Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-10-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
1aec1d350e84138d0cc80be3b3787028_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
1aec1d350e84138d0cc80be3b3787028_JaffaCakes118.dll
-
Size
163KB
-
MD5
1aec1d350e84138d0cc80be3b3787028
-
SHA1
d72eb7f257aa71ad3d0e85a2738c24dce62def66
-
SHA256
34bc9735615d1f0aa7d698d22a656ed621717dc8c8882a3286854f40f7e50f97
-
SHA512
82898793dc9cd90dcab6e7a47875c6eaa87dd8cc2eceebfaa06ba5030e849928ab31c98ccb8ecbe99610d21d1d5513036f8f7796df92ce77cc29f102d2914b02
-
SSDEEP
3072:/vdCWhm6xlKCp1sUQsCO76vHkJqcmjDIevxzbe9eKzRA1+0EEGaXVON:Xc+ggIvJp8D3EGaX
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434429133" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804a5ece5e18db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E08DF5C1-8451-11EF-9917-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000f999006761b766f7bbaed73d19b9ed333706df277cb8b30975d70cf1671c8a9a000000000e80000000020000200000000bfd61d7fef67a415e8ee2a4dbfd06a0db71d0b7578a95a93880439f5f5546c6200000002d8408b27166db7582d7ccec5ef84cd73bc7c4f575c90da5e037c1956bfaae6d40000000f17475a09ad0ce1aa1c22b55f525415ce35116bd92fc6f1c8db10de44d817cc09594c907df5bee9ebf4caeb4c29a8facf1ca235549e247bac19c3f0694f79b34 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000055e88abfbe6802c4dd8ffff4cb75ae28e35dbd1ea6f9a1e82a2fe8016a6df9f8000000000e8000000002000020000000b7fff3501432cbf4023140c526d0e42d6e2ba044c9449f5bf77f35c28478275b900000002600ce3f11f65b748ca98c290128b38d2df485e40a8d263820ddfeae859ecf6445ced9b6ee7a1a3cca84b09e06e8413173211181216f857258e1015b4f2945906ae3ef4a5bc2c94fd67972be0e1986b9ff28a13c9fef3d1dd179d7c4c5e7e1035f5692fca793d9040cab9ab6e7eb955d4bd8ebdcf27c828d77cab3282448170675fdead8cced881f42a5f3619613ec6640000000bfeb8b6fdd15d2e2f0c5a70bca02919db3d9e54b7f9b5b47f45e726d9ec670e909ed6f8ba4e5bb41684421dcc11c5a535f7b938d62261cda35acd4a8610deda2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2680 rundll32.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 1216 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2680 rundll32.exe 2680 rundll32.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe 2808 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2824 iexplore.exe 2824 iexplore.exe 2824 iexplore.exe 2824 iexplore.exe 2824 iexplore.exe 2824 iexplore.exe 2824 iexplore.exe 2824 iexplore.exe 2828 ctfmon.exe 2828 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2680 2400 rundll32.exe 30 PID 2400 wrote to memory of 2680 2400 rundll32.exe 30 PID 2400 wrote to memory of 2680 2400 rundll32.exe 30 PID 2400 wrote to memory of 2680 2400 rundll32.exe 30 PID 2400 wrote to memory of 2680 2400 rundll32.exe 30 PID 2400 wrote to memory of 2680 2400 rundll32.exe 30 PID 2400 wrote to memory of 2680 2400 rundll32.exe 30 PID 2680 wrote to memory of 2796 2680 rundll32.exe 31 PID 2680 wrote to memory of 2796 2680 rundll32.exe 31 PID 2680 wrote to memory of 2796 2680 rundll32.exe 31 PID 2680 wrote to memory of 2796 2680 rundll32.exe 31 PID 2680 wrote to memory of 2808 2680 rundll32.exe 32 PID 2680 wrote to memory of 2808 2680 rundll32.exe 32 PID 2680 wrote to memory of 2808 2680 rundll32.exe 32 PID 2680 wrote to memory of 2808 2680 rundll32.exe 32 PID 2580 wrote to memory of 2828 2580 explorer.exe 34 PID 2580 wrote to memory of 2828 2580 explorer.exe 34 PID 2580 wrote to memory of 2828 2580 explorer.exe 34 PID 2680 wrote to memory of 2808 2680 rundll32.exe 32 PID 2824 wrote to memory of 3004 2824 iexplore.exe 36 PID 2824 wrote to memory of 3004 2824 iexplore.exe 36 PID 2824 wrote to memory of 3004 2824 iexplore.exe 36 PID 2824 wrote to memory