Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
d7283aa2190760328e0c8328ce82138b_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d7283aa2190760328e0c8328ce82138b_JaffaCakes118.dll
-
Size
245KB
-
MD5
d7283aa2190760328e0c8328ce82138b
-
SHA1
a4d32514314b891ef6ce258c2ff8a4963e9ec8d7
-
SHA256
8094c95426b3b8a96d2c2a2814b4a275f18a2e19dba143ea7d4e7fc54ef78414
-
SHA512
062856b44b31d70c3120f59cc4391092ba229ec56f0295d203b23a9af4a1ba48b5d86548bc39c50d0705961b36766ca97e93b488ac0deb7f0505450c296681a1
-
SSDEEP
3072:TbE7bGoSW+JCG6KW2TkTF5uhCIV4gjFpFgA9FhyTcVE3ITIaGN37fyV2xzTS:TbE7bHSWkW2GF5u4YT9vyABxQdX
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432080821" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000d691e1d453dfb2b1c74e1cd6d568ef83743990b24b2e3eabd66a1bef17530803000000000e8000000002000020000000c99988008eeb625028e8e44211aab88dbb89c1a2970d8f6cef1c1a6a1c666aa9200000008e68d72021e07dc809e0c41a7011c2d34c6b6c2d256c91850b4ef3e8eb5ce0c74000000074f0e4676c2bef5619d9d972b59b7dfb416d719bcf2ef645fb9b4ec33468ae14ddf8a667e34fd03dc273200ce55f3b3e42a224c5d75b88d5c35918423a10b7ad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{485BF921-6EF6-11EF-869D-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0adbe370303db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2532 rundll32.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 2672 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 2532 rundll32.exe 2532 rundll32.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe 1528 notepad.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 2744 iexplore.exe 2744 iexplore.exe 2744 iexplore.exe 2744 iexplore.exe 2744 iexplore.exe 2744 iexplore.exe 2744 iexplore.exe 2744 iexplore.exe 2700 ctfmon.exe 2700 ctfmon.exe 2700 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 2532 wrote to memory of 2312 2532 rundll32.exe 31 PID 2532 wrote to memory of 2312 2532 rundll32.exe 31 PID 2532 wrote to memory of 2312 2532 rundll32.exe 31 PID 2532 wrote to memory of 2312 2532 rundll32.exe 31 PID 2532 wrote to memory of 1528 2532 rundll32.exe 32 PID 2532 wrote to memory of 1528 2532 rundll32.exe 32 PID 2532 wrote to memory of 1528 2532 rundll32.exe 32 PID 2532 wrote to memory of 1528 2532 rundll32.exe 32 PID 2780 wrote to memory of 2700 2780 explorer.exe 34 PID 2780 wrote to memory of 2700 2780 explorer.exe 34 PID 2780 wrote to memory of 2700 2780 explorer.exe 34 PID 2532 wrote to memory of 1528 2532 rundll32.exe 32 PID 2744 wrote to memory of 2892 2744 iexplore.exe 36 PID 2744 wrote to memory of 2892 2744 iexplore.exe 36 PID 2744 wrote to memory of 2892 2744 iexplore.exe 36 PID 2744 wrote to memory of 2892 2744 iexplore.exe 36 PID 2532 wrote to memory of 2672 2532 rundll32.exe 37 PID 2532 wrote to memory of 2672 2532 rundll32.exe 37 PID 2532 wrote to memory of 2672 2532 rundll32.exe 37 PID 2532 wrote to memory of 2672 2532 rundll32.exe 37 PID 2532 wrote to memory of 2672 2532 rundll32.exe 37 PID 2532 wrote to memory of 2744 2532 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7283aa2190760328e0c8328ce82138b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7283aa2190760328e0c8328ce82138b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2700
