Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe
-
Size
88KB
-
MD5
96d16b762b7e4756b2f247d17bb7ca75
-
SHA1
729e1b50f0553ff9561d2d1f371a8098f608ff7f
-
SHA256
cf2e5eeb77c12e52ad4002ac3c8a1818ebffc33905fe35d478dc3763998af19e
-
SHA512
7c94acce6b4f89d633ab6ac14608eaa3a78d555988f0ae42f2a83590994a30c166e6bd8f3e3919b822043c6d05bafc10a1f212d8925a9251b779e5f75552c887
-
SSDEEP
1536:1sR4bLpomzU97oIG9LGchbTbuxskRgepLN9I4BtChf/d:wiomzU97eSc1TbsscgmZ9J4hf
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1240 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe 1796 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2408 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe 1240 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe -
resource yara_rule behavioral1/files/0x0009000000016c66-19.dat upx behavioral1/memory/1796-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1796-23-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1796-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1240-9-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxBA69.tmp 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64BF2011-AA9C-11EF-AF8F-6EC443A7582C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438639283" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1796 DesktopLayer.exe 1796 DesktopLayer.exe 1796 DesktopLayer.exe 1796 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1240 2408 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe 30 PID 2408 wrote to memory of 1240 2408 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe 30 PID 2408 wrote to memory of 1240 2408 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe 30 PID 2408 wrote to memory of 1240 2408 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe 30 PID 1240 wrote to memory of 1796 1240 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe 31 PID 1240 wrote to memory of 1796 1240 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe 31 PID 1240 wrote to memory of 1796 1240 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe 31 PID 1240 wrote to memory of 1796 1240 96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe 31 PID 1796 wrote to memory of 1740 1796 DesktopLayer.exe 32 PID 1796 wrote to memory of 1740 1796 DesktopLayer.exe 32 PID 1796 wrote to memory of 1740 1796 DesktopLayer.exe 32 PID 1796 wrote to memory of 1740 1796 DesktopLayer.exe 32 PID 1740 wrote to memory of 2472 1740 iexplore.exe 33 PID 1740 wrote to memory of 2472 1740 iexplore.exe 33 PID 1740 wrote to memory of 2472 1740 iexplore.exe 33 PID 1740 wrote to memory of 2472 1740 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exeC:\Users\Admin\AppData\Local\Temp\96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b210e03de1447eb1fb1a412bca4438
SHA1f79d8a8a3809c53d72d8d7193ee13a2f4949ee6d
SHA256b22e0efdcced52c44782042e9acd94fe0632ab4f035e8b68bde0c645c5796953
SHA512c50b9fa8a0b43e4b71909ed9ed5bb8c9e0bc145e5b2bc1a15da4ff70b6a2b02085c9a618b3a67c16c9e3e114838bb5d4fe3c66f59901fa223163a092320398c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5664b3d35a5cb613882e8f44ce35ad
SHA1be0d181970cd036ac08436d59348e7da70fa0eac
SHA25673c6dab050731add615a18cbf8740d969acae0a99c197ba8feb3fe0399df7e33
SHA51247eb1327d380ba6d59d09284227c38654796ca0d06aad8f90ec2247dae936ed1116766e4b83c876e7900c271ae41fb4432a26a35397c89bbdc918c20df8b0897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edeaabea65e606cc50be07b31c0735d0
SHA1125e1e71568c579f6cd7f4ecc1b7dc36b9e93d9f
SHA256b7354a6e7cdb7637f928199c5f193019d8b7f394fc187d724f97c996ee7d0c2b
SHA512919f009ec3074c1e5a74881d6e3640c9324a4b0edfeb69149a49911b77ab5b11fedbab10287deb0df79adb6288aed3e20f87fb953c6bff94a3d6b4a14b8da420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1600878980d690c7f70c66f372e001
SHA1993936f2f3e813a38c02026f310864705722a542
SHA2566b7e55c9505b1e7c5abf210c24b4e36587db6a5c66f8c9b1df127444f1441f09
SHA512178407150ba59bb599efe6140f72c4576f81a8af2a24c1da28d25df36e54a5c6378c605810f89ca59278679948ab80a5851763054d6b689e9f02c7a56e5e3dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f528cac18e082a38d742d53f99971af1
SHA144c06c25c4d160a41c9d5ca71017da0514fdf3f8
SHA2563f58cea029ba640b8a52fcbf901245b4f5e161641f3203627c56f146554b5315
SHA5122c9292f53ee3d3e644fb5632409022916a9f0067e95f16951a9818db860079945533708cf1e58e9bb20963fc1ecb99b0aa07cb7d50cce7db14ac2f4919f6d48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3ca685f38f5de135a3794997affdc8
