Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe
-
Size
264KB
-
MD5
cea91942b015b2f94856e18870a22dfc
-
SHA1
d8f326ca51837e522feb62e18e665308824979cd
-
SHA256
c0178f7878f0dfb9c0a9a3db0867e69684b59d4e5203918f42e2b77192e4beca
-
SHA512
ac1ae882a052dd49287cfd8c8eb176b90051d6d1254b6f84ecb695cab08067d7f2dad6cc6a8b80cc7a9c8a46c65272a3836b4bee2684c483af6d3b587296dfed
-
SSDEEP
3072:DSFUZ+sa7PgW0CLVI/lRR1zypUfTjBJ1698x8qFgmqH1fEO7G0eDjtoMRo1TWAeA:tWFVI/lRR1WpkGjpEGeXtldA
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List moviamaker.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\moviamaker.exe" moviamaker.exe -
Executes dropped EXE 5 IoCs
pid Process 2400 cea91942b015b2f94856e18870a22dfc_JaffaCakes118Srv.exe 2120 DesktopLayer.exe 2176 moviamaker.exe 2644 moviamaker.exe 2520 moviamakerSrv.exe -
Loads dropped DLL 6 IoCs
pid Process 3064 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 2400 cea91942b015b2f94856e18870a22dfc_JaffaCakes118Srv.exe 3064 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 3064 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 2176 moviamaker.exe 2644 moviamaker.exe -
resource yara_rule behavioral1/files/0x000a000000012283-22.dat upx behavioral1/memory/2400-28-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2400-30-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2120-39-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2120-40-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2120-42-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2520-84-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\moviamaker.exe" moviamaker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\moviamaker.exe" moviamaker.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2948 set thread context of 3064 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 28 PID 2176 set thread context of 2644 2176 moviamaker.exe 34 -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxABE9.tmp cea91942b015b2f94856e18870a22dfc_JaffaCakes118Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe cea91942b015b2f94856e18870a22dfc_JaffaCakes118Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe cea91942b015b2f94856e18870a22dfc_JaffaCakes118Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxADBD.tmp moviamakerSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe moviamakerSrv.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cea91942b015b2f94856e18870a22dfc_JaffaCakes118Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moviamakerSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moviamaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moviamaker.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431758950" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEDBF531-6C08-11EF-BB30-566676D6F1CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2120 DesktopLayer.exe 2120 DesktopLayer.exe 2120 DesktopLayer.exe 2120 DesktopLayer.exe 3064 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 2520 moviamakerSrv.exe 2520 moviamakerSrv.exe 2520 moviamakerSrv.exe 2520 moviamakerSrv.exe 2644 moviamaker.exe 2644 moviamaker.exe 2644 moviamaker.exe 2644 moviamaker.exe 2644 moviamaker.