Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe
-
Size
958KB
-
MD5
2a823564f025bf1b92f4163080a6c651
-
SHA1
41366bb3cca5709afff3b76d449f4282d2fa0d7a
-
SHA256
1452230f5170b3ede7f333afa0821c4a901a22660b74d9e7d21faf0e50e80f8f
-
SHA512
10bc9547f68112fc836fa32f7cb6859615ba37ea63ce4b3911f59dda2637e9348f39c6c09eb968683e91f1acfef5184be9ff767f3df361ae49ee503e832c399e
-
SSDEEP
12288:L3T9vgatgz9IE2056CWdUaOQfp+HbJWIX9XD4bW0q2xtBGlW9UJwOGo19bgshdYH:L3VtghIE20sCYUQxEnZ4NGAARdYRUu
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2684 crpB48.exe 2880 Setup.exe 1644 Setup.exe -
Loads dropped DLL 8 IoCs
pid Process 2724 2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe 2684 crpB48.exe 2880 Setup.exe 2708 rundll32.exe 2708 rundll32.exe 2708 rundll32.exe 2708 rundll32.exe 2880 Setup.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crpB48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IELowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IECookies = "|affilID=|trkInfo=|visitorID=|URI=" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000000a8053db6bc7d00c1092caa36382bc520ba1802cf14b54ecdcc7c47bd34761cc000000000e8000000002000020000000b0a994eb9adcef1d66b02fc21130847b9ab86e39b3654b51d8f1b590c2fa42542000000032b467f5d48cbcb04f98516c6a9bbca226f15be3c4605c84b2ff19a292581c9840000000ddbefee443f7595b9ceebcf749ed3d615cc1735dedfc2c283f2b41fb892325aabb9c214a7a9195fe5aaad08b618d9308cb4a7338056dad006587bf08ec79d645 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0C95971-863F-11EF-B0B3-6E295C7D81A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434641225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000007ef5d2c6cd0f5d365aef7a61e3293f526747db09e049893a589f3f540f2a52d0000000000e80000000020000200000009cabc0a6dc8243322d86d34025bc23e9292c410644d0626429ad9c4343ecb77690000000fac71f1c44f0563a64ba9a2afb29be619e078a101fa92b08ee7199802516e689c0cbaecd9f32475b9e9b32673f7056fe4add5ebe84865a6e26d28a44e78dcbdfd905d7bd269ede4cc1034b4c5daec7ba5ba4d1c15ca947e1b88b542997682a398d2ea96a5e6ddfa210742d89dce0da83b4c8f51077b281d6a9ec9fbdcddbdc22c0f81fa7a5b53a36905f8dbe9d35e2d7400000004a557cd20a2a4693a2fa22cbb5ed431f7e0788a0751eaec564c6b3d88a8d88a7a1219ac19a6321b6c01e98d141846155fc5314f1cf55af5054a20ef5316fde9b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a877854c1adb01 iexplore.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Test.cap Setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TEST.CAP Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Prod.cap Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Prod.cap\Info = 433e39789c636262604903622146b36a374b37134b330b375d335757675d1313330b5d472747535d274763a0848185999ba5792d838080c035ed744e0027dd0b80 Setup.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2880 Setup.exe 2880 Setup.exe 2880 Setup.exe 2880 Setup.exe 2880 Setup.exe 2880 Setup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2880 Setup.exe Token: SeTakeOwnershipPrivilege 2880 Setup.