c36349dcc8bca755eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355bbab199af290a2b0114ba884fd474
SHA15d47992d800c78900598afa6b02e2b7a01ab17df
SHA256d69d68356bc30dcc9545e05c7ab5c5c64e7cfece1dabff2d414e220ac1cd4036
SHA512f690aca36509b06633952902a3c597744f2c0855284d0fabd21275b64397c6747d5b681c30ad0a0059f4c8ac3488925b562b9dcb043406944c253bbdbc46d1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5553707406266ab85b204208083aaa5aa
SHA1b97a72e531c1c3f11547e8593c711e84ea38ff2a
SHA25621425ee7be14d392322c82cd1ae3589c7d4fbc8380028866bda7cd7fbc911039
SHA51224a7ba18203f9ceafdc80cdd3021b35a2ddb9a5db2dfd9abafc654bd170863a4d88ee0ab489342211ce1325241ddf6862ba0bf90f60bda0dddcd958566ff88b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54330f3c451735d4d0a92eca3fa00424e
SHA1bc88a9c0a4c8cdba2bb75a85b9ec4f932764ec8d
SHA256c966cfca5143d4649723ef6a921363110f988e5d5c60c8e7909d898639cefb8d
SHA51229492e343c1e06b7e9c8ab3a4710f542dbf3a0f69bf7bd075caf05a6623a7277dae7271293d165516537937a977fe0dfb0464a29569f2e54de991cb704fc11fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591e4e714cd42afba786a5ddd995397db
SHA17a6fba985892f76cfb7441246746dd54bd9299e9
SHA256a46c67dd18125ba629a66a5be15eb94415f0c57c939cb0a8570c3a5af361622d
SHA512c81fdc9b3b0263e2db04e1f911aaafdbe4c8bd53725431f042efbb30044a034e23ba563a7d00e3d66d84046636f9d01c4aa6d60a46c2f7ef1bd3353fd635c502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f712cc6aeebbffb63f202e12d15c3411
SHA1acebb9614ef941055f63bd55908ccb735924e0b2
SHA256ed1e9b3cace87edd1906bc909fe263498768899114901fed79e592b53f32b73a
SHA51221c00da015588d334b970d06cd0f2405f5d577371e0b9d31fb29ee1518c99ddf275f59c15bfc473d9bf3ce0ca7861891bd9617d0965aa269868723dffeb2b2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1db74504faea5af156f020b7d15c773
SHA16797b9a401002bd77f614e7b4916982f43aa93c4
SHA256696cf954bb15a081254746031ec1d5420549adb685c38276b836a114f1e53331
SHA512b4afb3cf85973b8fc8dde424fdb12b6d0cebfae1398f18fa87265e3230e447560e3c81ca98145111f80bd6e07ccf3977fafe982ae4f5ab5677630b3519812598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587aa22a0996422a9a583e0f676618dae
SHA1bbea8d347733e7ee3ffde6f33d5099c542861fb3
SHA256c12d01deefbe35ce44a7f2f35b98684f9dc6acf511b55d3941da1008f210f954
SHA512e748d980dbc6ab5f263425a8657c399b9a811a8be41ab9ab57f6e644fe829d240a0c84f422f5f8bbfa6631ca2c75db390363372191df16d47384ef3c33652712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f22ab090b061258726a86fa0e5298cf
SHA17d01f0d80b67ece911eabdb819bc54d131515b22
SHA256c4f092d7813374de367bcf0bb6190593c191f7fd8e2f6000bba807c73e17425a
SHA5124c73e1322282d9981392574e2d4ae51b42c82f86cb18d5f685dd307ae20e77d42ef1f3e7c3a381ae58d2a155ef6c1853cd1c08620f93dc47abdda6b11d732c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b02c728c111773f128f9ed89d3ba985
SHA157624c869f224764b7e45f8abb05c800251c3716
SHA2563bc555ac3935bd2ed023e89e04c05ccb8ab23a91494ecc742e4f0fb4c7739e81
SHA512b8eda455c94611cc5241867aa841f190a93081361d8ebf2e650b17a12ca798fb30b8ce73ab96bca2d050a4a68f0ea254f1abd51f759b3a7e7bea100dc5c45f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d06794d39ce24004eeda8b7eda08feed
SHA1d5732c376b9502a81e033d6cb663780d3246caf9
SHA256a20262ccf448bdcbc4a539cb15d3bd23422941e108ea79c316c87dde61da3966
SHA5125df7485d1561b2f28cbba6942f92941e85b5c8218d0b80623a97ef72654f2c7ad42df7e3c25d93b89cb9d5f46ff12ee593f2845b4359487ba9f62b512adde7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547ff63417beb7dbabaea79564cf984a3
SHA1f329c38ce98f9e39380d3fd956afd336c150609d
SHA256a9b9c0977da27eca06aa83d7e225c3463d7fbe28cfa540f9c34106fec1c21b7e
SHA51227b8f2dcc26230378aa11f44dced80d8094b7d38b497323c3e38e86f6b4df5538b1feeffa734eb1cabe5e8e66a7af73ea34e1853d70847f3c61647a25d216edf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b