Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 21:03
Behavioral task
behavioral1
Sample
cd98c33b8c684c19e1571187a8ff3234_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
cd98c33b8c684c19e1571187a8ff3234_JaffaCakes118.dll
-
Size
188KB
-
MD5
cd98c33b8c684c19e1571187a8ff3234
-
SHA1
35714eaeb855124cfbf9607132db4d2bcbde3288
-
SHA256
43d7182f818869d94e4bd1e16bd157f1981aa9002bdc689ce2736b29354ec178
-
SHA512
4079f15f6b4c297d2b5ecb935570909eabcd3e6f08e613b55e8e645f2d5cd858b15edcea1fbbb1cac7db1cb82521abf7e7bf497d2fd130ec0e2b75ce0b66ce6c
-
SSDEEP
3072:CYQNHPn7TboFfVqQlXt4veso+nfXNyMDKieHeLvMr9y8ZoIyseKwXlc38/:C1lPn7XoOYyvxo+nfXNJD3U8D3KElcs
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/1344-0-0x0000000000170000-0x00000000001BB000-memory.dmp upx behavioral1/memory/1856-6-0x0000000000150000-0x000000000019B000-memory.dmp upx behavioral1/memory/2324-10-0x0000000000270000-0x00000000002BB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f051ee06212593600754642f790de71b6fc7c30a4ad73f34371e47aca492d182000000000e800000000200002000000087f490712147d9558761b50d40efc529483472b3bf096dc506b0a52c153e64db200000006ef526122bce36479d8e2e4ecd772075fc3d708ac32d8f26ef37bf81a511f01f40000000f1531fcb5d48242ab7e06167ba26c97498d1150b3e6b551a5c554f4fc4d882f9a6501556c7b87732c90e19157fd69e67e9641593d3921470c8b3cfbb1d348540 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5088d567e9fbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79E17EF1-67DC-11EF-8E5A-6EB28AAB65BF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431300078" iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1344 rundll32.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 2324 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1344 rundll32.exe 1344 rundll32.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe 1856 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2856 iexplore.exe 2856 iexplore.exe 2856 iexplore.exe 2856 iexplore.exe 2856 iexplore.exe 2856 iexplore.exe 2856 iexplore.exe 2856 iexplore.exe 2856 iexplore.exe 2856 iexplore.exe 2624 ctfmon.exe 2624 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2856 iexplore.exe 2856 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1344 wrote to memory of 996 1344 rundll32.exe 30 PID 1344 wrote to memory of 996 1344 rundll32.exe 30 PID 1344 wrote to memory of 996 1344 rundll32.exe 30 PID 1344 wrote to memory of 996 1344 rundll32.exe 30 PID 1344 wrote to memory of 1856 1344 rundll32.exe 31 PID 1344 wrote to memory of 1856 1344 rundll32.exe 31 PID 1344 wrote to memory of 1856 1344 rundll32.exe 31 PID 1344 wrote to memory of 1856 1344 rundll32.exe 31 PID 1760 wrote to memory of 2624 1760 explorer.exe 33 PID 1760 wrote to memory of 2624 1760 explorer.exe 33 PID 1760 wrote to memory of 2624 1760 explorer.exe 33 PID 1344 wrote to memory of 1856 1344 rundll32.exe 31 PID 2856 wrote to memory of 2496 2856 iexplore.exe 35 PID 2856 wrote to memory of 2496 2856 iexplore.exe 35 PID 2856 wrote to memory of 2496 2856 iexplore.exe 35 PID 2856 wrote to memory of 2496 2856 iexplore.exe 35 PID 1344 wrote to memory of 2324 1344 rundll32.exe 36 PID 1344 wrote to memory of 2324 1344 rundll32.exe 36 PID 1344 wrote to memory of 2324 1344 rundll32.exe 36 PID 1344 wrote to memory of 2324 1344 rundll32.exe 36 PID 1344 wrote to memory of 2324 1344 rundll32.exe 36 PID 1344 wrote to memory of 2856 1344 rundll32.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd98c33b8c684c19e1571187a8ff3234_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd98c33b8c684c19e1571187a8ff3234_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:996