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2724 2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe 272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 272 iexplore.exe 272 iexplore.exe 700 IEXPLORE.EXE 700 IEXPLORE.EXE 700 IEXPLORE.EXE 700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2684 2724 2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe 31 PID 2724 wrote to memory of 2684 2724 2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe 31 PID 2724 wrote to memory of 2684 2724 2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe 31 PID 2724 wrote to memory of 2684 2724 2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2880 2684 crpB48.exe 32 PID 2684 wrote to memory of 2880 2684 crpB48.exe 32 PID 2684 wrote to memory of 2880 2684 crpB48.exe 32 PID 2684 wrote to memory of 2880 2684 crpB48.exe 32 PID 2684 wrote to memory of 2880 2684 crpB48.exe 32 PID 2684 wrote to memory of 2880 2684 crpB48.exe 32 PID 2684 wrote to memory of 2880 2684 crpB48.exe 32 PID 2708 wrote to memory of 2540 2708 rundll32.exe 34 PID 2708 wrote to memory of 2540 2708 rundll32.exe 34 PID 2708 wrote to memory of 2540 2708 rundll32.exe 34 PID 2708 wrote to memory of 2540 2708 rundll32.exe 34 PID 2724 wrote to memory of 272 2724 2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe 35 PID 2724 wrote to memory of 272 2724 2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe 35 PID 2724 wrote to memory of 272 2724 2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe 35 PID 2724 wrote to memory of 272 2724 2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe 35 PID 272 wrote to memory of 700 272 iexplore.exe 36 PID 272 wrote to memory of 700 272 iexplore.exe 36 PID 272 wrote to memory of 700 272 iexplore.exe 36 PID 272 wrote to memory of 700 272 iexplore.exe 36 PID 2880 wrote to memory of 1644 2880 Setup.exe 37 PID 2880 wrote to memory of 1644 2880 Setup.exe 37 PID 2880 wrote to memory of 1644 2880 Setup.exe 37 PID 2880 wrote to memory of 1644 2880 Setup.exe 37 PID 2880 wrote to memory of 1644 2880 Setup.exe 37 PID 2880 wrote to memory of 1644 2880 Setup.exe 37 PID 2880 wrote to memory of 1644 2880 Setup.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a823564f025bf1b92f4163080a6c651_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\crpB48.exe-aflt=babsst -affilid=123713 -srcext=ss -s -instlRef=sst -mds -mhp -mnt -mtb2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\5629EF1B-BAB0-7891-8898-B189D9F9C8CC\Setup.exe"C:\Users\Admin\AppData\Local\Temp\5629EF1B-BAB0-7891-8898-B189D9F9C8CC\Setup.exe" -aflt=babsst -srcext=ss -s -instlref=sst -xprm="cat=delta" -aflt=babsst -affilid=123713 -srcext=ss -s -instlRef=sst -mds -mhp -mnt -mtb3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\5629EF~1\IEHelper.dll,UpdateProtectedModeCookieCache URI|http://babylon.com4⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IELowutil.exe"C:\Program Files (x86)\Internet Explorer\IELowutil.exe" -embedding5⤵
- System Location Discovery: System Language Discovery
PID:2540
-
-
-
