Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 10:34
Static task
static1
Behavioral task
behavioral1
Sample
2f8f1d18662f41295f3fac3ad5d2007e_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
2f8f1d18662f41295f3fac3ad5d2007e_JaffaCakes118.dll
-
Size
214KB
-
MD5
2f8f1d18662f41295f3fac3ad5d2007e
-
SHA1
c6cff86104c17bc0463d89b8289db50094cabe1e
-
SHA256
55fd5b356885497c3279144ae7acaa5d848ac22bf7f52873ce95b06fcaded6c5
-
SHA512
6ac35f0199fd263ced7a310d6c6b902943901dad6366c8e3e8fb0ff2ddbcc8b04639d99cf61d575bb2b8034f4431c43c34a92da516f01420442b571ba99885e2
-
SSDEEP
3072:jvuEmk7qHEjxdCs6LQoKiHElD3EQbwWYhK+8GgrKekAf9tfmBo5X:jvupk7IEjx6t8Gg2e3v
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434679386" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0454878a51adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A77D1D1-8698-11EF-838F-D692ACB8436A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ccc25cd3884c934b8c5c22d94066406100000000020000000000106600000001000020000000fa37ab1b5bd8a25daf0bc893a7a7d42108db6956e329251daefbf93f1f0779ab000000000e80000000020000200000006b5fea539f763f5fc8a08a2f0d511c69d309ff7fd24946f67727296ce3c4dbfd20000000d82ca1bd3636ea79c37bad875565635d6140063655fd309a38b1ebe09268c5fe40000000a012c469bd48281f7721a63fdc45205824213fd2cd5ccbe44f775ef58171dc950dbd94c45e2d8c6ba89e95ce7eadcd350907dfa3349f57dff6869335aa1be5af iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2740 rundll32.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 1776 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2740 rundll32.exe 2740 rundll32.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2308 iexplore.exe 2308 iexplore.exe 2308 iexplore.exe 2308 iexplore.exe 2308 iexplore.exe 2308 iexplore.exe 2308 iexplore.exe 2308 iexplore.exe 2644 ctfmon.exe 2644 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 580 IEXPLORE.EXE 580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2740 2732 rundll32.exe 30 PID 2732 wrote to memory of 2740 2732 rundll32.exe 30 PID 2732 wrote to memory of 2740 2732 rundll32.exe 30 PID 2732 wrote to memory of 2740 2732 rundll32.exe 30 PID 2732 wrote to memory of 2740 2732 rundll32.exe 30 PID 2732 wrote to memory of 2740 2732 rundll32.exe 30 PID 2732 wrote to memory of 2740 2732 rundll32.exe 30 PID 2740 wrote to memory of 2708 2740 rundll32.exe 31 PID 2740 wrote to memory of 2708 2740 rundll32.exe 31 PID 2740 wrote to memory of 2708 2740 rundll32.exe 31 PID 2740 wrote to memory of 2708 2740 rundll32.exe 31 PID 2740 wrote to memory of 2752 2740 rundll32.exe 32 PID 2740 wrote to memory of 2752 2740 rundll32.exe 32 PID 2740 wrote to memory of 2752 2740 rundll32.exe 32 PID 2740 wrote to memory of 2752 2740 rundll32.exe 32 PID 2908 wrote to memory of 2644 2908 explorer.exe 34 PID 2908 wrote to memory of 2644 2908 explorer.exe 34 PID 2908 wrote to memory of 2644 2908 explorer.exe 34 PID 2740 wrote to memory of 2752 2740 rundll32.exe 32 PID 2308 wrote to memory of 580 2308 iexplore.exe 36 PID 2308 wrote to memory of 580 2308 iexplore.exe 36 PID 2308 wrote to memory of 580 2308 iexplore.exe 36 PID 2308 wrote to memory of 580 2308 iexplore.exe 36 PID 2740 wrote to memory of 1776 2740 rundll32.exe 37 PID 2740 wrote to memory of 1776 2740 rundll32.exe 37 PID 2740 wrote to memory of 1776 2740 rundll32.exe 37 PID 2740 wrote to memory of 1776 2740 rundll32.exe 37 PID 2740 wrote to memory of 1776 2740 rundll32.exe 37 PID 2740 wrote to memory of 2308 2740 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f8f1d18662f41295f3fac3ad5d2007e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f8f1d18662f41295f3fac3ad5d2007e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2644
