Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
30c193853a6e9f45ed1fe0bff832556c
-
SHA1
01ed79e0659e66d7a03e4a534c7c0b52599f48d9
-
SHA256
1be2ae8c73c2cb1b8ba9c894b970ec2ce909bcfa310b7b903636371339a7fced
-
SHA512
918efa7bcefcaec35892bdf417613cee0ecd81f30b15a234a5200b17c28a6b175d8c797a4a5bc019bbc0fdde5e578007cf338d1d72315a1777ef03d0c0303bf4
-
SSDEEP
24576:frJKUK/juqkncxnfS//2oYP+ENxuIW/Rjl/lVlP64htKQtsVELVDiicYQRebMyHz:f1Kb/juqgcxfSE+HIuRjl/lVlP64htKB
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2656 crp73CA.exe 2764 hpet.exe -
Loads dropped DLL 2 IoCs
pid Process 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crp73CA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000946f7e5834c38a4da68bbef0d72d41bc00000000020000000000106600000001000020000000f96a50fa78bb23c53046e0d7dec45d52bd47eb4c7916816b7d37f96c6a7df354000000000e8000000002000020000000650a1823672cf751ed18021908facba135c45d4121c3c8167e2c96ba0492aec790000000c561c1391eaaed903d3c48de6cc7a335d54f5a5e643124d56205abf620a74d715270299aea6caa04fbb9fe01252721f1b4c236459db18809d77b85eafea058862595c24bbeecdc508d6ccbefc0dc1f34d118574e86a7dbf07225feea80291d7c5fda79de151518ffe34e8243add3a19700cb81561380591b773bf87a17af6e2498e27029511f55d4ddc9720603593f2140000000d8dc3bf76f073b24ac10a76d0d315e42d6276ca48746bbf3b77c8985e710336caad026c23ac7b712a64790fa3e316d49ad87540b81e5249d3ba59de23f4edbbe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434738434" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Search Page Before = "http://go.microsoft.com/fwlink/?LinkId=54896" hpet.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05E99271-8722-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000946f7e5834c38a4da68bbef0d72d41bc0000000002000000000010660000000100002000000073b9be02a316149c44e122f1502847001d5c95fca244dcdafdcb3aa4c43cbf31000000000e8000000002000020000000ddde20eca03797965fe53814ccf54afdb6e75ebe3bf3c80fb8625c514964fccb2000000055cdce5f9b8e2fd67e14b954e72b8ffebff94191ab1353cde1967629d273ca3a40000000cc00c81733972a5e314fa54f34cda067c8e4f789c0edb68bc63cf05d93083cb94dfd98ad4ea82011f5816068b598914c528c3acb8818ae6e9489f25a78c4f44b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a690da2e1bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://search.b1.org/?bsrc=hmior&chid=c162341" hpet.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Start Page Before = "http://go.microsoft.com/fwlink/?LinkId=69157" hpet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.b1.org/?bsrc=hmior&chid=c162341" hpet.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2764 hpet.exe 2764 hpet.exe 2764 hpet.exe 2764 hpet.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2656 crp73CA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2616 iexplore.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe 2656 crp73CA.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2656 crp73CA.exe 2656 crp73CA.exe 2616 iexplore.exe 2616 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2656 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2656 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2656 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2656 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2656 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2656 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2656 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2764 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2764 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2764 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2764 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2764 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2764 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2764 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2616 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 33 PID 1960 wrote to memory of 2616 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 33 PID 1960 wrote to memory of 2616 