C:\Users\Admin\AppData\Local\Temp\5629EF1B-BAB0-7891-8898-B189D9F9C8CC\Latest\Setup.exeC:\Users\Admin\AppData\Local\Temp\5629EF1B-BAB0-7891-8898-B189D9F9C8CC\Latest\Setup.exe -latest -trkInfo=[TType:5012_7] -aflt=babsst -srcext=ss -s -instlref=sst -xprm="cat=delta" -aflt=babsst -affilid=123713 -srcext=ss -s -instlRef=sst -mds -mhp -mnt -mtb4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.4shared.com/mp3/gmnum1bC/_-_My_Love.html?ref=downloadhelpererror2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:272 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:700
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5942d5e5278edfd6d9c991c2c580e0c43
SHA1742a11bdfdf4e08247af5a9fcbacefa1d07ad48e
SHA2564d059e8935b3c4d5e2e22bce6b190a5f1505b18892d48e2b60f2d38d0bf2ae9b
SHA5122cc75809781507f5af32fe3608f576931a4a2171e33aafdefa2214aad30ff900684bf64132908510d8372a563061938c338c46883f091007a62354a43f00069b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57503d3372347108704c13311b978525a
SHA1adb1c44eeeb2b39149d65c3b680d97acdf527ad4
SHA256a31c01d4d8bf981501248a61b8f9d89bb6a9d5a37d47c97b682b9f803b5fa595
SHA5127ddc1f8c6c52164220c8e51942d56a72f5897c58975c78c86bc5b8e6b2b16c58c66eb538cc7993380c8ab6216f0a5aadfd2a0ce66867e44664935e9c2e3cc1a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c0e40467cbab66f7889d7a4d113199
SHA15ae9ffc6492c5c30fc2c0c6dcea469bd60bbf3ea
SHA256a47b363b9c2a050f58832612d6830a693eeed1a6dd45d98b19379e628d8574ee
SHA51248eb4c1461fa6df77b502a862b85f92e9ccd808741ce3fbbb5690ad185cc214b2fd1c619bd9b94beeb0654ec4bdedb0dba62d91ed055a9bb2289c2a687634782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a7fb2d8dc4f9f9c4453a0a03c351f29
SHA12f2135cccf631a834fe62aff6715abf927eec2ee
SHA2565200a7936d916759f12de67d0f4a899912b59e9094a6e5cd2f35abea1b19ce77
SHA5123e09d71c7cff2b0f47d8eb6ad2719226c0e6bf9c1535428ec41e281088b28716c72d98243206bf263b2bffc2ff11905b62ab30a0f0b0e2e7b7fe7b90fee398a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae762ebe5dc3d79170456aca6aa85bb
SHA1f7527390b2c83c6cc952d8f8522c5eb7aa88b736
SHA256e385386bcf34fbe99810d25c15671a4ee701717f9846aa30c55eb0c2065389ed
SHA51285620891a25f41aa73b9574642e75bd7524a81ca08ab8aa8ad2b4a123c7970dccb4d038136b7214b22e87a051889c91dd41b5c045d7e53990ed4339fa945737c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c965c1f3c108faae257a22ba3997a92
SHA173288aee8644ce97dfe76518d52429517bd59fc6
SHA256f49bce7ab1cebd30e20638e8a151e17f43c0fd4ab1f1b0e7bf5ce36b2786a156
SHA512a2bbaf34501ea9f25b96269a99b97fe32bbd190b8095cfe01926f0693929634e2f44510a0d83e2602caf40920a04861bbacbf275a90429e46beb1f6a9f2971ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5af2602f45cc841b4ef3796824f0d1
SHA12f91b82cd6f5ce0cc0a9a265ebd91936d4989d13
SHA256d33a317f69921d554337f25f6effde82e3e437bc0f00d50f45b301017e6630fb
SHA512c1a4bcbfbf175508221ec8b7c77b01dc633d3ccc6c39533cc74051efdf133b5703c267e9d18cfcf7b2c8e4348e3142c44e9f421e7652788866c517493d8985d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e7a32aefbabd9fcf897896b59e91825
SHA1ccc03d87fe4784d459b852dd03a46dc09ea7b7d0
SHA25639cdccfa0f42c8b1bbfb3b8dca7e78b1fc19ac7a3ba0f8906085ba5dc1cb56c9
SHA512bf611cbc6c7cebcf9f037115a028b089a718b3ba355689f8ac67221c33a9fee050038f51cfd01b6e169a04113bd62f3d5d35cc301cd196b2b8c9cf030aae764a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e51f5e440859532c9a6141b7cdb5b7
SHA11ab7ddf5d39c810a25aee887ec8cb39fe50723f2