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526d36eddd89f3a1576ec4695219c6cc
SHA1ddef9c598544aeedce83c06e81e0703635e2bbc2
SHA2566b950b5a9234f02c6c28d5b78313196f2c5d63c380775b5f8b1caa7a64efdfc3
SHA512a9a57488476b6e9462f635af9ed02bafa34c005167cd9291922308b4743863da0885f5b9289a05586265915f470a6128fd604dc17b3c749afcacd8f307884753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68cbb1fa6298d7d1ec2367c930f09af
SHA19496b97562e443be11b395f825a1bd6d3bea1e1f
SHA25663f6b87c96a5f1199430e3df8fcf27304bc57fdcc94a2b5eb380c88a1a4658c2
SHA5123ce313e8cf006c5dfb3d08f151c7e701e8ca168a6d6d771c3279a0557468400da55377dff4afbd7df520450769f6712e4599014599eda3b7497d2dc720b239e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bfd5825a3d40674d7f40b504af10ec6
SHA1c73990853ba64f48904a9f755c0490338786c33d
SHA256d694a7fb6c1428a29b7296da27b17eb1d77d0d030be95d6d060366596bb890dd
SHA512af6d6f2b47668a30e0a4ba4d0457b11b0248b5d92f93e17eda4dd847970c1afd1e5083f5b7601e3b2386cf09974c5d923546337b48d53579634b0ba55dc92701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5181526d583feef7c206e83a2cc7e1f9f
SHA1f1b933014aeb28ea95846b3a0803f0e9f3f3d889
SHA2566701475f37e8578530db72876efcff09444726404a8197bc26321ea2262bd092
SHA5121e18c6e2c06f92c92f127c79bafabe2abda5de0c829cce680ec80441355977327f8a5828002865fa81e2b3c429a607c695cb210680165301f2ac0f7264f7c757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597b87db2e1ac3d65b455c126078a144a
SHA19d839dd842e3cde92fdde0a8e55d1159038cebc7
SHA256af9e788a5fe84d50bcd3256c125f7c8ae4ae7f90f12080433946f3c34deee2ee
SHA512397b2c43e6d63f0ee775155bc2880dadc345995cfafbfc54d1214ab11a0847b1aa1644cadc5c7c1342a380d9c149fd27dcff591d77b42f83571c2d4d3d26eef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeb02f716252b61633405156d7049c7c
SHA176895816bdd5ff432378ac9eb6d47751ade0a244
SHA2561e7d30895c8ed801b41d1bb6561c0bda8b6754081512bc3a1210e588f44c0253
SHA5121d3753ce5c7295eb1d969c4c2dfbe86a0d1cc5aace146fd69c66ce3ea60409851f4f41f98a242b82b1b63537139768b242e4bd9bae31598798a77b5bacb2ebe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b30b6707d36049eeb2301f7a568cd7d
SHA141aa67cbe67d7e8b8c45cfa7e28fec6a2183c32e
SHA25626bcb5ce82ac3de98e9d550aea4b03577a921b5cfe8854fb9a017f7751865969
SHA5129229df7837917bfe75382a8338be40e3d07a45461033f89bead57e290c946e9fec5094123afe7d1e74b9a3bbe8b7833ec563218c24c89d633022d89a6913fb11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566596635c44095ba107daca68e6834a3
SHA1e4de59919f48c9261b637329a4eabd5fae5ec038
SHA25631d87b75f898223336cc4da41796a395a0c8daf644e43f91543ba1f0e4baddee
SHA5127023819ba373e4dcb0c03109bc3c6bb9637d4f954cc36755abf8e7e61af4ea1a27d9c1945dc4b4305ca8f6041686d983f9a91bedcbfcdce5ad14d244ce034c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea2831cdc44db9e164fc7ac6c1f4f70
SHA1ca7690aa2b7a0b6a093a578508a71eacda4c69fb
SHA256af838b0e713e66ec88129b33b025936f4bdf125b16ac6f1b8fb552938f6f603c
SHA512e37aed34f6e9a164d709e813878c0fc021f2cf50d1f6e64f9786669752bda1cd11bbb64e4a7c1bc38fd408c1a057c49d93e62cba00634813b3c0aada23c03501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a1ecd53b5c3121231acd98c0e678f9a
