Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 00:49
Static task
static1
Behavioral task
behavioral1
Sample
549108522b64d96e48b21bcb01a98e67_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
549108522b64d96e48b21bcb01a98e67_JaffaCakes118.dll
-
Size
242KB
-
MD5
549108522b64d96e48b21bcb01a98e67
-
SHA1
f4c369c6607cd07f7becc8087115e6d62c68ee78
-
SHA256
505c8eb16c8eeddd9d59e9ec2c9c6423b0205cbccb786957527b80f1526c0e06
-
SHA512
053f5b49d3c5b8e5a9b1e9daf87a3e6fd891c3f64f2a147d655f037c3e5520b3a90843ad4e48e6a1526087d74bd7d6627d6fa623f34bc3f08a6b44a39f6bcaa3
-
SSDEEP
3072:ofkT2TeBXY1Au9EMS4dH5Yx0b/pZRM73kE/cxAdby09YvKd4xbn5pAhMArcu4LVW:SyM2KH5007BMAi1ZYvm4ZaQAp/BP
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3F91311-8CEA-11EF-B81F-6A951C293183} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435374462" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000802d7cf33db31c1cb6502adae5f5385c7b059cac6270e8a8b7b45e7175701819000000000e8000000002000020000000775cb5feeb6853227fbf9ab460f4b8042373aa18e58b68520582f3fb5b38f904200000006b5710f2f6a26a7740ff87c4d2e8fb7f52bb449aecc2811d4b9946ef439b15db400000000b4738f6f33669f985cc8062fddb9c13f9d3d3dfb3ac38cfb5b4d38b759afba075e40184713270c7db79d65ee590e45c911da1313e9b22195bf0b5b2d7002235 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0254bd3f720db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2504 rundll32.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2656 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2504 rundll32.exe 2504 rundll32.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe 2920 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3020 iexplore.exe 3004 ctfmon.exe 3004 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2504 2112 rundll32.exe 30 PID 2112 wrote to memory of 2504 2112 rundll32.exe 30 PID 2112 wrote to memory of 2504 2112 rundll32.exe 30 PID 2112 wrote to memory of 2504 2112 rundll32.exe 30 PID 2112 wrote to memory of 2504 2112 rundll32.exe 30 PID 2112 wrote to memory of 2504 2112 rundll32.exe 30 PID 2112 wrote to memory of 2504 2112 rundll32.exe 30 PID 2504 wrote to memory of 2684 2504 rundll32.exe 31 PID 2504 wrote to memory of 2684 2504 rundll32.exe 31 PID 2504 wrote to memory of 2684 2504 rundll32.exe 31 PID 2504 wrote to memory of 2684 2504 rundll32.exe 31 PID 2504 wrote to memory of 2920 2504 rundll32.exe 32 PID 2504 wrote to memory of 2920 2504 rundll32.exe 32 PID 2504 wrote to memory of 2920 2504 rundll32.exe 32 PID 2504 wrote to memory of 2920 2504 rundll32.exe 32 PID 2464 wrote to memory of 3004 2464 explorer.exe 34 PID 2464 wrote to memory of 3004 2464 explorer.exe 34 PID 2464 wrote to memory of 3004 2464 explorer.exe 34 PID 2504 wrote to memory of 2920 2504 rundll32.exe 32 PID 3020 wrote to memory of 2928 3020 iexplore.exe 36 PID 3020 wrote to memory of 2928 3020 iexplore.exe 36 PID 3020 wrote to memory of 2928 3020 iexplore.exe 36 PID 3020 wrote to memory of 2928 3020 iexplore.exe 36 PID 2504 wrote to memory of 2656 2504 rundll32.exe 37 PID 2504 wrote to memory of 2656 2504 rundll32.exe 37 PID 2504 wrote to memory of 2656 2504 rundll32.exe 37 PID 2504 wrote to memory of 2656 2504 rundll32.exe 37 PID 2504 wrote to memory of 2656 2504 rundll32.exe 37 PID 2504 wrote to memory of 3020 2504 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\549108522b64d96e48b21bcb01a98e67_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\549108522b64d96e48b21bcb01a98e67_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:3004