SHA256a4d4588efa136e1468186ef5d0e736dda14326c1324fb2f9efbb7ddf4fa2d535
SHA51272a86520bb2f2d8881d415d896c69f1af3b95522d5ffd2c54584f847e3454f2bb8f608a3e9d6119a93e539e79de1932dd8d897a9d561857c9dab6612a4c7a012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7f43bc22d160b1d1250a88d9c586c5
SHA1df0f7818a0093da5d641a60bc9ad37c2d48df48f
SHA25689c7956074f079cd3e0e8789c06cc09caaf1f19d050c5a7d4ea98e40b86d1ee4
SHA512c666b2021090592263c942a62bf49692ada8fa17e653de38934858aa6425cb86ee72987445675b5494d6b650873d7115db7649b2583f24088b7b4e72731263e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55285b7fa1e4ebcf61e3b91e07fa12abf
SHA15e72000991bfa7f6c798645037e4223b6c9eb747
SHA256c7be8feb887b0fac93f4aa7308605f93a7f17ad05e7b02bdc0d1facad16c8faf
SHA51203e069b96c6c62cfaa8d31a02ef61d40bcd7dc551fe445544a708b40f06a7ab35b70d2e24b4ee63771458db23eb7148d29f3c9bf7318ee03f2350d4d1371c859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561ee97749e8aae0d896c851e1597ebc
SHA1732da324f928602b548ea5a8302082e0463616f1
SHA256e44ecc4f607ee9b4f347580bc23969a20b1455646efb9f52361336f5ba5b8c8f
SHA512b78a8821c728db41273b44b5450dbb8675475cca6c16268bf94e082e49c3f108093175cd5fdec2937e155c109432676b883a3857df5624db8fe28be243182d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526fb3b79646cabafde7265cd556199ac
SHA18a25ec743e55d9f0b3def6c3c817c1df4755214a
SHA256d395edb59a665204c778be6231101b58573a0a5a02e00b9486c65bfc323bb213
SHA5124f855fa04edc8e39ec1e76ab417bcb144f92a834939aea481429213fb8914b869faac6b6fcbbb8699da376d20b52f495563b6626e1e2f2b52cbebe342f319088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061c01b7d85d82414bcdd81c2142cb3e
SHA108d8bfbc3a31f55220ee97069ed231bf51e5df99
SHA2565e0e13f6dc21828f0ca3223f3ac0391cd3dd6f23adbd73bed311f051d561ed30
SHA512115cc2388351afefd2176fc02b06a30a44416f6fb1b4c44bf2a6292c4ee0814a41efcf5659b818f0c8cd09118465ae629c8b95f3002ebe722d25170fac0e8f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e2167e16d0e9eee1d776dfce367c31d
SHA172d3cc99b01ca26de001b35c99f097961407b2dd
SHA256998766118f4b48a43eebed8d4a187f870c8bce45f2800872a9c610c32729a867
SHA51211bed8b4f34a80e12e64b79061cdf4b6735a6068452aedf3f24cb5d6fa6fc44d1cbe08b56bc6d1babf606b2892b6613115c5e806ae34a71f469f506eecb86897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5758525072a98f0e0f541ad9319957660
SHA174fed9a23556e699d6ecf837b7a014a69da953b0
SHA256653477dd2da7f8f7061ca7268d1af4069d4acdc6e89299d8b9b2658fb7057a45
SHA51280655cbb88afd81b0c4581ec9baa9a6afff97ebfd0c58501a77facc437fa0708e3e7a1c6144bf61eed85f1892a2c9c4bafbf912a5406bcc735cf834582edf3fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3de56edb1fdd9a8a6e32478b7f623af
SHA14e20e53f53a1b4dfb3b92e7f7e90ce9d92bf7760
SHA25623da843fc357bdf2250acbe3e8433e46b3d04c1a3150d5121b70f145bf3a9d89
SHA5120469ecd500b27080f0efcdccea760c5aaa61f4d08acf5e4fa009be653fab471586124880dfcf14eb10271e216cdaf53ac8ab8a8185259b1428795358b9c0fe09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d2e47273d983daae126ae70b69ac083
SHA122585173ac4065ca89674104dcd7ddd9d18a81c1
SHA25608d8d117bbc36143ec6c30a0408edf07840b4e1a40eb9efbdcfa210a290553bf
