Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
5ddeb9d68b02871cb6cc2eec6a05a9dc
-
SHA1
6aa8e62f9c14616c9440c3f3cadbcf29b575364b
-
SHA256
249302da00ebf44fda53d5441bf6d41ca5da11c6536f473d531cd7159ac852aa
-
SHA512
2b6634fc6c71837f0674e3e8bb066fdb377468301d37c6ff60cf36160b9d2ffed87c4d115ed6c509935de75aa6b78b019560dd6dcfa50fc70bc2fdbdabbd0435
-
SSDEEP
24576:/tTpSpm0+6GDKXKRTBNlhPsSKLZvWE2BnPGtiji3kv5Qua:VT0F1wTuSaZeE2JGiji0hQn
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x000900000001747b-20.dat family_ardamax -
Executes dropped EXE 2 IoCs
Processes:
explore.exeKOX.exepid Process 2940 explore.exe 844 KOX.exe -
Loads dropped DLL 4 IoCs
Processes:
explore.exeKOX.exeIEXPLORE.EXEpid Process 2940 explore.exe 844 KOX.exe 2940 explore.exe 2964 IEXPLORE.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
KOX.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\KOX Start = "C:\\Windows\\SysWOW64\\YSKIKU\\KOX.exe" KOX.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 9 IoCs
Processes:
KOX.exeexplore.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\YSKIKU\ KOX.exe File created C:\Windows\SysWOW64\YSKIKU\Web_Oct_19_2024__17_46_27.html KOX.exe File created C:\Windows\SysWOW64\YSKIKU\KOX.004 explore.exe File created C:\Windows\SysWOW64\YSKIKU\KOX.001 explore.exe File created C:\Windows\SysWOW64\YSKIKU\AKV.exe explore.exe File opened for modification C:\Windows\SysWOW64\YSKIKU\KOX.006 KOX.exe File created C:\Windows\SysWOW64\YSKIKU\KOX.002 explore.exe File created C:\Windows\SysWOW64\YSKIKU\KOX.exe explore.exe File created C:\Windows\SysWOW64\YSKIKU\KOX.006 KOX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
explore.exeKOX.exeIEXPLORE.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KOX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435521853" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FDF60D1-8E42-11EF-AE26-F245C6AC432F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d156e44e22db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000001bf6cf9491fa71b286155bb9845f11c7acbd0f23d16643160545e70ece44e6a5000000000e8000000002000020000000160da9578f2e43f836b7af8cc6df31c99841f633c2377a9457a0e3d93316f10f200000001d5c263ba06cf20bc5cbcfee01157ea60903469f5585e1a4e5ff018e00c0363240000000b3f7c1055b06241f7b2fc2b11059289a0a4d6ac5d480f031a584c0e0771c5d11f69ffb804f9b5ba3f040c11559d32ac62e37480ee41057ee597ad0477fbd8a28 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000027082bd1e88ca1b99f84a8f437e874961ade9b1394a37ad598498b4383d59217000000000e800000000200002000000094d3a16c5b5833acc800b58886a4939e679b03caee087160ce136d8bc356411f900000002d75ccf5e471f5ae5069cff25f9c0a270f4565cdb45e2f557b8d9c69c396f56455350d3556f8f1db40fd8e724df7bec2684affd0284b4f8d9a3454e8947efdd07a11d04aea99b4b3c67f19ba4651faef56aedfa8a5aa103f9b2a1683b3f2046eae3939b67ea12dd931aa858429af21345c386d1494d875efd88a3152123d8fe6c0adf69658a195b16fbeca2ed426f8d7400000003267b8cedea61ec2abde3926eb97b4a02216b572de758647760387869983cabed7c90c6ff798ed484c0700c2fed53163f81fcc9e33cb46dd1bee74fbe38f5adc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
KOX.exepid Process 844 KOX.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
KOX.exedescription pid Process Token: 33 844 KOX.exe Token: SeIncBasePriorityPrivilege 844 KOX.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid Process 1624 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