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e820ff0324071e08a1a2102dbc75796
SHA161e648a167fdc1eb24fc42e8239e3f7648a93265
SHA256566875266e7b94ff94742853776ecbfcc6985e870e216292bbfcc8aa29ac2226
SHA512825e76170446f48a1f2bd507ed2f33fbadafa6a5dd5a72f17bf34731a32088c1f99809e3c88bfdfbaa28a1efeab543df6b1d71a2be05edb6020c944c9c12c4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e4645b176879c7017f0ab30e5d2d22
SHA141398bd345e5eb32e253b37f1c83d750dea0da9d
SHA25632f1ccad91e284d4da8185abdf295e2a0b64dabf5c948ec6d5363d7f69ea5cad
SHA5123f171c31be60718505c0faa919f75a33c44d064ae66570142869f2a4ff5d9273af4727f6f61d09f277b41dc4c880fcd434035780081b7bf1ccbae39f8fa46dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5696613429e589e0e101aa2919b4adf
SHA1fea79d32ebfc73305e6c9a8997f1a5556d9e1183
SHA2566229f53b60f7719b8cb05e6ff663c624381f6ea9365fb83fd9e2924147027640
SHA51228093dcab9242cf0d6221fccb60526f7f34003fd730552e48dcd2b75308afe1bc8006e83164c504947d68cc5184d29f845a7e0129297ff4234306b77672be160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575462390bfbaba3c152090e893751696
SHA1cbd346237d3fd0021bbdb9cf38a296c1823e2d0b
SHA256688980903277d021207f064456964f7211efdf766e759add8e4ef782a41b395d
SHA512c2aede2f693c7b0812e447c37a0a4ab0cc9d6fa62ea680bbd1376e9a270240afe764a3babfc300f048749e633a042c61f7feeeb2c38d3b5e9fb8593115c9eabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56418cd070bf70b859188a9a90bdc8fda
SHA1fdc09134804544134fce5b7a44798cac430f8157
SHA256b4f8238b8bd8a046cc90b04a5834db6450159291b27f60e1220d1494bec38f63
SHA512c170a0e290c5fcea33c677bd85c5b76a4b2b65f68f5762ee2ec0849987ad02f0901e5f304f478841d9a6248785537b156ce3b70d60f5b409bf4193decad9cc83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fe4dcefbfa556b7ca7f20e7ed821f1
SHA1dc37a396402d93dadfb4afa6576d7d449596b5d9
SHA25669fcd8fd62a6165406ad761972ef506fef70ee0b93dd19446bdcbc668ecbdeae
SHA51292585955748eaf6ffad7cb9adf2a576d0c648f90ed2a98d2d284222cee58e99b5759701e54211ccb2bd79da66f5355aceaf1b71f972f5ba1e15bb72199959f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be4323d8de60feb84ff20d51d17e460a
SHA19e047e549b6137e9c277339126a2cecd0529bd50
SHA256c23bb3df2a4fe0cdc3009971fcd96ac5a468573ae8b747d5da1fc4178740b077
SHA5121d64c3ea1027137f57895dfa9517f99461d21fa9fa256615f9421290b5f061988b87b6d72a33986dc2ff1f0273b025c84aafc90f50473a336cd622f3165936ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585c4da9aa25d61ffcc904bdf24dacc06
SHA12a2b83665835cc5bcd0d09725bdc9aac6d3a0bdb
SHA256fe94d53599edc13123dd3b3e6678f2010052d74c5038264b798ae1886a07f3a1
SHA512e76acfdca19a863f5bca2fc20c2372bb1be7b2e343ee630ffc7f5104dcbc8ce714b2ae20d8c7075492bc1e5dc35ea32917cedc6054f030a30d58ea895f9355a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbbc615c7be4ac2ccb86334298924cf0
SHA1d36770dee2424e3e2310d88090cbafa6bc2267d5
SHA256156b98e08e08387f61700f16ef51dd6d34c852c2990c595cc9d095aa33eca687
SHA512065a328cd2e95cd3bd9bc047c943b532a1ab1afef64386a3325706cd4e2ceffd33948e990091e464ad75fed150694f3501cca4870a7df7cb985a34cd42368226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d0f6452fd68d85d150583d21a6efbd