SHA5126cd7d5317f3b53172991da90c76bde69ea8eab6cafefe1004368911d206e24f43d336fb07da4160c5151d024cdd55ab21e935cde6aba213f428a94b0d6388d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0868ad07c26b3899fab25b999a030a7
SHA102eea8e29c5db79404bff391dd5e42bacff740d2
SHA2569ecbc32bf4e36e1bbb6666553e02198a825b4e12b50e8beac7ffb5a772c9a8ee
SHA512b83fe000fd9a7036194f8a99557dc0b56dd188a02f3dee9f70421ff42dfb5977deb974dfdfd4e62423f987967bc61626e0f2b4c194362fb4737c47fb96c33d9f
-
Filesize
3KB
MD55e6230b3b16798e23720958756ac6d9e
SHA1c7bcb001c48a67d4c9d6e70e92473ebd85b30585
SHA256d49ec47f5d27a09a17e00a6eb78f49a761c9f5881ec81fb07cc49fd0a5f287b2
SHA5126b1c132f0e4fc2ca6b5e8d807671c586d84e044e4db8380682fd4d071160177c0f7e7a6afae3ee74a4fbd5c65aca0c0876948f5a42deafdbb685c5b7989b5aae
-
Filesize
129KB
MD5b212865e7e478a28a97268f960079a8d
SHA1ded201ae02fb9ea3646489afeda49270c4620d9c
SHA256d6138aef3f7674e2442add75013c86ca8fda3d5ba69737a9b881e7f7bbc730e6
SHA512d973f9cb45d2035a8546bbdf77fa1b239a3f1e4ba2b17d32195a1cfed13fe06aaf48b91a133cebd7e53481ab5a5e9166329b730587b46a154b193779da6ad737
-
Filesize
12KB
MD5825e5733974586a0a1229a53361ed13e
SHA19ec5b8944c6727fda6fdc3c18856884554cf6b31
SHA2560a90b96eaf5d92d33b36f73b36b7f9ce3971e5f294da51ed04da3fb43dd71a96
SHA512ff039e86873a1014b1f8577aec9b4230126b41cc204a6911cd372d224b8c07996d4bb2728a06482c5e98fb21f2d525395491f29d428cdd5796a26e372af5ad4e
-
Filesize
644B
MD5f50fa4673555652289652753183fd1ee
SHA1f496797f0d34eb866d6328d2fd1492b485f74d0a
SHA256afb21b51cead30ed14f79293d50b9c3c7a706b5287aad6cde06ea44a364df812
SHA5126e92b13343ad35a8a8c61e54ce3abb9a28abeec4aa8c765326e0d1ec111c7656d8f0f349c44820fb1aba6730c22f84f7411c0c0b24322bdaa8a977b79baa23da
-
Filesize
926B
MD50c464e407c81764ebc09eacbe41f0b3e
SHA1245afe550a05215e5873d8f5f21c22d12aa46b6a
SHA256770a302bc58b513472aa603ae44a365a6f4f8cbddc13d2692f71b09f143f8a26
SHA51271070fcd243cbb3e4452874ecaf8e20e13cbbbad0009ce543ca49601facc1ab1906c298849d3b8fb5747df1109f8e85946243ec7bfa0ead97ca0aed9ec8d3dfc
-
Filesize
3KB
MD526621cb27bbc94f6bab3561791ac013b
SHA14010a489350cf59fd8f36f8e59b53e724c49cc5b
SHA256e512d5b772fef448f724767662e3a6374230157e35cab6f4226496acc7aa7ad3
SHA5129a19e8f233113519b22d9f3b205f2a3c1b59669a0431a5c3ef6d7ed66882b93c8582f3baa13df4647bcc265d19f7c6543758623044315105479d2533b11f92c6
-
Filesize
89KB
MD5407846797c5ba247abeb5fa7c0c0ba05
SHA144386455eed8e74d75e95e9e81e96a19f0b27884
SHA2560147b5b11b935310752666fcf1e6afc922b76ff03d01a0d1ee2babeac10ca1e3
SHA5127399a9228f971698db7362aad28d3f9694c0bf453d4529e48bc7869af0960452cfe1a5f0a5754e7d567d81b5aa1e35be05a9e36ec745e5470d20fd44a61d20af
-
Filesize
205B
MD590713ab7a74884cd36a5fb4cfcdece8a
SHA17bb56d08fd69a98e543b923bd0a9156f92a9c473
SHA256bc40813f6d07dbc1a4d4c74363460d1ad6ee76275729de4c4f10ec40d8cc46eb
SHA512639d68135fb54264f2e21081d6ca9ffe73a94035982f4a2d7133d6d402cdd3ef4a695eeb61ad173dc6d1b8167d1f5df2be61a972c96f07ac357ecec887a0d191
-
Filesize
174B
MD54f6e1fdbef102cdbd379fdac550b9f48
SHA15da6ee5b88a4040c80e5269e0cd2b0880b20659c
SHA256e58ea352c050e6353fb5b4fa32a97800298c1603489d3b47794509af6c89ec4c
SHA51254efc9bde44f332932a97396e59eca5b6ea1ac72f929ccffa1bdab96dc3ae8d61e126adbd26d12d0bc83141cee03b24ad2bada411230c4708b7a9ae9c60aecbe
