Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
175a1288a66477b0a5dad98108d54fb6_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
175a1288a66477b0a5dad98108d54fb6_JaffaCakes118.dll
-
Size
200KB
-
MD5
175a1288a66477b0a5dad98108d54fb6
-
SHA1
24e192a1892fb7662c30507651212c8705491226
-
SHA256
2db9b037c4fa6e502315dd99ad38265336835121e4b6948a0799c4da40d80bb4
-
SHA512
587149567e6c34c25c83eb740cb88945aa3bd199a1bb87194ee59163d4814a7e3763efcd9e164c93f64aabd3ad4040d4444305d678eaf4216f8cffb0452bb0b1
-
SSDEEP
3072:19XST5kKN/S3BJXKgRpRDPSQEGBNt/9AIXNMujCTWMAIWXuINA/xl/I3U:Di9V1QkaLHtquGBW+yYxNR
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{568778C1-8306-11EF-8F2E-E67A421F41DB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60042d441317db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434286738" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000011bc2a9e2d3897ed90af866476b8f59b818c04895ac59a1a56b56907d7c79469000000000e80000000020000200000006343cb4bac11a046287bec29e2e15ba2c4f6f4090436a69f72d9e1a682d11063200000001c1f4fd4f9679c7017ac4d8b5c20e064c528d2155ec25e3cd14b2ce32a92102b4000000011efddeb38c5e7325f48c5100641df07cd70d62a0f4ac6afad816dcc0fee7a29dcea700406e9f808d78d924f255f0013bcbc5bb3b40a167d7b8686df50ee781e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2676 rundll32.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 748 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2676 rundll32.exe 2676 rundll32.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe 2796 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2248 iexplore.exe 2248 iexplore.exe 2248 iexplore.exe 2248 iexplore.exe 2248 iexplore.exe 2248 iexplore.exe 2248 iexplore.exe 2248 iexplore.exe 2832 ctfmon.exe 2832 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 828 IEXPLORE.EXE 828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2676 2656 rundll32.exe 30 PID 2656 wrote to memory of 2676 2656 rundll32.exe 30 PID 2656 wrote to memory of 2676 2656 rundll32.exe 30 PID 2656 wrote to memory of 2676 2656 rundll32.exe 30 PID 2656 wrote to memory of 2676 2656 rundll32.exe 30 PID 2656 wrote to memory of 2676 2656 rundll32.exe 30 PID 2656 wrote to memory of 2676 2656 rundll32.exe 30 PID 2676 wrote to memory of 2672 2676 rundll32.exe 31 PID 2676 wrote to memory of 2672 2676 rundll32.exe 31 PID 2676 wrote to memory of 2672 2676 rundll32.exe 31 PID 2676 wrote to memory of 2672 2676 rundll32.exe 31 PID 2676 wrote to memory of 2796 2676 rundll32.exe 32 PID 2676 wrote to memory of 2796 2676 rundll32.exe 32 PID 2676 wrote to memory of 2796 2676 rundll32.exe 32 PID 2676 wrote to memory of 2796 2676 rundll32.exe 32 PID 2276 wrote to memory of 2832 2276 explorer.exe 34 PID 2276 wrote to memory of 2832 2276 explorer.exe 34 PID 2276 wrote to memory of 2832 2276 explorer.exe 34 PID 2676 wrote to memory of 2796 2676 rundll32.exe 32 PID 2248 wrote to memory of 828 2248 iexplore.exe 36 PID 2248 wrote to memory of 828 2248 iexplore.exe 36 PID 2248 wrote to memory of 828 2248 iexplore.exe 36 PID 2248 wrote to memory of 828 2248 iexplore.exe 36 PID 2676 wrote to memory of 748 2676 rundll32.exe 37 PID 2676 wrote to memory of 748 2676 rundll32.exe 37 PID 2676 wrote to memory of 748 2676 rundll32.exe 37 PID 2676 wrote to memory of 748 2676 rundll32.exe 37 PID 2676 wrote to memory of 748 2676 rundll32.exe 37 PID 2676 wrote to memory of 2248 2676 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\175a1288a66477b0a5dad98108d54fb6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\175a1288a66477b0a5dad98108d54fb6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2832