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 2080 iexplore.exe 2080 iexplore.exe 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2176 moviamaker.exe 2080 iexplore.exe 2080 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2948 wrote to memory of 3064 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 28 PID 2948 wrote to memory of 3064 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 28 PID 2948 wrote to memory of 3064 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 28 PID 2948 wrote to memory of 3064 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 28 PID 2948 wrote to memory of 3064 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 28 PID 2948 wrote to memory of 3064 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 28 PID 2948 wrote to memory of 3064 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 28 PID 2948 wrote to memory of 3064 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 28 PID 2948 wrote to memory of 3064 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 28 PID 2948 wrote to memory of 3064 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 28 PID 2948 wrote to memory of 3064 2948 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 28 PID 3064 wrote to memory of 2400 3064 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 29 PID 3064 wrote to memory of 2400 3064 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 29 PID 3064 wrote to memory of 2400 3064 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 29 PID 3064 wrote to memory of 2400 3064 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2120 2400 cea91942b015b2f94856e18870a22dfc_JaffaCakes118Srv.exe 30 PID 2400 wrote to memory of 2120 2400 cea91942b015b2f94856e18870a22dfc_JaffaCakes118Srv.exe 30 PID 2400 wrote to memory of 2120 2400 cea91942b015b2f94856e18870a22dfc_JaffaCakes118Srv.exe 30 PID 2400 wrote to memory of 2120 2400 cea91942b015b2f94856e18870a22dfc_JaffaCakes118Srv.exe 30 PID 2120 wrote to memory of 2080 2120 DesktopLayer.exe 31 PID 2120 wrote to memory of 2080 2120 DesktopLayer.exe 31 PID 2120 wrote to memory of 2080 2120 DesktopLayer.exe 31 PID 2120 wrote to memory of 2080 2120 DesktopLayer.exe 31 PID 2080 wrote to memory of 2436 2080 iexplore.exe 32 PID 2080 wrote to memory of 2436 2080 iexplore.exe 32 PID 2080 wrote to memory of 2436 2080 iexplore.exe 32 PID 2080 wrote to memory of 2436 2080 iexplore.exe 32 PID 3064 wrote to memory of 2176 3064 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 33 PID 3064 wrote to memory of 2176 3064 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 33 PID 3064 wrote to memory of 2176 3064 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 33 PID 3064 wrote to memory of 2176 3064 cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe 33 PID 2176 wrote to memory of 2644 2176 moviamaker.exe 34 PID 2176 wrote to memory of 2644 2176 moviamaker.exe 34 PID 2176 wrote to memory of 2644 2176 moviamaker.exe 34 PID 2176 wrote to memory of 2644 2176 moviamaker.exe 34 PID 2176 wrote to memory of 2644 2176 moviamaker.exe 34 PID 2176 wrote to memory of 2644 2176 moviamaker.exe 34 PID 2176 wrote to memory of 2644 2176 moviamaker.exe 34 PID 2176 wrote to memory of 2644 2176 moviamaker.exe 34 PID 2176 wrote to memory of 2644 2176 moviamaker.exe 34 PID 2176 wrote to memory of 2644 2176 moviamaker.exe 34 PID 2176 wrote to memory of 2644 2176 moviamaker.exe 34 PID 2644 wrote to memory of 2520 2644 moviamaker.exe 35 PID 2644 wrote to memory of 2520 2644 moviamaker.exe 35 PID 2644 wrote to memory of 2520 2644 moviamaker.exe 35 PID 2644 wrote to memory of 2520 2644 moviamaker.exe 35 PID 2520 wrote to memory of 2652 2520 moviamakerSrv.exe 36 PID 2520 wrote to memory of 2652 2520 moviamakerSrv.exe 36 PID 2520 wrote to memory of 2652 2520 moviamakerSrv.exe 36 PID 2520 wrote to memory of 2652 2520 moviamakerSrv.exe 36 PID 2080 wrote to memory of 2504 2080 iexplore.exe 37 PID 2080 wrote to memory of 2504 2080 iexplore.exe 37 PID 2080 wrote to memory of 2504 2080 iexplore.exe 37 PID 2080 wrote to memory of 2504 2080 iexplore.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\cea91942b015b2f94856e18870a22dfc_JaffaCakes118.exe