of 3004 2824 iexplore.exe 36 PID 2680 wrote to memory of 1216 2680 rundll32.exe 37 PID 2680 wrote to memory of 1216 2680 rundll32.exe 37 PID 2680 wrote to memory of 1216 2680 rundll32.exe 37 PID 2680 wrote to memory of 1216 2680 rundll32.exe 37 PID 2680 wrote to memory of 1216 2680 rundll32.exe 37 PID 2680 wrote to memory of 2824 2680 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1aec1d350e84138d0cc80be3b3787028_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1aec1d350e84138d0cc80be3b3787028_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2828
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b4ddca5e6f03f624651e3890758d978
SHA1da3c954e1660a6740cc637bc2c9617ee80696441
SHA25633eed35ecb572fca2249cab39299a7b9148919c1f8b88ccf53e67154b75c4924
SHA51218dabe5a823d5459331bd5d5125163ab9ec44858ef9b32bad72c072e62e307767c5734b0f0a4365701909700c06f8ba6d47c24c82be48664d67a04e692c3eab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c098237fe689e1ff2c1879f12140f091
SHA11eb086417d33950765ad9db53475d50b87a21604
SHA2560689853eef52e072998eaa9d4b256d28ff9173d1f09b20ba60dace88306a7103
SHA512da5a91be7261e119825559bebecd34bbc80cdb6910d9a4905966f60e40fef98352c739c808ad286885d50530df709948f30e416be69f526097386c9c471ff8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ecf6c9023ab7e3491fd21c6a48ac6c
SHA10c4041f5d7c9c1be9d68f5a538d13bd2e36acd20
SHA2568bee258b94c495fb5645832911192547cd4f05e50cb4b303dd2e35dff73e9a61
SHA5124430ee4cd57f0b403c91bca0b4da41eadb728e71bf6bbcc441fafd63023730f0f980a1386ece74767083401b7ac509c5800fe86510167a35e6f6b12e44715a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575f391fc62de1d31886e7d335c39d731
SHA145422d331746e930bbe3eb897f02b41bb0d38aa9
SHA2569d5c3862ceef94fb1c9db524b18d9edf31dfece8a7e81372264bb790b37357cd
SHA5122d6cc3d5c26fbda8108923b22d01112a54707e7c1a300430b7e100b60ffc1ab426112f6795ce27441ea28dd2f89d3758ade39ef3f905b16ac019da79b50e864c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c5062de2604b32c46481cca7396c37
SHA13ca005015134b6474bfaade95e803b286456cf6c
SHA2564cfd52ff0852cc75678db3563d9b51dd5b8ef2e756f299c68f672da0d5e8470d
SHA512b9a6663f59b75d498752667c459a1f961351307e914d29847e03f55cf6b2a1c815d67e90bfba211c34bdaeea8d5a74731b6b8d2d4779187428099839ea1cd893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e589d8353fc83cacfe3639dbacb2029
SHA1681b7e35c4c708c371773061614ea2a99c43a5a9
SHA25690610db060838c4783c5ece74cb85c48ae54298ea173560219f6a7f7b3dfa862
SHA512abf961bbc6f5b55575071028b01ce6dd15a3701692a944099982dcd4a6939a7f4bfb5c1a6ff9b9c8a32e28da5f2ff9e87f56029c2b2c8d2dc3c8a3a995268350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562eb4a4b5fe73536b8212ef65a68dfa5
SHA19fa374dab821ff7e4c045c6102a2c0f9feb57ead
SHA25632732bb062d501de2a4adbffa0e5fbad37173cb3bb7d06a9c1e00b04675b567b
SHA512b12a0cd21418665d5e30b6df83b2b5db0390f0e7a936682a526fb725f2a8c15d53db9df44164bcc011f48c8facc01dfa4a25e988b64509938b3374257187c7a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a334ecd613ebbe8ec9d0ea582208df42
SHA18eae575d5b671b167d6835341da1939f7634910a
SHA2564f5c3a76c0a85ba92a2a36c58acbd15dd4e0fadc8ca3aebc974ea6fea2a723f0
SHA512fd20adf278a5a655e72d1b9b2b31c8c694a48551c866b7c4fcd99967cbf5dc5520ab720bbea1b29cf7d40e3f4c8b9111db34c9466174818522adb420525b34ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558eace8f97cec47a6b977bc25e46d0aa
SHA17a1e4e3e68e1c0bb4df2160fffe738a05b1438f6
SHA25650e01487e53db9626474a9334d54a047daedf38c9bbfdffac439f97c77fd3051
SHA512cef97e4d510eed97ed36835158d862c70dfe99bc55a2d87a76ba503c239a4929226a6d6cd66db9c91bf6a676a54dd2326a89c75ff883a8f255254dfe1a3f77d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807a97847640d1e8aea5dc8e3971bca2