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2624
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69ecdde14ba01ea0775755063482748
SHA187e7eb9af3d6bdb2d5b9729371547e0914716814
SHA256b9827fa778a7f1d4d74ebb04e131083c27f6add88ba03e97a959697f4df2d154
SHA5121f83275641ff10fc9c8fb78a06da6e0c271989bfd815b4111c28534a21c75c96f1e7f70b89e2883eab0d25572ee304f76d39e55831359668b809a35d60a300a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403c3ee49dd31e8643341e1f6d938b45
SHA1e07a7dcc7ac4f4939d98db90cbad90502b7ced43
SHA25615f805121c834c8213024675f9f96b66c372017ea1b3decd9cdb9ee33e6d74ce
SHA512e196b7238390afa4b23b88181fa538740d625a44dd6e86689d3b5892f91199818bbe39be5cc1d0fb8238a33980e5200a11a388f9c3244b9ceb7b1ed13128c2a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545583482883263969611523b7bc18020
SHA1a341cef8e68996f2805fe5963b50dd52d5f226cc
SHA256c56691e3b0899eb5453afbd1f41d0c0db526fa3391c2627fd6361ecfefba63f7
SHA512435214a566e2d4bd6f5048405312c32c2ec51e20e8871f6bcd6a057004270a496c2fcc837eb61744bd4537824b573a135e9263468aa324120a55409d1fabab03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f60b26196126e65b115eb0fee08203e
SHA14006db663fc2f521f3135711cc9b5c7288a83c8c
SHA256159a5270a62313ca40529e42c3a6183945b4ee562c27d06794cb67260fab3441
SHA5129dc1f3810ba177477fe990b4b94d63e4fb97a034294d24ed22c317ef86639e73bf00e75d13fb3e5d5338064d8005ade7e58b105f9c895f71bdec3b8856c5b138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c6942e7119d662b2c77e66ede2d2f9
SHA112f7e1b1192964a0e4b779f2451afaf094a6c94d
SHA2569fc8da1db5a194bbeb7351ae3281278866a8032fa131c488dc1585dd15ed5ef0
SHA512f3797d6ac24301b2a6ab438e6c0b4c9b5fea3d3db918a4a13764632917c2a74d84e7b3c651cf346a2de337297ca56e1bb4bc70b2a63d7dd3454d42ceb49e3642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c92797e00c46b68228ecdf9536f8286
SHA1eea5fceee382b5e2d63de0c394d2de4a55bcdf63
SHA256959739bc4d9020b404f7972f3f7f5ab07657eba2f3c95793aef28bcc2c04140c
SHA5127286c6568c177bef8767dd4362759ba77494c489930ffc425d155c147a92060bd7016059d98bd2092b7e8e0b73a11b58c586cefb4e3bb1f456d7536cbff33aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c274b5f8a4f886a3ee8b039f515abb63
SHA1fcfa22c1b2735155e8639be6cbd0173f52433945
SHA2564476669eb709d508e4a976edf0eac0695c15155b6baac2777bea9ec57bb8f8ac
SHA512f63b994be037fdfb47098dc2e2eabe0efd45d77e113c319182b3b613a707149c1debfcb9bf9bfd3b05655daf7da76dca62b4dceef5757a5c1ea3ec400b0702b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27c2127fcbba29ee169b1fef5e7974e
SHA1b7bccb811824ecc101f3e3e3ae4fc6253e5aa7aa
SHA256f4f6ed6b91c76fe2f547c6046186dce388b8b6c4a403284df7777ed021e4c2ef
SHA5127fdb4a3dacf83cc78840e9098b6dec5fbfb8cbfab132d92b3da9d5e77011a4948883b148c2330ca7f16615ee52b9923f6188c9f436b20331e70d5bc1105ccac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a210484bcb4190c32783212d67c6ef
SHA1c7598be8b35eab7d1a7c4ab9f30209464b2797bc
SHA256ac1809d89a1a19e9de3acd338ee786ebcfe968a22cbacb6f6a1503e107b1dea9
SHA5123b2908a39b5dfa76733b4b108dc74d85a87243ff96269ae7cb24f59d5a9cbb710401b1d5344d50cd808aed2c8fd68fcf0f0a44ef982bb2583e75a0a8043a09ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9ad617ac4fa97e197849b41ff272c9