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cddb551cdcf70d034a6fae90c08a2c8
SHA1242ef992fbd9f10342fd37acd278bef193fae6f1
SHA256c76cb0943d01f0476a3ceafe4d37c91306fac757638a916b36760160e79309a0
SHA512e0dc118932e31a761eae5a1f76dd3e1980e527467d43995114ad51f91ffef2f3d84e5b6c75294d054cf47d20e101fb1e56aa0f4b14c80887cce41f5d98ca3dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5444418344366e2a465b3c705562abd8e
SHA15e2f76de8398aab9a0295a0e208c8710dca12109
SHA256f63b768166801c172ecbc62a315583d6d6374e888dd0d09e5fda8f7f799ca360
SHA5129d83bb14bd39f3ae3b403c9eb3f3029d22ef784d4bb4048390e3a8dcbdcf54d6fbc85437f0c2bea38a0f64a0416cdcc9b4f1689e7eac554f7075e2d9f3b869af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd84ad28eabc389abd77ff6a047d1797
SHA101651f621e0afbc93e5e78e6a57f699bf0605c54
SHA2565f7ba7a3aefdee6da19df74293686e938f7adfe6083bc2f8997b9a703ec11ca8
SHA5128365bac7c1718870eabcd2254d05b2355acb55ee2fbf3a5e44d8dd333400456d8fa57c3169e08b82ad4af3bf1d954c2bb9d37250f895f0491412c0f8e1eaf949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa175e06e7ba95bcd4445925e50d177
SHA1adf1f8fdd19ed935ecdbfb70c942f0e1b0e036d4
SHA2564104bd591d7f64314e572e9d47f6f0b67febdf8e7350334484c4a9ccd07c98d9
SHA51287078c0cbe5150a0e3860dfcbdcb350fd58c314d2e605045b062d849211ec22867ff91731f48dead542f3b65e1d51b2ff7c4ee9b7edf4a96be53c27c04781dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c9c093589a4c6be1b274a6d88bcad6
SHA1212af3477bdd97af62a2f672f48e5a591e5b4988
SHA256822ce0858b54a45b7d8c22b9aa0319370041e9959a13565a826255a952fffecb
SHA512156343d71432d12c609b0e0ad9673b4608a1af3172c1abb930523116c1f1eb0f3132accb64b0352ea3ba20cb614a1d4ebff34b239b53210b7ae7f9ee677d1a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76909c50c34d1cf34e48671ee5e9c34
SHA11a0456bc387cc73eed0ba117c398d2a119e9718b
SHA256380b4dca082e4c5d2b3989caa1e1ea22acf9b5385ca87f8cf6710890d64b9a02
SHA5127240a47d197f4546dbfb9d788304d4df018a1f1c50e2d2ce9e7efb99efb4ec584883183e1c933369766f6f575060065f27bf5890e03ebc4d23bd5d9f26ca8e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876ad3ede4b7fc4e6161a738ca3d826a
SHA19ee0562da4bf5ee780ef0aac0949ef3b543ea4f4
SHA256ea190287b8c4f9ad17300d15dae138f4c57ae8bddbd64f4a806de97cc2749f07
SHA512d9e1de0e88a739b4454ce46d66a20938131e59bedf8a97f1131d06f1d98c8335943c8128f91728754990c051db878096bf13c81971acafe5c5dc63ddeef19431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f8093577b43875651bf03b95836201
SHA149a5dd0bc7e961d56bd7f3b37648798f83f17c5c
SHA2561f200d7a32875a7c8fd284ae97504c64885d208c893999fa29e7d8516f6cce35
SHA51246a9c6ca21daf750060ab1c1d189eb3283bf61cc0b116c6235de4663083569490b1b8eccd8c2d407acea3efec7940529e41d660f5ba4ca13136b439a0c20fa0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5987dbc43c6c461698219d3bb15c9c0ca
SHA14a755dcc0062099cb5b561f41ad91ebbff11316e
SHA256b6c95e5022f7d47a2e16ae9777eab1f0e1ac242a73ed4b529d153ee2ed317b7a
SHA512fec8491c633d50532607f4bd5bed136174f2dd15d3114fa0db614c65dc94920c2c7fd0babd8181b031a6122e8a5c016b5e26c3842641d6086a3d9ddd2da17522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa870183eb640b3ef58b766ad647a0e6