KOX.exeiexplore.exeIEXPLORE.EXEpid Process 844 KOX.exe 844 KOX.exe 844 KOX.exe 844 KOX.exe 1624 iexplore.exe 1624 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exeexplore.exeiexplore.exedescription pid Process procid_target PID 1960 wrote to memory of 2940 1960 5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2940 1960 5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2940 1960 5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2940 1960 5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe 30 PID 2940 wrote to memory of 844 2940 explore.exe 31 PID 2940 wrote to memory of 844 2940 explore.exe 31 PID 2940 wrote to memory of 844 2940 explore.exe 31 PID 2940 wrote to memory of 844 2940 explore.exe 31 PID 2940 wrote to memory of 1624 2940 explore.exe 32 PID 2940 wrote to memory of 1624 2940 explore.exe 32 PID 2940 wrote to memory of 1624 2940 explore.exe 32 PID 2940 wrote to memory of 1624 2940 explore.exe 32 PID 1624 wrote to memory of 2964 1624 iexplore.exe 33 PID 1624 wrote to memory of 2964 1624 iexplore.exe 33 PID 1624 wrote to memory of 2964 1624 iexplore.exe 33 PID 1624 wrote to memory of 2964 1624 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\explore.exe"C:\Users\Admin\AppData\Local\Temp\explore.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\YSKIKU\KOX.exe"C:\Windows\system32\YSKIKU\KOX.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:844
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\google_transparent.gif3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55675bfc08876a94f49f22290f26feeba
SHA12f247e04b6706fec3b1c828890d957a1d0b449e0
SHA256437079497b662dca971a6ece71a031b20beec0d87b05a846c2a434c18cd54f9f
SHA512296dee1c1c96f58fe694d45fd287275cadb891a24a2ea976183be6f5a469ec19043644243bde36780998547558a9d1c625f00edda50aa8660de448be5d43b58c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512daa7548d961ce293f4137481acc371
SHA156a2088b3221cca6254427611a41ae90878aeaa5
SHA2564937892e2436974fdd3b3a912737dfbd336e60d3cf71de37a5e10ef186dd7abc
SHA512c04a5224a49ad8b389fa6032234641e3cdbb0e0cac1f74604977fc8f58997efcd085ff9632b5e409008c743d57a6317871882b78ca18e675b5b49294e60f3d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd9d744061bacc824fedbb7c50b349c
SHA1cd53b36bd2ce668b4091777295690321a14ca301
SHA256dcf357ebf5203068e73aed7c2e7d4403ad8b49a4e8f4bdda30e9d6602e45b3fa
SHA5121f8ca91e29aff26c5c5ea3fa95178b6acc22d3c073284c3dc4fa193d1333d60bfda22cad9538135002f6041f8532fab1af1eaafc7acccc91e07d2f9ce904881f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e53e6db1e51748e8358e8ed716be58f4
SHA13ece4a92f3a3f0a39f0d50e61204ab4b887d92fb
SHA256d2151c825b413c86fd361f641ad95879f50987af44da72fc3335ffdd824d6883
SHA512f7cd026b7c0612018561209609e82b992e7043fdd79f01f473b5667513c93342e037e3cfd23ebd508d6ea7ec6ee0eb345dbd4b324f851558c836a2c47fd2acd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cbea02505ea4b27d0c75ee751357de3
SHA18ebc4f9a7af77b63069ab15ffcbfa299ada9141a
SHA256d07d0ceb3c3a7336f375d51b175eac0071f44a07145139f85bbcf4edfbc9ff1e
SHA51229dce48de3bbad96b8c345813bb55bf52809fc4f4f7e2835728322f2b6f905e4db37ab20d8779d11a9fc177f84e2c81fc83ef4d67544680cf700969f52c909c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5a141f723458d00282b032aec91a8a6
SHA1a1dba4b451f796446d1bfd2683e042d437436a3a
SHA256f0116aea06a63271d7acf5e45c4109b5690a9b33778963a62d96bb560d66ba6c