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\cea91942b015b2f94856e18870a22dfc_JaffaCakes118Srv.exeC:\Users\Admin\AppData\Local\Temp\cea91942b015b2f94856e18870a22dfc_JaffaCakes118Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:6632451 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\moviamaker.exe"C:\Users\Admin\AppData\Roaming\moviamaker.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\moviamaker.exe
- Modifies firewall policy service
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Roaming\moviamakerSrv.exeC:\Users\Admin\AppData\Roaming\moviamakerSrv.exe5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2652
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69b164df53cdd6a290641baf0bfeae0
SHA1e539a8df58b275a2f91071aec54f38d0d15743ab
SHA25697ae10a9955c99e20ebcf6a091c1d65c3bb1862f497bb3676fb387bf44255d48
SHA51278c463a8fbe597bcdc7e5b6ec35856908dfdc38f230aa745f72ae3613f2106ffa48f04d00bc8da70904891e9ae2459cb71b54a209dd7b3032e039ce6cebf9fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58435e62d8b7b55d828cb629dc91fac3c
SHA1cd5f88b92e2f4dda418d5661df9f09197c00ee6f
SHA2564c1f7ac36e685e47127a36b2b1899df67c383d5d24ddfeb0f7ecd76eb0cf8e37
SHA51208eaf085adf68f902656374b2c8190dddcfe729a64c13fe44b0699836cd649d52a671370f76ab023bfecdb9766124a79b830c10d6b36464be897dc86f5f40fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86da05306d6990bb711eb56ace6dc57
SHA1de7d9cfb3cd9f86473f0838208560021665dc723
SHA256ec19419b40fd40a3a5a1c2208a34a813cfaa4a8cdfb63130b93a6ea79fa7e2b3
SHA5122408998461253f0eae64d0b8a90b795ec13739fec9ac1efdb444284bd51924e4137115d42781c0eeef5f8c72ad60177284159f63050ba56c46020eaa26d160f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c3517286bd2d72318079089f7761d08
SHA1466b0e5a8d3a2325b8c10a4394705bf1167137a4
SHA25600f4b80e25cdff2b4b43f7d4105c99712256f3ac0a928ffa86dc7824865eed1d
SHA512e930f3c8484a7edef9465a871817387c195f91c160d938e57e5729a21763f7fd4cd2d03685f973fea7615fd93c91cf3949b75922026832e47ece9b7cc29b8929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c8986c1460af3093e32310bf363dcc
SHA1dcf03b80fcfd9b47dce55c04d6aea2be58f9daf5
SHA256dff14c547474d93cad949859664bbaffec0107e4e9c2170766380d6850334d6d
SHA512c2b917e9eefec1aa3d8a12edd675d21f9ca5cad769bf110d1acbc14492427084c7ebd40172b3a2b44adfc27e37d7925ea452024b330f135b5f218dc985d31409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d97dfcdd21d67af58245b0bbf33920b
SHA10a4e61f2c90adde8796a508dbe6354ead3c8fe18
SHA25603c886985cddaef73e9e9af07ce3a8d9b8cc581a070426ff34be366966cc8797
SHA51216ee435765858487c4d8ca9cc35d6ae1a32e263e956b565c399f277f4892d675a2dcb9ad5d6dbaa09bb25c73967a20b79cc30db03d216adc71e931aae73a2b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ebe2fb36d613c2a24cbe53bb4c81db
SHA1c46abe83af80b9917567df8fbd688316b2e19dd4
SHA2563a93d03173ce3be1e2e86364b4d5ac245c9cd310612246be576805ae4fa0c018
SHA51219a765fdb1b45b7b0f40ae3a3a28bfa170acf5b4c9c47e36b6471b90c8dc07ec6a2514651dacfa3655c010f8dbb43e51047b2689b47354fb194d88f21f86efa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba32e49507cd4d8f72078a7b5861a8d8
SHA108af40141ad30e66caed382845113219166755b6
SHA256fb4104fe05b88adb29cdd79924863c06016ca7d0c84fb7f18bcb974739851250
SHA512729c3e525eb99ac0e38bd6aed05eed2958a5647a3aac034302a3caaf4cfe79fc059201cc2cdf28fcbd73939b30567d3d83e7d5c2352a64501d78203d5a32e50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560dde40d7670be7f986b7dcbc989e3fa
SHA11ca744cd4e255be674f88e0600155af5cea89400
SHA256cf00977c97e76c9a814b6cd6164d482593a8800116244f9bdfc85d797f3892db
SHA51202893dbf10afdc714e73ba5e0eb592111ea97efae0a31ee2692c8d624a22758f576456c463fc1db259798325da208311c440b1748c4d0f186f57d60cc8c7682d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d8f29e5cbebe743f72c9e46ca76c68