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 33 PID 1960 wrote to memory of 2616 1960 30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe 33 PID 2616 wrote to memory of 2344 2616 iexplore.exe 34 PID 2616 wrote to memory of 2344 2616 iexplore.exe 34 PID 2616 wrote to memory of 2344 2616 iexplore.exe 34 PID 2616 wrote to memory of 2344 2616 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\crp73CA.exe/S /notray2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe-home -home2 -hie -hff -hgc -spff -et -channel 1623412⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.4shared.com/mp3/eWaW0U82/_-_scrubb.html?ref=downloadhelpererror2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7bdc41f7c8647063a1cefac4185c8c
SHA16f46e62d3a24da0ff5ac747dc03d8011cafab593
SHA256a9b593ae95b99713c8b707798f8adbc63e33fbdb34038951cf2f20b037bfbf10
SHA5126366cbe8668e41a7279bf6f16102b5cfc6bbae76e1afc936d788b19af6417bd96c8907b644fb373615ba3d33b3a5d45e63f82ca47c16e1943847c75faf1b8a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51044a16abc63c09c8082bf663319bae1
SHA1455a8f9aa5f47b82e6d96bee34cd2146bd32d42c
SHA2564d94c96f17a31b7b32b6fadc33ec9e02fb0d75b7ba3ba02a6d739f659f605343
SHA512f8ce93a18c1b0d8e7b61d0e50aaf1375ad80793d4b1d2e63e625ee9bcb2c7e4fb7e3b045615e28fdc0362a330d60361c322873dcf297f793a5c73d236036fca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63efb910ebe5a7268df03ac98960df4
SHA196b16c6792051f6e2f338a05fd8169a71fb2b104
SHA2567057e5797b234620aaab4fa9d1b042055c3152f8d08342a72f54659f8f441437
SHA512ef45ffe19666ef1da82160dbc534fa5db65e662fa40f7ee82766a3a94fdd3af9e43f0333863642f73540a1db3f4c700028a49b76848fa2b0ca24081fea9be726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b11e379dfbe0c28e619b8499e7926fc6
SHA199f5a0d166789106ccdc3196af669438905103df
SHA2560176c262302cd9ea9b31f378d9b47be302d240bb56de06e391ba34a30a10297e
SHA51256bba7dd7aeb80fe1a59edfe08f2a382dec532eecb1c6fded6c5ad74478e0cc82f649e8d4a97771b215a0bba6ac346faff8172f7551d3727e3196af4945fc4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8ff03d943d6c53add4a002080224d5
SHA1edf0a78a5b9265b92700d0c9511b0c56164ae2fb
SHA2562b042fb747ec1c236d4d4e9a5d8fae6a4864ef6bfcd9447780837b625d4cec83
SHA51216c8e054d59715c036ad978d75fcb03863b031dc327b84295df2f1c590e267f7bde41f489b60b9d19ad0a1ac3b4c9c0211d009ee115e957eafa05d55da652854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509774ad2a1c9a1dbbc21c7537f368044
SHA10c076526ed97d9b7396081aa6087e78e69d2187f
SHA25622419f7ffe9e4c2d294b50043b0fc6fa1a196da4cc7dd23fe1723cfa1f1396ee
SHA512e9b363d432900ae40cdf2861d722bd1285e4229b030c60d0870fbf1878f5b796115b491cbab0f2e25110e2b738d408ec295ea52ed6ee040a4fb2b9f4619ab0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58491ea7821a1f40d2542b4e8dd2cf4e9
SHA13528b61365cacfe69dfa4c1a9b23c5b94600f7e8
SHA25635ddeb4583e4666b07beff271745a580672f7023ec9433fa80a76c9026954f24
SHA512bff4bcbb4ca09ec0d6dae2b6debb3c5026c28f8a4a1349dee333eb0d22a7b1d937e19072410bf45966af78969811683b8ac956cc592f6bb9d504ec5c022c75c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550d5fbc793ba57c4ead6514533ea9599
SHA135ba04b160141bc546ff17e49cf16605fc60d72b
SHA256fe50c4cceb15f1d28c23190bb0a3e19cc78f34588007749b3ec0c7dbb5d30394
SHA51232697ec49f12b475484cacbb0fc863253f3cce68bc2ce9d9260204df928538279b061f3b4e169eedb59aeb7b539f3eec35f618a5bc37107a351c650f44682484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5ebbe2381512b7a7d54617fcc3ec97
SHA10995b4f975f60052cf6f713547007f1494b9d4f5
SHA25699b1b4a6b0cf99657ad990b5a6825e11fcd7bf970210d496ce123265e9ff23df
SHA5124881c537145b8787f339a08d152e65e8e73d5eda611d73e5fb67eabcbe3f243226dab54476b1d70d1c6bcc3cc3262b4cf57710c848af2af5308dfcc9415ec522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139605c0651038d1a6173c3fa29b970b
SHA1da659dbddfe19b8b0e3394b5b07954bd2226f33f
SHA256405363486a6bea56065ea279bd5d05846307177aaee8ba4262e0cc91eb558c65
SHA512911ca437751af0f931c77542e6aaae844dee16d712a0f836278f28ab00c43cd6563f9172e70140dd399795727ac98c11627f19c0b448e75abef3a95f0e37c877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a44d5c2031b148edbc5317b0c395d069