SHA512b1de7e9ba117cf4c5dfc330bd6f9060c3f7af534fbbc41d1783ca177a33ff81a24cbe090ee420a405d0d681cba7b703f8b0b3d33547e1effe4f7e7e03b48d004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524c6aa95fd9ff6a1c15148820f99c47b
SHA10c06e09d966f838a455d6f85c18d0e5735f372bf
SHA2563558aedbb1da470fd55742a64c79816458c64be7e7298091d4b5d29d5608f7aa
SHA51200a772be95771d4078b8602961eb4f992d7c345e88ec3641f88333db52dc0876263f6b130355f2eae8e675c8eb5a2c9bf427e16b4ce56ad81ae0a97d6b51d6ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524e591c086476ae99b42a5d77e160600
SHA17ec89b8743e1075babddb3b76c1a8235fa51a2c2
SHA256dd1e4fc5feab5c4ba9817e5af031682dc8f3009032286a209b503f6ea67580b6
SHA512dc18a8655422d8a86988fb3ce3aab1f52bbe8fbe85d427778e8e8354adcc42bccae83068b8b3937b4276ef5a784d8023a508ddc9b0c161a8cb12f50085ee0339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4aa4998d2662edffb35c582c77f264b
SHA1ad2695eb2773dd1c55139c4987c2ddc69e967210
SHA256987382497dda13ef35a06d88c35a46923ed11781050062f31dd60ea03f43cc81
SHA512e7519016c7e788aa7584d99fd94623406fa99690f0e17f24ed197eba471a32c9030eba1e091c62137f35fb6cdd54be40509217256ddc196db9aaaa5017478d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b55eb42e4426ced606377abaa4c0acc
SHA15c1ce09cb57dd2c170bd64fe031ba3ac2fbcee13
SHA256e7ddc25d9121c1d305926ac8b49ceb6b7081d2419948896eea5c6fd10dcc5479
SHA512b2be8a039dd4e01f88f868be15f9a4c17ac641100c8668050b816dacc33691a93d0577a0bf918631d47f9553c8544f8e9280b0376becf572e0d65448b0afe646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ddc5472d91218f8f9b25efb4a902b69
SHA1224e521f043cf758944cddc764061abd78b4d9ae
SHA2563ac36297f4a50901ff06933c985925c707a51535877f0c030aae8d0a24a66334
SHA512ba0e1db2a82f519890c025aaa09c64095d8ecda7c1da3e8af706c167502d3a5cbd1f3cde7706d4cbf3e21f57340ee55b24778657ce70b90af71b14c4166e9996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a119c2cecefbce0615dd1cdda0a838a
SHA1b423b4e38ca5ba04f1f66ee7a371929dd20466cf
SHA256a84ddce4de5e763fefd3b2135081de1fe863dcb8af4b740f5993b0dc58a1c310
SHA512f929e12761e6fc36e352abdbcafe75be6ad055394f897d2eb357cc4df73f137f194c14203cb57e77ec2d6314dc2a349d0f958329aff0f65d0e6044c3c62b4360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503dd43a34dec352794991879902c4149
SHA1a409bc1a40619e1838d52d90ab8cf14b5ea64215
SHA2562b97882757d4042d287159d884be102fb1520b9faba4afdfba80b15d53fbda80
SHA512d514357859ec0b03c0e6de2038b45a2ca7131742d03822a25c42784977d7f23d23b18a74066ef84ded36c6cdcba721a1b4159672d126a19c6ea60fc26674986f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbab0f512906c489cf3cb64e26ac39ba
SHA1af3a6a1b0d55d017718c09df4ccdcc69034c88da
SHA25661a9ef74d75288785f197cee0ca319998f191eb0b6b92b79b4c61f53781ae024
SHA51237b0ea4d9df2c730113b95282ce81e80f7dcbb8d114b4193e6d490e8b58ee01a111120f53ec56c29b8c8d493dcfdc04949ca8f2b9c0c2cf77e1cc3b367da7d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9dbb4361c655c8646a9f7fb44830f0
SHA1689f1390ca325cfaa3697baa5e418c11c0248029
SHA256739d3a6c7871419a4771fc93a311d62c16af4171a509293cead6853df4c4a64e
SHA512e7da80f019667734cc7b7ac6e35281bf9f4949b86562c67172a715cc8262ab0ea53086d6c36383230a1322155ccbcd9179638f904287e3bcf48417f8d50c087e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b12915e491ce937da2529edfd23d38
SHA130d447476e46b4a6e09e61b33f490cc9c0e175c8
SHA256d2a99810bbab8a132b72bbf225bffb60799180d9f6c29e062c88ec7bf086ad53