SHA1b14881efcd2061456ef71c827db117244d3eeda7
SHA2567b2a78e0b7eab5b5af439be799b16aa41264b96abafd00188096127fb6acb85e
SHA512979a5153b210e3b3fddeabdcaf86d7fc0b9e77f587c1e2c7a03ae00a469f8f888373c0e4a50ec938d095cd3a11181883dedd65d202dc02c7a3f37097fc4b1be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f188d323221ed5172e833293e379a17
SHA12fabf6cea62a6d2a079028107d6edeaac8ac0a92
SHA25654dd7bab2e84a4886bb5dae89e35d3434131c2d51764ac7dffd08626deb39d0c
SHA51286fcc6892d0420b9e4eca4db3c19f6b6cb3efd4a22dfe38e8eef977283c560dbfd3b3b9906788204c5b494fc21bec6dbc16792bde1e9e12e54cd2991bbd69da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c6d972b9c699229e97e45590c6aa86
SHA180e03f5d1a0a16836db3feceaddb8dd39e41be48
SHA256169a1eb31fefc761455f1b19281c55239ce9f79f1ff0fd88a0d8198a0dd32651
SHA512ec5e81073e245f54c2739b1de7b73c647bb86dcfc4e219f0bcb7c1ae9bf418e80a61450c1e6c78e11fc027b5df6647051fd72dc6657ec6ad498eca89e421cefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c6cad8c4ddff715848d1c317287a7d
SHA1c9621d2c7b62eea6c607dbe7eb9a17040e286204
SHA256dd579ef9017fe215cce8d8114fb5a185ba72ba7e260ea52098a35ebfbb826780
SHA5125dcf17512dede2271a724b1bd68ded8cca7d28477ad398f71dd9fbaf2ccb993dc8062da5874670f69d1174ecd8f6486e82ed1e41b57e0b3e827de105bfa547c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504915a314a69fcb9e91b55b0542ca8de
SHA1923b7c9542263c499e30280c4f227df61a902cc5
SHA256e3ff4c37bcce80580cb8da5f622386d2fd0b277e06f754e2701687eb4be7a0a6
SHA5122e05822a87e117d40a1dd600354c7b0fb17d97930d235f21ab065b145639382c6255f4d6f92720e1977410358f8f17044d46aec16db4ceb1339b632c1ec58759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a82124269ca8f6cb04b5707cfb1c55ad
SHA18032e87d7491148372964e5a7ee56e62ff2b73c9
SHA256323866b56be70105ea42bdcb670f71a58bbc7ea59a6dd4c88e3af73a171d6008
SHA51200f5ec6a08b67e4633c307bc1de39d3ffcec53fd57b8dd441837edd8da0c70307eda5bf8718dd88b7c82926253e33b72f970e129a2e4d3150ccfba5d2e1974ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6685bdfe4e817f190c7b56a4ae7d443
SHA125a535574b1357aee6db68a1ace3b7fa76000356
SHA2561577f2ab4fcceaac0d930113fd353897a1f66d893caac5ba5326a5d4fd0a70c1
SHA5128a256008a6c173ff676360a7649eeffea6bde83c749a967cdba5add67c22ea981f4ffb8a7a96e8c8d1dbe6e1842f902a01fd68eb7660def48ebf89b7cb2eeb42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c4d11c30454907ac96dd9adc66da55d
SHA1e92a4032d01919c580c26e6c3ef498ce411555cb
SHA25614d6220e26079fe50a9b9ded320a262cac9a6a82d90b396d2563679327d3d581
SHA5126c3074b1f1cd756cc52d6b929e6d2b602fdb4260a3ccc4d0bd2bc2f99d5bfaace3bb8bcbddda9aa149d2eddd1af51da43b15da7d5974fea65fe0bd94078ab5c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b66dc431a739281cf3d458a72e0c40bf
SHA19777157764ca08d895bdee6729c553ff6306e981
SHA25667da9c85c499d5403ae0f87cbce07038ff5991c808e0dced48003bef8136a6b1
SHA512b2f214be4dec4156c5717c51eb951a4a01f5bda5568e94d3e1e05eea18e2d3bd93112eadde8119b510b5f87ad8d35d0c333c4f27fc6978914a891733fe11486b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6bbff9031b618dc097f2ddd94391f1
SHA1d9243adc14de655c5e78f3c6ed6498b948453327
SHA256706c8403aca345bff4e827e1127c2498df07032743946d6fbe5278eb6a5b3ac8
SHA51275f42888ab83e213a7e5876dd20d33def6f2c09dbc4ceb8fb0d95b5ee5a47d113bcb0b19f4098ab11daf3fbe91de7a4acbb3cd0bec1e90ebc9231bada66f4be1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b