Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe
-
Size
495KB
-
MD5
ffd5fab6be72ff756ae7a86d3188c57b
-
SHA1
96e70a5a58a6ae73dd3b2f70179b0d4ad7ab17d0
-
SHA256
42082cfba31a4c4a750f46a60dfb496690b542d452c04f792da4067c54fca572
-
SHA512
ead3fabc82e31b14cce05ee8ec29f9d977d8f5a0fdd2a5d2a6beee805a5dccfd3b22891ba43e1c580e860683686ab9719a1926b9a06f881045540d097efe8480
-
SSDEEP
12288:WpFhI9SVEnmrmVB6ZmBDL5qludR8B0fc/TJ9rXmVLfsNO:3QVEnmmoQDL5r38bzrXAfl
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1924 ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe 1924 ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe 1924 ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\FLV Direct Player\Skin\DirectFLV\SysMinButton.bmp ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe File created C:\Program Files (x86)\FLV Direct Player\Skin\DirectFLV\Window.bmp ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe File created C:\Program Files (x86)\FLV Direct Player\Skin\DirectFLV\SysCloseButton.bmp ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe File created C:\Program Files (x86)\FLV Direct Player\Skin\DirectFLV\SysMaxButton.bmp ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe File created C:\Program Files (x86)\FLV Direct Player\player.swf ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe File created C:\Program Files (x86)\FLV Direct Player\preload.swf ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe File created C:\Program Files (x86)\FLV Direct Player\downloading.swf ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe File created C:\Program Files (x86)\FLV Direct Player\Skin\DirectFLV\Button.bmp ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe File created C:\Program Files (x86)\FLV Direct Player\Skin\DirectFLV\Logo.bmp ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe File created C:\Program Files (x86)\FLV Direct Player\Skin\DirectFLV\skin.xml ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\FLV Direct Player\ ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe File created C:\Program Files (x86)\FLV Direct Player\FLVPlayer.exe ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe File created C:\Program Files (x86)\FLV Direct Player\uninstall.exe ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\adobe.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.adobe.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000a224f72d7fe21d565ec5da9728ac0de3feac1ff2981b11cfe74cae7cd9d7f803000000000e80000000020000200000005f4ee72c50821c6158cbeb5cc507e6f4be05df67ca5cc9385a93283e87511b9920000000f84784bbab136df0b6510c8a459da503348d39d66c26f99cee5ac3bb6c8709ef40000000d57654c12859d947e84e12518de837051b1b9669644b4c7ea76169f798d763f5c7fc80655b95eb7d97e35f115bf1de5249844f2aada9f7066b833eb546fb0447 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51AF9841-7ED9-11EF-A364-FA59FB4FA467} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.adobe.com\ = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.adobe.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ee4c28e612db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433827599" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\adobe.com\Total = "42" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\adobe.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "42" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\adobe.com\Total = "0" IEXPLORE.EXE -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.flv ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.flv\OpenWithList\FLVPlayer.exe ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mp4\OpenWithList\FLVPlayer.exe ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FLV Video\shell\open\command ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FLV Video ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FLV Video\shell ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FLV Video\shell\open ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.flv\ = "FLV Video" ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FLV Video\shell\open\command\ = "\"C:\\Program Files (x86)\\FLV Direct Player\\FLVPlayer.exe\" \"%1\"" ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.flv\OpenWithList ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.flv\OpenWithList\FLVPlayer.exe\ ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mp4 ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mp4\OpenWithList ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mp4\OpenWithList\FLVPlayer.exe\ ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1924 ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe 1924 ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2848 1924 ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe 32 PID 1924 wrote to memory of 2848 1924 ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe 32 PID 1924 wrote to memory of 2848 1924 ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe 32 PID 1924 wrote to memory of 2848 1924 ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe 32 PID 2848 wrote to memory of 2764 2848 iexplore.exe 33 PID 2848 wrote to memory of 2764 2848 iexplore.exe 33 PID 2848 wrote to memory of 2764 2848 iexplore.exe 33 PID 2848 wrote to memory of 2764 2848 iexplore.exe 33 PID 2848 wrote to memory of 2764 2848 iexplore.exe 33 PID 2848 wrote to memory of 2764 2848 iexplore.exe 33 PID 2848 wrote to memory of 2764 2848 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffd5fab6be72ff756ae7a86d3188c57b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.adobe.com/go/getflashplayer2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593fdd9c3b911e3a9221f1c599296d89f
SHA1b6c15571d4468b183b7b41c751aaa53da04d058f
SHA2566453d2e3bfe6a9d94069bd5bc28c33d0de089021588cad8c5f4100b1ff0fbc5c
SHA5123209100cd6bc98496f4a1032a86d8d1816d0ba0f6b0fb2287b7f67191fdd2ce94a83a5465049007294f78c7cd3616a029d517795138b3339754e2ab168cef11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c928494dd630bf30a74eefd8afa35796
SHA15b4d0a07ef8a511787a59f91d2db0d94d813c82a
SHA2564fbbbe47b2de295fe922e78228a2e20a555548c9c6be59ebe4a5eddb8599a42d
SHA51262ed33e4802508dc07b42d49436299bc9ff83e59869706c70da3523ab936a6b3df908b9289c996db7c24481f4eac25dd30a9281e2c2a3731f897a81aa16f5843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d19c74ea06f3354182ea6b0011b3889
SHA1bdf4539ec8db0d245744b4ee9935c056729b83d9
SHA2565ad9f884da069ec1b9dc36e54320dea95a7e53d434a9a18f4cbbefb4b3baee99
SHA5124382ee30c0cb9478fe3cf78cc94d7082a202e63ddef8c40e893ff6903aee257db07bd4b21ba0844a2982065d6a0f8f092974d85885c3de5dc2ca8a27172badf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283599d49565a2acc6e045c9ce620fbc
SHA1d6992f5d23c47c6f302cd149a33ebfcc884e487a
SHA256bdc9fa0b2621749ec839883e14fb95a257872a699b69226eb0cd70ab34e6c3bf
SHA512e12ec6a6505c19d805898123087c36edb93886049830db18543608473dd7520952a2cc9ad75aeb3d678043aa707ee2903121ac0c4a82833f7f9d83f161f0516a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889ada758ce757ba9eb2da88767e27ae
SHA161ac01413a72ee6ec2215e0b3241428fbe95b242
SHA2561f92e4cc8159fc39985d4f54f0e67bfdb7a611a636f341bc699d1616bda0c43b
SHA512f5bfebdb51faaabbd7855d757fe460ef50aafb067c20e6e93ee2b48516b074377ade25ab7baacb155e0be27884e164931320d581954e4bdda6a02604ef8f96f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e90d2f05cd919b95adc952e56ed7d76e
SHA13da3c3ece84d8d2df770d6400e4931b4228e0133
SHA256b3604457bef9dadabfb95b50054625f1333c4cb7ea566807bdf37d58a9116091
SHA512f44f68aae831b95830efdcd4e9dcad64f9bcc56e0dea3012f64c1349f864d3c13d78e38b68c281a8d19cb8dae30a2b67a4c014b8ed732989cf30de29b07a5268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd16b411036b5cc2bd95dc045146a825
SHA1699d00ef6fec9efb2fa2071afc27e50cc70167f2
SHA25660bd9bc2d36aa81b8c2d99b227ad5644340755e4d669d3d8d1b9f771a34d113c
SHA512f16152e642ed60696404b4759c9afb0a9f4ef292915e984451433eafde3e658c7c6c5071ddb4a18cf7398c5c387b6aca88de605f0cab5b476f88ee7d4a127bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa043895220a3eafbd7ee2064b275f8
SHA174d8b6730f8f2a0582fd483b386e8ba800a86a7b
SHA2560c724d1945f2fef039ff8a36d526ce285d01b08b3be6e04b6e34cf9aea551225
SHA512f2146af3a5a0ba22cd4e7d24d0828be539d961abea5faab5f7632532f1e8958bca99269375850ed5e681dc4dabaaa1db3c73a3903d443875f4e332cbf7a02245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f608b64ac8da70d3201be31b6ccbe47d
SHA1a1e6991740d831f98d7d00eaa32b707e5cac7308