SHA512ea6e160e8a18ff63e4ce5615c99742110089d5276b19ca3364dd80fdce211a7783aa45a5ba380a759126b907aa562b14668cd5a9868ddadddfcc34692c838789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a856b726bac1ed7efe16741fe2263815
SHA1287d3a389c89bdeaecfd21e3f3b4e4f2a4819169
SHA25641082e8787feeaa39a930424b4e1d26c10f2760e0c9a66ea16d6a00c3c3b9a1c
SHA512ebc12ab84f7a6c0f3021bb1d34fefaf8fff7883a4830fe5f1e41354ac3a58f7e236ebf2c0efbe5e8aba20dcc3c6e417982f7c61671c74cb56c3b408333e39053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f04386df0b9d12e3852816f6e498240b
SHA1df0ba8c30672df3ed6cd221f3568478224e533e8
SHA256071427ec17d412939129245799c2de98a11372a76a76facc380a6996a0c9a08d
SHA51278e5e469d51fbd53ae92d2f00dcddfae6ea9155ed03cbc1ee44fedbea73b8a0986eaaca43c509ea97fd906c6f6325865573144764fd26dc6d7b36de15464b601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b998080a8bf9fdf3f8806134abb3bbaf
SHA1cafef3d66eda9c0796be8dc6df42115a7f4c7d26
SHA25652927d2c1ae66180d59cb217684c91e198b5f03205f9e2727219e899babf431c
SHA512928dc067f8be9a26226d2fb693f633ff5a25922676a5fdf0b64f9b07c8ea5d3f15b65c2df6f5ed9af773c150c65ed405af030e6509cf6d89f5401d05cf0e330c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.2MB
MD52fd30798987ce0f50d4878c6345b2e79
SHA1fdeb2f45da823345391a51c6007623ab119f487b
SHA256cbf4779ccc484c0335137024b8a5e6670516db2e5da454818c5329919c434142
SHA512f6a978f42c15063aee0022364a9ee3cc495fac879c54b8ffa5d104f93c174d05b5a5facc8346ef781f868f78b7a44a6ed06fe847e51d7f60bca3a80f9b9ef148
-
Filesize
1KB
MD526480db25dd9bdca4e51cec6353a58f2
SHA1b9582b76a53371bda0e5404dfdd708b1a5d7c5cb
SHA2564f3709a793e0938efdf67da9f184c1cffda07f5553f0e4ca8cf41b2de65c67b2
SHA512d0128611b814a6bf65abbee5c28a5a1151f629020b520b83c85830a5a568c95c0e0d3a5cd145040ee7855114a5f348c2de6895df591b1175ed9b2ba55919bc05
-
Filesize
456KB
MD551507d91d43683b9c4b8fafeb4d888f8
SHA1ead2f68338da7af4720378cd46133589fc9405ba
SHA25671b3aecefd36e4855a369019ac5871c544d39f8889d23cd455466a24cdecce6b
SHA512a5a7ff3f8ffb72719b7e2c9dc2719c99ea32bd68994918ea027c0d7d54cfe0c80bfd34486dd8d3cdd390376bc4c8d1f7d97de4b98b7d39a3e10c3e2682c07d1c
-
Filesize
61KB
MD5383d5f5d4240d590e7dec3f7312a4ac7
SHA1f6bcade8d37afb80cf52a89b3e84683f4643fbce
SHA2567e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422
SHA512e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a
-
Filesize
43KB
MD593df156c4bd9d7341f4c4a4847616a69
SHA1c7663b32c3c8e247bc16b51aff87b45484652dc1
SHA256e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e
SHA512ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35
-
Filesize
1KB
MD562000c3c0c763b032a13bfd240c9b449
SHA1149b03cac928398795f3152ce03e82c284f390f3
SHA256db2b5bd4e4cb02e15b2eda82ff815569f4fa42516bc3ee6e5e9036529e0966db
SHA51259c767ca518099b765caefaeca93e5706332f2511db93e976908bf806707f424ef0de9cafb61afcb0107264d3d06cac83751831a3f6b8ad2c82fe44c0f9a632a
-
Filesize
1.7MB
MD53cd29c0df98a7aeb69a9692843ca3edb
SHA17c86aea093f1979d18901bd1b89a2b02a60ac3e2
SHA2565a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32
SHA512e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9
-
Filesize
331B
MD5e2a9dfd628996b542ce226dfe0fabd86
SHA1f371054567a0c3001bbda44f1c0969562b0c7311
SHA2561f31b5e63b7b4211bc3fcd45e15553fd99cc9f9731f69978d99c4d4ee27e5d8d
SHA5125a4e1d71eb678ce8b8fc18cd284b01d916bb7936793c88d33ee73511c34a99930784d32cc301911d260d6a038e5c860d2a2dad58fb7e06dac1076310889f413c