SHA18b0e9054b74cd108a471c9e8757564b831117ad9
SHA2563d3f2a1694dbc5b783f6ead81f96f4ebd4254a8aa4e96b87ab802e174707a230
SHA512c83aabdd0e19569a299a37afd9bcdbbfa8748d37e4a4d07753089b7419e78a28de71c3d9d9ba8e4f75a45469b999538d89ae149f0033a0596a6db76699ae261c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdad853d7cadb2f42bbfdef8583c739d
SHA1f61796bc1149e9cd22ee264b69a2551eab1303ea
SHA2567ac4a92bb2bbce2aa68e7fdf36d879654fc5cde7c20ea1c7c8e18e4de6000995
SHA51284a2f50a061173d45bc5f33cab7d6a88556f1efc99bef06f28977c5150a5f2721451d10dfdc5338ed04f06686a147661aec549cf3b0997388133eddcee70ef36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdf62f16bfe5ecbc0f541bdf2b20f0bf
SHA1c3e80a15d78e11b4e33565e3daf861cb5a1381dc
SHA256b3d1ee7b644d8a6dc1be42cfe9222ca0d7bc7c14549ff69d7be4b6867f01dbe5
SHA512e9d47f3442c9fd14716f5f8e1247504de38f075b396af717ae4cac28a44799d093cc6bdf531f993b11e2854676a1998e60f676f68d487ecb418cade9215ee47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58732cadf496aa78819fa6d9560a3f972
SHA1553d59b2887161e94b99ed18281a4e67839e4e85
SHA256de7ad2d7c16acc2f95dafb460825dfa0439f5b890042f7935424e15769cdbb62
SHA5122c488dd24d086f876fcd94df0a8f8f2650b2d307d72483d05254831f25dff5932cf9841da4b0be5adf5805d9a9822c20a5de14e26a2e58cf6a9cf1466ebd6880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d79f1cebe88e725803715ce7b90fc4cd
SHA1e51e0a762ca3626ec80b4ede0317eb659225daac
SHA2567ec50bf9c535ac6bb4327daaefa5e4191d2885f1e8077a9e826b82aed35819b7
SHA51233ccba9047e3ddcb058084ad8ef3728d596a93ecc3bfa6b1b4de664cf7e38b79cb32d63e6ecafd399c298ab481be0f8fd54844f3f5b2c6f84ca3639692529965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d16de93418dca15a6cf269fb59a48e3
SHA144f2fe0d8759fea45cffe2b4bbfc48070270da90
SHA256fe3b4016d0497f0ab38d79e7e028c5ca6691c2c81de2c3b267c815cae47df303
SHA512722026c1973280e1ac4edbd2721ba09005e6d40e8707ba0a643be20da1d2fdb6a2c87ac5bc234c089d878ae7b6eea9dca0a3aa5e159048bd29bbfebc50e47769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e6ff3101becd34062b4ebc17d15d6e
SHA199c4ccfb794ce36994e21265f1a9ffbb19620caa
SHA256509d80cc4e2e953d0234af2092c46b45b9ef10e918ab547dbb0af68b6dc92ae6
SHA51260ff827e22a222d012c35f5422713fc591ff05c1346dacd94ab922ab13b6d03b85e5e6334a92cb0aa4e54b75796d367e12a4bbbe7feeb410aaee66c54f886d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503891f235e9309aa3d327a6a5d21d1e2
SHA1e697aa617385c69758fb05be553afa1af9c08bc6
SHA256e058d8cbb25ce8915166611d5c9012d8c7241bfa4cf27f8dc293e7078588633d
SHA512edd986b1c3e289b45c452313eaefc7393eaec78433a8e1a3e1ed189bd5876bf814e82cab49f41c944cf3d0a13cd451867d8028d2a0c7cb60b7ae967f0145e553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9cd4c28329b03e12fbf6de12c33829
SHA191936e3d2b151daa1c1cdaee333946c4e53c7d1a
SHA2563a93047d0e1517cd56928b79c91fdbba2e68901c80d662b0de5ae13d0bdfee68
SHA512c621744948dc78d5db8142890703fda20f9829e453fb5594059977358774384725285839ede3bd0f7e449fb47236dfdc3c65543e0a4913e92f159046f656dfdf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
331KB
MD5a3e93460c26e27a69594dc44eb58e678
SHA1a615a8a12aa4e01c2197f4f0d78605a75979a048
SHA2563a81cefbc928fe136056257b8b57733164f2d1fa9d944dc02897b31b171335c6
SHA51239d17b7190f3ff5b3bc3170c8e21d7bba5c32c0f55bd372af2e848ff1ef1392083218a562f3361fdc2db95e4133a19c4ec1cab3e982174d76b8276358dac6530
-
Filesize
71B
MD54c41a6601c4ea610baa5af8a8409d427
SHA16bdab24df45c2d94aa8ab57cd51f810ef2038722
SHA256914bbee4b681362789f2ef19ef9aaaf6a5c95b33935040277a3e3d05392dcab1
SHA512e1e9687704eb58f54560dd209f6428232ce4aeb44dc21a3a12bd0800e6e6be8fef7eb4c4beef1d728fd524004fd015e91d1adbd82f271a1f574251a1dd7dec8b
-
Filesize
806KB
MD5661cf9c90eb099fb7b6a394dd8cde2e4
SHA13704e119ea16a3c336f63dc808176a22fbb8582a
SHA2561570e0efe0cb98623913d942cf40f2eb5b10458f49842097125c6d6d8604cd07
SHA51213c26a514c2022a10b42566a527ef98adaaa9932ffd07612ccdeb371888c037be3b429c956ecb7705699a2b6e3463758735332c9e26ea5f4493a91f30dfb4761