-
Filesize
249B
MD5a4af0a0c254b38f2f9eecbf0e00b08fe
SHA1ef730bce77699730dda378dc444b997ce7ceea7a
SHA256810e0e32d54b9e1557da7ccf1ca9f6354814e90dadc6b4af5e1cbdf87fac925a
SHA512b74596e55e75413303559c135db393a04d6fd6cbab147a51ac2f46435f52b92b82868de4e67917a7b388d82c672fa36b525b88e2eefe7ec40695f028395dcd84
-
Filesize
234B
MD56358860cd0c336c1f91f86be701d77c4
SHA15dd38b818bf0860b4c5144ba670a759d4345e4ec
SHA2562ed42e3c958eb21352bae4b00db2fa5be94149abc64eec93e5258b9c4a715457
SHA5127df3b3e1487d3a65000b6208969f1e695815133c052f369beb36877fe5c6f64d979aefd030a193b04a5e46fb0d97a3cc06837aa381efe6bc24a0c084c768dac1
-
Filesize
178B
MD50b7be9c4b72c2c5166bfd61ca5ebbfed
SHA1aea0aa4e8226c1b4efce92e909da773744baa6d4
SHA256673bf972d308bc6108360575608cf72f393413f2d3993489b06da4a6efc749bd
SHA5124dcd7ea01b05550acb00b71e7e9fdd52a04fe1cc574655030dcae94b87dad86bfb7973adf9185de03bcacb100fff758b1a2f928fcb951e2b31e320860a2226d8
-
Filesize
174B
MD57e72d256e34635d351092955d1f8516b
SHA17f240f8f4bd61ae59247d84d0ec85f5bc8729f36
SHA25639eb1667a67149b5d930e5408896027e3c3fc06282735e61cb8d85f5b38f587c
SHA512621eb4bf2864db2fa0f861c233ced790124e9060c081948beb7117f8c058a36ecca23ee05ce2d6d42af15533c050f648d276589682d91dfe699ebe871cc9ae8c
-
Filesize
508KB
MD50f66e8e2340569fb17e774dac2010e31
SHA1406bb6854e7384ff77c0b847bf2f24f3315874a3
SHA256de818c832308b82c2fabd5d3d4339c489e6f4e9d32bb8152c0dcd8359392695f
SHA51239275df6e210836286e62a95ace7f66c7d2736a07b80f9b7e9bd2a716a6d074c79deae54e2d21505b74bac63df0328d6780a2129cdfda93aec1f75b523da9e05
-
Filesize
6KB
MD5a21de5067618d4f2df261416315ed120
SHA17759a3318de2abc3755ebb7f50322c6d586b5286
SHA2566d13d2967a37ba76f840cd45dba565c5d64938a99d886243f01713cd018e53ca
SHA5126b5c40d09a9548fde90c1b1127a36e813525bea6ff80d5fb0911ddef67954b209df44cbf4714cd00c4e2e4da90cfc4967db7174c28f751f7c5b881fa18cc938a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
71B
MD56775876dd5ffaa82a47075baf7215458
SHA1b1f33b04e95c4a09900126d8c62eec7c5eb4005e
SHA2565131f8e0d1ecce6adcc6ec8c3285da5e24547cef1e6b9fc2c0099560ead37d7f
SHA51266a657e3b784a5799f10c74b173bbc9b22000a116baf5734105146a77fcdc74393e114a1abfeb549b410991e64a55e7a583ce4f1eaae2434e7198348df84b472
-
Filesize
8KB
MD55790a04f78c61c3caea7ddd6f01829d2
SHA19d783d964338a5378280dd3c3b72519d11f73ffa
SHA256726b0e7e515f7bd62c912b094fa95c7c2285a44e03d264f5dd9e70729c0e9606
SHA5129134fc02095e313fcb528fa32c8534929fddfb7b7b139a829f2b3eb32cd4c606f6d2ec6dff57a890ea250ce1430eb272461accfe05164bd4cfa496c0a1474ad0
-
Filesize
1.8MB
MD5c18f926ec58cc6e0b25e02feb22abfe5
SHA13097fbb717307a1e94b7b5a245a5ba611150a5b6
SHA256b3b9cfb1e64cd84013bb43d9ff779a854f3f048a04e5b00052df38914f6d8a77
SHA512e5462ae26b185ef12ffbb48762c387be6e32649b64eb1c7584d88fc2ead509eab46d401df7007869314a385a41a1db0e519c29850279f1608453bffc7fdd86f8
-
Filesize
767KB
MD5fc21d8e387dbcd2e627b97bfc5b8f5cd
SHA137ccad86409e08816a4c00f1dbea4604ba36d3a1
SHA2566054b54a561df69b21ac35c5e76a3661412b404ff7404cfca1d49be20900a96a
SHA5126d00db1000e2437b2c2fcf5d24992a4b36557f88b6083b3014184102e95933c41e13e5b0684e3795a945e2b129d9db6136f4cb2166958b51e4e5a4ca9111c5d5