SHA256e47ca35ae3f3047a7b31eee3ef859e86ab7de683373e2c5769084d7520fa7d45
SHA5122cdf36c82af6c23a2cfccb586ce17a62cf26f29dbc1c00fdc3c1275790e4a1a7106f2b883f78dfd61670e2f4d14f6ce5ace929bcc0ba88d1d6bb43a44b6c1bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db610bb94d8f1b8c0db8ea8d610e3615
SHA10fe1c7ffd5f1b3627acf2717ef3e4a2932d908d6
SHA25680995e24750fda774587839ff69473e01f5e943453de4e1fae5d2ba7151c6740
SHA51281ffa449f3bc5e077cb46dc095d2ce73fad480859847d3e259147e91f3d301f046bc5f817a71f20b2d4f800f28d6893f7a9dd9de5da07f0c0e707972b65e2a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e29ceeb47dfbac4c67fa79ee85663fc
SHA15d152ec1336b8aab8d7e9320740b5c5046e8fd71
SHA256028f9018ea1530dcd3a2aa7d40bd7acb33d28f3012fa4c71bc8362d2536e4614
SHA51225449e3e9353272b35addd582c98a38f1b2cd7c52823c64cde9e1414c72c34136bc686476a4825e31c9a0d1a16fb084b74ba58031a321e51e1939cccbabbcfc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54892fc9025bba7c2f77889b4e26cc974
SHA10792984a52bc71c99ed2b46e6f65e69bd73b295d
SHA2564a2ac80ac763f00f5cfa504b1ecef3d4791951b3913a42ddca8ce13b122bda59
SHA5120733cea3d68970bafe7b3eb375d273080aca70d468200a978e0dd934e2ca482b957962987dfd698a0849a525a10341657e968b53c7f4962921b740aef8592347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9495f82a7505649d3c54c5acb6f3e4
SHA1e07040dacc7b6bbade1d4a59a47a84512383f5c0
SHA256cf7dab4607ddb1c6cabe20161e8505439b26cc3a116b35de853ddb5cadd41778
SHA5128d92f12780ed791f9c02ebe440f541f1d0bbe57bc384766400aaae6e626e71e486b8012633a15e3eb77829574a2a1f3e76dbb883ea5e3e67b97febec84189830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f920dc77c9f65fbccded8065432d9046
SHA16b37e809ef70d4b29e2b9dabcaee38de90e0b255
SHA2565b1ab9df1af883bec29d0e9daadff94fab8df8ffeb4e5872eb2aaa20baf45f5f
SHA5123c36c9bac7c7735e9637f11e28987a54495ffd54dfcee3da9bfa71f2dd913230f9355c0bf1ff2b8db27179b6c9b6335ea3b84c7b1d27782e99c3b9709beb762b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a16982dc1e9e0d52877bc6ee1eadd22
SHA1c38e0d6d8bde0fb6abbe0ae9d5f2d63c399f9dba
SHA256c8b1d83f4e8169c1bdce7b7d7ccccc47ee085cc6692f3850c263a7ddc6394fa7
SHA512aebf384050029dc3246566f16f8757c711c5ba2c190de188abdff633704bd1e82ff60799624826b809edc5490aa7352a8ac030fa9a0c0a405a90759cfc76b282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578a7cf9fd35ab7b6104f81eb435347ac
SHA180420752fb0388da457a1a49d1152e17b2ed0564
SHA256052821bcf2622bdd1a092f021cd5617e49b101c3143876b2b3a8e3a57e32fa1d
SHA5125c19d714b93c78e5af4941d3c94695f2ea60723de04d8ae2bd4e007b38875d34d9f2158dd882d2732d3ff09fb797948f44924e26bf2aa9d331d95398fd98f864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f1cc4f88f2c22c252621e65721310b9
SHA1773eb621948cb5267b5d13872c58c276b6178e92
SHA256fc856003c7ea5642e640d98bc39e06facb8bc0a58ca303be05b696f5e1f7336a
SHA51241f1838ad8fc1791701551cba341d1b742f2b3f7d8bf124ec821ee097cf00ef7b2cfa8a1cc07f94f9d4d5f9e26d37c18eebefa9384459722373921e28b897043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb22a9ceea113239cc4936223cb29d5
SHA1969989347722a0f7ec69b95a14c08b1b454edf07
SHA256e7d589d6a038966cfb7f0a4a761319e1689ad1a64087a0f27fd82143a198c6a4
SHA512306b6c6275f016ae1fee210ac6932094f916858ae7becf85267a001df94e807546eed02da42ca981569b03664e64f9defb92ea2278d93d19a9f27a7910a13296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6bf441e8fa423e98e23141ebc9c5e8
SHA168697c56240d656e7a02faa57301175fbafc7ca3
SHA256086a171275a2f0f47e9f94d30f54bb9113c80517ab86edfc9013932ddc637139
SHA5128c59beb6404efa43ad17b859e8047d79e4b837821c48704faed31174a37ab3766b394bd0e97f1e4b8b3362d37b44b4ed5cedfcde483e0d413778d2b7afc61d75
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
834KB
MD501b2b85df382f697c972256f43a1a1cb
SHA1bb58e2f0f231c23b81aaa81b094af3186c1a332e
SHA2568ca31d9ead4400b6249ef6c3ebdf9fc84568c2e874fa191ccc1a371aabf1db6c
SHA51295aa0892e22e138a15f3757836a1d308350ac890b46aa937c17088024fac5715b727d13338d068cfa76fd284d0abe7c8b64446fe05810d83ce04a9405abc2b85
-
Filesize
35KB
MD52cfba79d485cf441c646dd40d82490fc
SHA183e51ac1115a50986ed456bd18729653018b9619
SHA25686b302fa9c85dfa0c1c03ba000864a928365dab571f3355347dba02da22949b7
SHA512cca186a7f9c5cff3f4eca410fbe8cc13dad2514a7e36aec9b1addfbcb239ace9b9b2d8427771858e3fd11783abce7e24d43c286f98da9f8b17562ca095a4c043