SHA11c34a42070e610f55262885c8a1f5136e547e191
SHA256adeb3c797dbb41c9bf4cf7091b88fcf9907463848ea9e29f759c8a9212864e8f
SHA51260e312300f3525dabb13c6720ef68a2e210f8a90f350450780630536d950068279bfa3cd5430f4e192cf39fbf34b23753a9ad1d3646392d4a0bde9492a3f8466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ecf8ec4fc3c3d81c6d5283f95f2c835
SHA1560909c04bc6a082dbd3f7488c95f1bb05f8da9c
SHA256121e10fc0901b1b80c8d1004929abcdc46f98ce3d71120f83f71a8f4f18c5369
SHA5126f1fc15e37c08654a04485d8bb3fe6b3760093e8a967266903114c97f6c54bfda45b8b74ea37ce0741fd4fa3ee752b4a644c2a84d0ff6ce64740f6a8a38dab36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51090ea625481fbe63f37a3fbb75390c0
SHA1ff2aec85ce14b4a3e9eff9c67151a3d0c447c944
SHA2564f58fb69967aba810c7af8eb426c9ac5b37bea1f090ccce6cb2c0712adbf94e4
SHA5123b8fc6a5eea0d798fb18de2f02b09d35e06993ba44e3979edf71dbf3d64bb0f7c16ad0e9e791198bcd684253fe1c2fbc9a6758a0716047792660366d061d5ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a616d9aebfd8814d299d090fb38a8a7
SHA101c8d2f3d96073337c8b88ba4193de1a507d3858
SHA256a0d54fb9e9d35aee2041e7f0523408a15fc5a9fd1d620ac1cd5fa8fb7e9c6db6
SHA51282e9f258922b103be4f33ddf9754424f19e1b35af6866480f0e7f08fcc4d0a827284baeb076084e8ff57512516bfade4ae496f37f6e4d3a62f3e28ca3a71adbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1fc98e53f371b747f399afa0db0a695
SHA1fb710f14d67230bf299016a3041a6b4244a5f6d1
SHA2566a7d1b138aae6d25a547c9434aea99caabe0e276dcc9769b16859084b9d37772
SHA51212e05583b027810228c70c1244037f43ec64e473c2abf4a5630f9c7313ea547e812ca62a79a14ec73df5dd1991486136694c5fb01819dddf76699c6a17ef4259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d16f64668b6bacae336baf828bf88caa
SHA144036a661a8a6ef765b529d6a8d2b9b0aad7ad5f
SHA256fc3b5b47e14c04b03f5807c85267a2ff1ee00d14dd4e159fd0698a183a77e43a
SHA51214684e86e7db9ca2b1ac697472d9bc49c27177c769d7425cc0516bb78057884bcf550ff4988bdeea0be53fdad9c967de815b49ba2297be4422dcff45f153c1d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eedf2bcb6e6b8350ac7378409f0cd323
SHA13def9685a14f94bfc41ca1b2c3e3c692c748b876
SHA256e58f3d7afc858880a34a74d56c1ff58c353ed967a2dfcb062f15585b0072a89b
SHA5126d125d503ce9018c9e3ee91f344e6eca4d7783132ee47fdb78ac10a1b87a406a2d6fd120e49bdf7611b864821ee889e453ee113cdefa9a010deb32897eafac28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6a8f3a7785f8e775f214db9ccc4bba
SHA14ae27587212fc46873c6082ec8b63bf94bb44396
SHA25673b954b60bf69580ed58b852ac0af5d4f116125c938204901f4f2076db408c14
SHA512d9cc525058851c447692063fdfea9c263088b67fd82c94a7801b48a3f422eb7fccf62105784d1dbf3f7029d9a4f513d28467c45e2331d8a7732e48d7e97cc111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806871357f9207ca9e2492dd8d1706d1
SHA1eec4f43efd58a788b0800767ce138697199a994e
SHA256e98d487ec3a02efda0b4ce226e63e46fe8c24086f79f222487fe45be02c5259b
SHA512d4dd47cdc9cc300e2ee54f8afe0568aeaa4892cee4b109d5734fef77bbd953a48a42bc4345a6901e88c5bcf76cd4346d90b0357f9da5671d59856abe92b5c651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9a0aa5d3f3dfae36439060363f9918
SHA1032840b178b0e6b4d850f1ce285cafc91f72de53
SHA256d46caaaa9b2858d4b554a62fe02549d05327600d914361f2d8f5323f1f11bcd4
SHA512322d550b1516ea2f2e41afa0df3c9c95d9b2034426bf0afeeab61c67c1a4ebd0f9960c0837a84f9af600d0cb37788c1641ab978872a74ce91861854545e1a23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa1126295b15a969a8a65afdd6cf937
SHA166c1731e29e8be90e9fde2169234aa7b04974948
SHA2567d197430fdf84672228f030a5f803a8c81046b7d062d9d0d27be2403c5ad9579
SHA51293c1c482714d373e0d06a9a56f4904127b6bf5f2c5d195cafc881aa1878223ca3b0d3570e7482b52c9b0ee875c6a9da1ac52f37f8acd520ee2979f0990087d2f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b