SHA12f857425517a6bd781a0cd098d84f5c0257a475d
SHA2563de8ee929e74cf4b00d40e9bf811a8e40a04456fc3226f000011716bf1685767
SHA51216803084eef6a30b50b65b1f911e588196baf42f3a37366d07993c00936b5e8c33bd1a0ae54089dd120639cd47b3263921126bff81db6131ab49a9a35b190647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6b82bcc13d33259b5a42e095e575a9
SHA18c2cf00b75b3f9ea1822ee3d3d6b51f68fc5321f
SHA25640fc009866bf19743c46ee5c80f7fbc01a8b7e312fe692e5874eafdecea75091
SHA512d34a7930f055572544006eab2940368404bd39c7a98ef9d31a90d42cf19f05ad04b4b15e89ceace245ac10fd3741e2b9919575a9ef754a291e28c80e55c88ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b26d0fbefe3bbd2265be1b1a01b4a57a
SHA14073b87ba993e38962df84369c2b161c731521bc
SHA256e009754437875fa7429b8e643cc161e4261ff3e73bcc5e0b4acf59c58dee5b6b
SHA512870bd13e52c9e3796a2b1a2b643da4b81946a8152f37c5201848b682c68ad78259f13dfc4c01e44d1a1118d23a6788ffd342c542b8276c88446abd1bd44b2d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b00b5ad3dee10e35e3049c3a4986ee
SHA19ce7fb8c6a5ed7882a3d97313c13e6dbce5037d1
SHA256fef9896440e6726b6aea3b9bb6e96f24e001f12be7f9b58af4c3f9ac9ce6ab21
SHA5125825cc5a316a993322116671ad34667d06b1b69d99cbf5351ae864668cf6b995c47f02f351f4c41ea1f1ae6394d261b9c1ac49f25992d0c807781e246bccb76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584aab0880189d07488c4e7b4f12f4859
SHA1475f7e2bf18214b0e57a93a756d067653fefd92a
SHA25689e080e5566e3201aa6da5caaf960910499cd7723dfef5ce38dabfda16e89bde
SHA5125eae0fc6e80e421cfbd7e39fb34b10b7d0b0b5150a7c4da54ae4422abf62604c241ed215579fd74157fbf6ddd9806b6b34755c3a4c69db5536bb965a888505a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5632908cf4e9839db424aa98d12a8cfd1
SHA176240512fc42f2ead21ea2ba5658bbf79ccc68ae
SHA25601f4c331d728f38aa6d6ad76aa7fc4714926cb7bfeed2d1273a51b9e4e98fdd6
SHA51245c5ab3b3065037a786cc172b3cf7b64056e11ae36e48b39f459d95a6e24e044c3e607b6dfaba8bba1cb0a76828f8c2f3852ae947a35351aefeb99ca63918ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c0332031e4cdf60844f493e01f115f
SHA10af05d4093ea79026c1610f715395c96abec5439
SHA2568f788fefd65d836298401528ad4dea09c576042f2f0a551aaceb12d6d390a52d
SHA512e4a33b34fddee2392962abc461e288b5a29b8f66ab204cc2f60e0ecfa8fa36569882695ae3e5a4f529ef31eeddcd2af037d6e3dc19789b126c97061f8ae9ce97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b06b98e1d4d43bae29b7e5e6122dcd7
SHA1f7093e44039e2261dc2fe14aef3cb1637993656f
SHA2560af2819fe5f88eb962f2d99cd02d12d0e4c4c657fb29dd4b49a92a7882d410b8
SHA512dce09da2c12fb2bdf2a93ad49e241bb589a9fbb97f3623980a4e2c95be6fb0e6b5cc7f9e9caaf6076dac08e9135413a772ced1c0eef4fa53312d93adfdff9013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d17505895cea5918ece82621ddb23884
SHA1fbf904492eb95f1fba168fb9dd6884924d8e94dc
SHA25623cc77e1858341af3d0f9ea791d8a2934259d9822ef710e3af2dcfb135ebf096
SHA51207dfd9d9eae76209a0de7847c34c2afa6ea08596bae5d4881e049a4de9f969a59b5958ff2e13fa6eee0941175903f52a109981f1e1be25935274b96005c27284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f9d2e414b615e2b4f0dfb9723b2c902
SHA17fcd0bfdc3d50a1b9a085477b507a19d0672d85c
SHA2567056d7ef3ae83fd79a7e5fdd738f496620d3f4413d2f0c013cfba5b860290ab5
SHA512d403c0eb01d12c938dbf33aa16d52a487893fca59e140281291138c6e601de7d7f89d6752162f88ac03b4849e5174cb89c0b58b735ea884c668c0c1932fa9cec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b