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567523b825ffad5382906da979c1a0548
SHA1571ce25c098d1086b2bac19a79c4595d472ccb82
SHA256a2ddbce6ef9e3b1b970c0cf1c3e00361d5d71987a61fb69f9e0d87353827cf04
SHA5122580f6ec29b9cfdf94c4a48366b87114bf23c3d71102401b79486b47c13055133a44b1a765d2274a26e0d36c13fc0609d985299aeb3fd818cd5de0ee42f99e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89d2934a48f9249a11067ffadacc4a6
SHA1e84c99cdd79cb9e216acd14317e633c5b6833049
SHA25616e8fe1c31c4f6c76dd191b2221b55a97ff42ddc2caf6789e76235cbfd7e014e
SHA512e2a5a74ea84bea039cf28b973af77cb297cf49f747d094abd448fc20960e8ac65d296c2a11d4844ce518c43f50d3a2a613fa9feafb1e86c92b88f259694518b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5416a49eeddf27b2f99b878a09715c57f
SHA10b42dbd66a37487e69fe3a7f88991ef105778a91
SHA25631176937e038dd0d1aa197e92bc320b76ffde8931e0ba7c57a67271a0ab3bc72
SHA5129d73cb6b6521481302fde5a89f45002eb7a0895405fb21d55bf35ea14e1d226897162bf25a04ce9057a3351302e06d9b0d82617e1b466f7b0941154a04d80763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed819c87e086d1515634d07bef1f61b5
SHA1d95779144ad65eb2e41b028bd7350244b33fde1d
SHA25689f5dd5c711b4cdf7e5ccb2c8aa6d15ac2f85586f2fa2d75a3be8b94b9d254e6
SHA51265a04d4f41841bd609af714868f6b7a5a43163a0b221d66a3c08e735f821af20b23ee3f7333973a5c6bfe884ba9dbe11f222390d2c7a066fee4a1c0d5c26132e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eff1aa780d4583f1034896a5b603265
SHA19398778f539fc51005adf27f670b4f27e3829c49
SHA2569e9abfe7b0d23b59723c77cd4433bc60496fad30ec629b89cf4048bdea06d6bb
SHA5125267f66acea8a24d485dfbc42b3d80531ab6a927fa4ae30192177e32d90c5df889e5cb30a5fe0e378198c64fe32449e7d75de86d50700378b70d296cac3db0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521cb7f6b948af15b4edf0a4d89837be9
SHA17703033e3d6ea0ad6d26e9d51723982e450491d8
SHA2567893cf55bf6184710811e2976c0e9754e2fec2752ce76218d4d9521fbc67674e
SHA5124eb4d1de53a682c9b1f983df04a37986dcfef34a6a164bbd349c1b5cd06b42e0ecbccec803e847aca9c9a6c153aa812f14e54b88f220a395b382233c378db497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9c4bc5ef89b68413baac1cfc9a7dd0
SHA1b2f3ec7795470416e51918ee360a41f3b5617028
SHA256389e48a3ce9a067b74a14efa354b8531eff96674a822ec12fc37166d43172960
SHA512aff380fe1f57f288573ca2aef3d619a0b69361579b223e8f8cff0d88b610489de79ac7a6051be2ea3319408003b735ac6928753a47216ab5d4920ff291f8e85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55546348314aa18f3bced3024fddd8633
SHA1191f66878403826582fa0bdbdc0efccfbf8fbdcf
SHA2565f1c0ef182420a2f22d9f3a806e3e612556699aae121a0172c03bc420e8414fc
SHA5129092b430ce7e8f323f6fe4488f58f79b60522fbc657caea00a61819a458ecfbe1648984528f39892c69b44dfb53d0aedde3145607c0335c165a907c9fb3315dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c894dd4ae5aa36e455fd146a430c0ce
SHA1ad0bc40fdb64e4369f4e6528349f90604f1fce5f
SHA25610614a39174628ef78e65f6da6cb71342729e0d1d85e09086f1e7f1521bf8a16