SHA170391b18b2b04ea979ae7ea54e5d5514d2c54b99
SHA25611d054682d25050bce1b53cedec8e6b316c703b8d10cc1a5205f492fad0a4088
SHA512d6be91c7a076181db5af579960e8c87260370e19d0ac000c1b645020b3147f4ed9a83fb069065e9901ae15f41bb13408306bd33499dcc8d4f003772f19a115ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5001a1fe6c2a7360708a21ff6fba229f2
SHA1ae09555efeecda89af1fabf2f395448c0ceeb640
SHA2565728c9cb8bf8263d3df0c4c9121c8e21963491b049c86532b73e7ff882561607
SHA51295368eb34d40096b6f98a330c3665040351d498731fbba83e6338018d86eea719980ad07f0e4ad0a65fc9005af593b3b1737e1115901a58d5dcc84ac725d7be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581780820658710b9573321f59f545862
SHA138cb8b692c0c2c31018097475641ca66b7939623
SHA2562595357a6e3e366ffdb22b775cf80d45b3e781fb95608139916d8fd9ee6ec823
SHA51225609d3352eff62b7127d7e6f7f513be4831402673da458f60a130d39db8a2223f3ff73a97496a20ddf84cec5f5d8b074adccf622d14a9bdae5f714703bb7ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f0f8a879be6d2ad3484ae5f7a499dc
SHA1c5f1f0020a5dd03a990f67fb19069c39e7ab656e
SHA256881b68a1c879b0329962d2e95fa084a30e93f9e3983d8750ce17bcae92e5a389
SHA5128896ecaf06f4dcc7ef88d0c83e2f1f759f27b3b4c09e0dfb715a7fd1b76b25ede0874b6e05d55f0c0551adabc9f31c32b9910e50ecfff5f652f913c7dd36c97e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb8252fcccf56047796e93c75d50ae2
SHA1becedc776c8a675e03b0951fa944f281a77dec4e
SHA2565bc49b468709d2a0ca9dcd34a88a62f259323360f78622ffc45bc6d392b3c66c
SHA5128f3c8d6faf6285748caf2c676a01430d00f8997a0eb1f11e9574e5a9b4153755447e9fb3e6d78a9a2296ddefe1d9a1ab84bae79454c064c3c1a5751b63c6e787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc258623ea193f48f88f778ff6a4867
SHA1e3c969d05e7407c4f44217b04577a30ecc1f4232
SHA25621c41d8799c371d4a17f81c277fa1b56db6fc5532d55ab45d2878858a6851717
SHA5127e0a2cc8bfbfe2ec0cb06c71120c19c2d92dc5872992e850fec88a1d97888d793c4ed70d745d98ecca7173ca90de86965757a0e78de99270f5df3871957aca72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a691a5db5eca2651c6ffe6f5106435b2
SHA1123d9fcaa380dcc2fc227584e491ca00bd4a6131
SHA256e75302902e7f44f763e575aa478671ce80f74db89e5f53da79b91d5879a8504b
SHA5123f98c7f4bd167753b964de68b5dc7db59c5078b98052250d91741dcb26142089fe0293b60afba90d3716c16841b68a1d0728a5fdfe758726454d4209ee2d396c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbbebd119c36e981c6cd69a8c96f53dd
SHA10917f3364413277287c923bf4ad27f5901fb4c11
SHA256e451d1eacf93f500345506d046ce1152f90f1955941f89a6be6adea66977b246
SHA5129a18175c8534bd3a840f058b55bf5730663784da7c7711d475941d4057e8de0096882372258cd30282b642cbc48a503c11726740d3d192911e0f9e9bf13af90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5964fee32ee0ff2d9d8949f64a25993f6
SHA19e84cb6a5c3581b4056515c7a9bf440f3229bff8
SHA256fa55e69e326039a9c6fd86ec68767f62b1b56a8944c430565e715206713932c1
SHA512620fea2681ca3cef8bf9651e4757fa6c99a9c30f5a33a3d298e182b9eb288ccf4aca21f37aa26a8d6e39017b1580101ce17150e657ffb13bbd148dc43c6c55ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddab39a059baf10aa9919b81f71c22d9
SHA146e8b8d443291c8b31b76b154c74c43a92d0b033
SHA25661373344d39438f57f5bf91791de5b9378070e0c17149eb8cd696e3fac61bf93
SHA51243a0dd97aa72dda57c9582ac7237ad7d04b12ba70afd1c91cf9181daa68f59a321b1389b6a3605ff572208b513bff467bf8b43ff513e0e83a9917ba5be4dc160
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b