SHA1e7f75f5f75eb26eaf8ecbb913cf04414aa26676f
SHA2565765063416fdb2bfdb9ebb6f9f8440ddb944735ef5175cd373126d8e464a2740
SHA512e33024fc5a0abbd2e2513987b686a1662d07b28018e7f33cd47cc9180375ca0f3d65ace3645267dcb384535e0636553a11978063e6bb4b1cf20a930f067c2e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048dbae7158356aed2b7ffc9f5dbd3a1
SHA13e90bf3d890769c1ddaa580dc6f1dee020fd91eb
SHA256fb7e36006beaa0953b88215f26c13c70743b241cbd1c918f7f73f3da217bf39a
SHA512ff019fa414f3861ce08e8b9543da44dc8d01ed8356f34a68e9751664d6a48759f55f5a997daf3111f3b135dda28d1d2cddc3789e0ce593f8e1524a4eec852464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc629fc02b2fcff4eecc3b4b453cbf72
SHA13bde0d9ca151370e7bfeed60a954a4a39ff4bc93
SHA25623e5684504038ac0d9dff5ffea730bb1cad39b1d2813c44b679a3b09cf4e001e
SHA51286c7b9fdadabc49b19c3b020f17b230d3e6bcb5f7c5e2baccdf711e56079f037383e428bcd7a870161ac3107c980931afc5249c86aa22df7af65344c22bf2378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2801d034cd2d3ecc55359d6638255b9
SHA1a42dcbb095308ddb08e076a99eea8c1bd7dcbe5d
SHA256cb94599a61b6551bf548cb1d9e95f59a9e179e01cfc4c765f8d684adbeec2e4c
SHA512d7c611b849ceffd5068162bd038f146c7e50365beb0800ddcd355fd614a29c5dfbaaec4e7d9937220b734205ea4f51cf721ca34ca82c327425fdbdf4146987a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509ee54dd4c761dfc71ad442560392157
SHA1e5073ef4cda204d4e418e9de1901e75dcbbcf0f5
SHA2564fe4e29c82414098d7204f00a49d4f654355b23484904c4e741a65de984dbd97
SHA512996be8ed2272f1889041dd5da6b4e95bf9216d0f7e24f0298ff20c6961f048c12be5d61c0caa12ae4bae8195aee6d17e011ef213ffb7828800fda521814c24d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fca99aed66e0e4e720770383152d1038
SHA17b19166da8bf9005e5c2d86cbba212cfd7a328f4
SHA2568b42dc386ccccf11b5f7fdc930055f8067de9f729ea50b59647eed700b382d8b
SHA512ef57f2a1eefeafc61426d6f9962193a77846602ab23aec1c10f939fc098b43a42f52255486dcec2f562d14cab68a67cae91b6f3d926c2426ef8913659280462c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54499257845c1e7f6e1a17e7fa91dff0e
SHA18d3882d280e2899e31cad6e3d24fa7d8d1cf7840
SHA25668ba94fed085eacf3476901a9995a3a111369b617de3ea7246c830060d785572
SHA51286fe4f8ab691acfa4852ac60648b01b55fbd63a0dc7fab59a939ceafe3cc8279af2de58974ce8613a6561db32b16b48b93ddf08bf8e489af1e829b584c597ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fc2872e3f522c2df1754011c149ff2
SHA1cf28301829af5ff45a2c1851c8494e62e52fd54d
SHA25612dce041756c8a8546f2d3e3023e056356988c3503daf8db6e65c79986b40bc6
SHA51270c898735b11eeb42696756f090456861e17eb7d7b2c2b2b0a90452c7aea2d8d040269f6c9e0cde16b7504cbc2d04180e4721ed919f89053bba0a5f02d78d562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5902d9fe113279c0a1d0e0941fa48584f
SHA18492d84d55b801e58ef7edcd353dec886ba48e9d
SHA2566098ead03d80e7cd7f362dc1fc6804950b6441b2e6f2c89a826037c5b4ed3148
SHA5123e626cd15747c6ad26a001701ba9a0bedf893be643df7ca063c7bbbd0b1f1f3c8b8e07e447895ba522cc3270455296414a29fd1bb7c6948936b543f2d89672c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bfe0a7196c247834d5179bb5b9f03ac
SHA1370f9c8aba534d42222d10f868197fa632373232
SHA256b7fe9e7eaf1a8e8a7856cf1ce82accb721a72f9daa2ef1274ebf4f15fa845487
SHA512568b7cb68c6435bfc101ae1d41631b22d7fb92801cd7521340ea33c3dfe406b3e5f88d36ffcb0daf537e50383657d3748acbff02f861028863311a11f6ac9ef4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b