SHA512902710e86a6711b4024a65c4c5aef5529bef6ed458bac4ea1cf93224783ba163e653a00fb23c04d3bb099b2c840fdbbcbbbdb52012058f4f4a7cc2962fc5af4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d2ef7206b2aa43fec546239f7f32397
SHA1d7453788ea370aa4ffcaa9c1cdfa476543faa134
SHA256339ec7ff25bd73553ef34cdff673f58ad2e9f8d263fd3375a03a36ae0ea171e8
SHA512451dc868d1ccd384429d11a9041bc934267d51cf739852708f475b14eb2b9d6904771f06e59e1ea39e33efb236b9030cfe3c98c48258b2082df1565b6449e12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a3f5c2d8b89dde5cdb3266f32f29fa1
SHA1b6bce3c0f022ad395cf8e6f9c694af79e6c55478
SHA2566a54054b65fa97dfc81de93f1810a2bb1bb7596401d22bf0f35a1bbecc47426a
SHA512f708569607875bdc7ebd6a880b4a3da620b1e190b4c4e6244a8fb7a538f66de38c5d410dc8849550e06c3c384a45d13539d5610686c8cbdeaa6549a177a9d166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c3a81ae731b26fa87e866d577cf64d
SHA19bef4f3aa06c92a6337f8b0fd1cbde130fbea2f2
SHA2569cb61297ddf1d71d5264939afb520e04b7b4d8e6aeea8c172df8e59e9b23a3ec
SHA5120126f21cc6367cfec77575f87d7e64eae3b9535745ac374c461f616274da303d565e7d857c7277155883abc8f833593663992efdb7861a8538863e8ddfb694e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c5aebf0f09fbf4aed2eda07ccd83ff
SHA1d1d5eaa0a5f19efe7a937901bbcabc67c2f60384
SHA256d29e830ecbf8bc0946c7d0f88f32093dfd74d3397df3b6978c808f8bf263c106
SHA512c4551e04e7fc0ac24df36335c328d8c46a6454fa994f7d1a7015e24bca19be85f6c4ddf299fb3bf475d2947ac5544c6dcc9dd7c25627b32638ffeab98d5fd168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a6e53a78ffa1f0154545d1227f8d301
SHA1a8a7e7bbb94e02bd61c035607d7524b71e628a85
SHA2560e9c6985bdee5b380cf6dd89a40c4aef35435085563edbb5408ac10047639419
SHA512dbfa499b68a772e644b60be36f372d33182f6bf9d81c84384216089b4b6d9cb876208987a9a412fb9137f18a5b4d7f8c6800a9a345dedaa866f429cf9b6c06b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57191c01b4ab0392add4e472dd21cb958
SHA1b1715fc40a5874a689a2c588dad7061be813df76
SHA25642adeaa597985f413de6bcf1091c662e44d9de60f65472d1844fc9ce2630e193
SHA512d444e69ab5578ecd36bcc4ed08700f77dc900e216229f30ccb06a14d48fdfa3251f474ca8c0f6dc4f0e08434ae5a0a7d689f86b2c35b21ccc771520fa0db9daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eca7d57c5b5e380746f5ef1f9ce3cae3
SHA18d714d6f88bb0ed7ab82c3c253bbeb0d319f89b4
SHA25605141743d33d54b13296a6c5ab49dad87514ffc7db71f8ce0a0c2ba8a7342ac1
SHA51279e9f2ffa99eee2af75d5a7e6b23186552f38ece6c53a1c013cdb0526318c330775dda8d8f0279af0c7fb751f4509d92a9f0bd5841db5c9a3b37e77cc7a03890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f5532ed269c64f5be471d578daf917
SHA184096dcb494cefb11c1609a5db0ed5e6c8d1007f
SHA25665650af6a90ad958ea681d5a21565019afd5495612c75e0ab00a12b33022d17d
SHA512853233d8e4252c18fb65bdc192de26a3f5280e551dbfdf9cbc2d6168786975eb2e921561a0f8375c6e31aa0b51b69dcb529042c4ad3dbde1c9fc3e773f0d7a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f397114581118d893b57a8a4ce1f1bb4
SHA136888fd55d326046f7f78ac7ac277969f948ecc6
SHA256b2e8b976b63a3a8c426e47a91fe8e70945dd15675a5739e33dcd9e51872cf05c
SHA512a83aac9f0273675d656ab7c461592c10662be4b1806afee02e8ea8fee28a969bd5800286832bc7d74e53a6e8a148854311ba61269415a1572a9fb0228a8af27f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b