SHA1d69c5fd67c6c128ca3c135c9acbf8a589098e635
SHA2560d6e2663f41717a9c2cdd280d3f04b3b0c0518292a8177e2616d6d958231fa7e
SHA51245bad4d92011a0651acdcd424a5ed477c700fcfcafb2257d8361e1de71dba6e75e6892cf789135cacbd193250b14e18e3b08ae67d202882120de18470863d538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a55df720457fe085639c21cbc39631d
SHA106d22be3bcb13535b02a408167ae064b6a67d6a3
SHA25679fdd133230d5370edeba745fdc850192d689c14d8e4edcb943b576ab8aa07ef
SHA5122eb305687eeb65f6011277c6de4c8992a9a01c949bb13abe9e4f7eadb796d280e77582a3edf5dba0d718aa0e96f43539aa991e90fca6d3c555f319f223db3b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e59b6389b83e199bf0be5f1f719c80a
SHA10c3705c64435b9633dda02e53d16b5de35eddef4
SHA2568a0a0b87023fd9ac12eaa781fe7a51547fb5f7b65086e741e87e145829a48327
SHA512d2a8272b8d69ea9344eca26acc35b72fdf33063eba590df68645c7b4782f968b0d12b7548fd5bedbc2b9fc1504aa4b57ddbe9542109f5172f4ef69cac53e6c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a06578cef372d5fe48e66b7fc2ea9bc1
SHA157a90fa1317aa0f801a553139228c55b7e5ee8b8
SHA2566c4d0c26b0cb70ce6f64a1f85833fc0405f37d0917a2ee14cd2fa2bf19ce124b
SHA5128729b3e0a9eb44deaa5e108340897b4ef9c3f7778e6d7e924c94910f09e7b8830f6892a6bd6ccf2914817ebf18fa4baff4b84eb19a181e3fc8b1a49be07e1ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e3718905be521f671c60949c57f009
SHA13c5e0b84966fe37530f0a09dc64fe86d4daa7662
SHA2560bdf9237d97db10d9a8b46907eb291df151d7a115e3e969c353e7614dbdc2289
SHA512fc54d13ad03ec8a9cf21c4ea7f585c7dc0a9025e26a88593b2a7a1e1f52fbe8cad30c65fee954b778507357f7c7cb49b3e0289d877f39f3dc3d3a38edcb8e9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58729cbeea8a439e77fad42b27d790273
SHA1f5a93fd31fbe73a54fd16ca2459152b890e48818
SHA256b043fcd6b890ff947df5ab32f295906d84851bc34bc9c911d740610df6122186
SHA5123947f73291241d1fd6812a7a462a9f46e4c68ce49d791703f72b1860fe015625fe3a692630ab76ad0390538f28b0d3a0d7c0a711bdf56b88e42ff7763662f6bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a47eb5d296da7b5335a5dbe175c4852d
SHA19bbd9b9e9fc3d31c9ff5500e3f8a04ca05d38e5f
SHA256dd2463a26365f38234b95450de50d1ea44cac99508d8e46dba3770c5ce71fb81
SHA512d9ed8e831de307b29a0adebae497d8243d76462571eb236217e9a11c5136fdbff78ede3015768feb5eb49464983be77bca84a7323a5dd20faf6d6a2ad981c45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c6010908d42e83094d393ba35d2a0f
SHA1ca56facd81359ed31b4cc563c6bae067046db43a
SHA25629734637ee6136f276a9b6766c535f40fcfefe8db763cde7f914d80f1dbc82f8
SHA512997adfe50fdb31c49db7d7ff70b2502539a6340ca8c1b1c7492949c3351f004db5991d113bf1ac618610bfada7790f55a675ac51d119295df2634b26294d7b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5935c236180623efc9a67ef31a054475d
SHA1d0fb343e511e716e8f0a48a30a5ed4108432fab2
SHA25686d6e53b445dae182e132c7e148791a0e02abdc71726cd3dfe27be9b16041c45
SHA5127619b072a6252e301300a5b7098548adb661e924c8f58192408c22b24c48256d6a3616a022db614b75ef1d4cd1c3d4bbab71bd8a66cf1e9d3e195f837527b1e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57df6a6b8d514c42921bd2882a4913dae
SHA10ca4b8ea7d7364367a27fdcb74cfacb21f58a769
SHA256fe08a0fc9eb3507ae6f2bace3a976a1269c2d7a42cd0bc9bc43f6303e9bf25cb
SHA5129573bb4b23c012507241b4714df78dc145ffa88156b75de61b97c5e35228559c46bfd633d5029d3ee410ff1c6f0f8cb4c88f6c4c5cf74ad919cdbb363472cd7c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
264KB
MD5cea91942b015b2f94856e18870a22dfc
SHA1d8f326ca51837e522feb62e18e665308824979cd
SHA256c0178f7878f0dfb9c0a9a3db0867e69684b59d4e5203918f42e2b77192e4beca
SHA512ac1ae882a052dd49287cfd8c8eb176b90051d6d1254b6f84ecb695cab08067d7f2dad6cc6a8b80cc7a9c8a46c65272a3836b4bee2684c483af6d3b587296dfed