SHA1ffc077d3863f68a4b759dad4cf499b68db4fc73c
SHA256392df52635ce87624abfea20ff54a899653dc49e671bc95238cfa53b8f354843
SHA512cab6a88708c6b9897eff6d743858877f46c2bc8b84503106ce8143d0c3de53c9b0531c7abf38642ca7b2d18e965b5f3f3d51aef3f22c13af0c40a1225f6f77c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a49ac69bc47f8dd56c568dea19f558
SHA12a1a2c536347df3c619054a18f8a4bf3e2eb886d
SHA2568d5998548d01562e205d2d2351565abb3ca2459c4f303782c7f0978a2dba3be2
SHA5122037f29590fa7fc06f859c3aacbfe6442542f33aacdf8399240554a545147980039be7b91da7e12d42ba85c7075b76670e48a1e719db16b929afe7b66b47446f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5018f0ea921b4747130ac34dd3249e650
SHA1f47010316bb60fd395755597a207796fcf7a306f
SHA256555213fd0978ba430183363294cf01f0f6e94284b9c32b9ebbf4d3d3f4eb8378
SHA512f845c4f23f1219b73d6fa7a1e3d588eb58339189ea25607b27e103de1e50bc0fa0866c73281aab7914f5ba29d77a7aa2a3638ebe1c4e49659c54b89eef875d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad414ba5f923d830b0b235b5022b40f3
SHA1ef80efcf1506f4f55ae5b0ba34bf91e24d62d5ec
SHA2563713060270282d9dd0a91d5160b986e9cc379907e15ee6dc9d601046a86dc6d9
SHA5121afc794dad8572a7bd1c87c678ae6f7732156f444bc85413d2ffaf8c630b061420ac27ae666e309f30f3de183284f0626e29635e6a88cbd87886a5021fcb6a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b38bb5442341c355fc1aedd5676ec5a7
SHA1f2eed0bd4e25c8921cb51ee3e60594a0e0f219bf
SHA256f38474a12e1f266db756e85f22f6631a93d825cf5719e7636e2ec18ae0414a25
SHA5129d3ef477b87a13536f136158f94f0c63e893675210402ee7d614a45b325566180414488904e685aeb7dbfe856c66ffbb02ba6c03af39f9daf99ee39592a46385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43fdb05dc1cb7341b49c01a322fa039
SHA178619101e0d0e80535e3f42362f01f327926da54
SHA25618cb2ef22e215d90e5b0a37d40c5e668df0d02ee8d9c4bb4056b47fd8759fd63
SHA512ce6312aad8f9ca0bc1ab846dd9f277551eabf98838888f05edb43deeb5940119065b9be80dc87eeef32869108cb946a0c75220a410e19f045785ad5e819ab6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1391456ab59792125b0715a64e3aa82
SHA1d9915757ca7cc719ba646f173613536a04ccb049
SHA256a33377be7c5d9197895ae968c89d43443214606bebbcfcd1fa1b3c832c11d52f
SHA512476ce088b5bf3d0a00861d485c43dd0b5939f5a0ac81e82df151015410e064903922eb634719208adc2bd12f88f95c0a1c95cef468d95f1b5e4fa1e08d4b8d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589616f8afd370f18fdd5d62a118aa684
SHA1203e2c6ab38a4d52f66fbb8ddcc3f85c8bf48867
SHA2561c549a838e6fc7a9bdd849649fead2b18a438693da9ccb91404b4818195954c9
SHA512dc05f544528363f37686f5b7e7905908e9189afe191bf60c7f0a8e73bd62bfb34e0fd9e51da8b61187a5b52b3283a63a31c1b1e621348f5c6fd79d2374a752bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5373756ee7ce370bccd955fe05d91c147
SHA11c12d96a2ebf6e52a2b3dbd21c86469d6d299714
SHA256ecb2e107784945d94577a37d77f1a9179cc18a9f87fc0c44c5daa4379aea0b0a
SHA512017f52f6a9f697b9463311d8453ee3275f13a4abb28d855aa83a31f9f5feb9b8ae0244b3fd6677a1b60ffad1e09880624cd70c047e785341230efdb84bde4346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6914b8f397415403140c639a73bc1e1
SHA1054082a967598d541004c50d6087500b22bcc33f
SHA256edd0e7a0c0c7d51f49fc4bb81d08fcfedf8f797399dfeeac5dc90f22e0325bfc
SHA512d3ee31d643de946d26762412769f480ccc555ca203e1e7cd67c61f3da5822cf9d7a6d81d5d098999e6eb6da7c2bd7ce60c21dbfba4c2b89f6eecb74623f45b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fb49dadd96c600fdf29c353f8ce9ac
SHA16413f49975cabfb07ee166477ffdf44878d5c4ff
SHA2564a3bf19a3fcde2c587ab7c70ee740a92fdb0d8e4603bd7fc304d2c616972ec0b
SHA5123612f8084a0e3dacf07ea3f1baa0d66b96ad694efdcf5732b3adf29fc0d8f226bf142d170f51ab18bca4eb9dfe89bb7d5b200fa4f2c0a6f820c957c8c7532a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57994e61daca32b883ceaf6d50f933116
SHA1b7690c5a36512e8603bda75c8ba09f47a73e26bd
SHA256e61b7a62bee0c2ce00ca135361bb066630b53c533de3ae6408dc94559b8fb2b6
SHA512682f0255da54519fc675ff89efe2071502608ae0b14078298c81d9ade4d5112d38d4ff00081dc8dd2c09d01e3c8019b5a2adf11ebb0afdba7ab7c894ac685e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e2c9cc3159ac664b6bac47fe8c77eb1
SHA1dc540acdc1a4684ab1af2b0611a812961eb6bbbf
SHA25688b053dbdf4eddd734dd69cbbc56bf1cd93944f793b4a383dc0eea609ef860d2
SHA5129ab14c47b8655f7b8d0ac483a88c27fba8147c79b44444b3f59a21a5e62a3af34dca1320f7d6be42e6f5cfc4b6a2e3c72c405903cd20cd13e5b4a83c4fa628c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329896ad8bde5763585bcaf12ae31079
SHA1cfc275592f81b59d05c133c22f6f491bbe647476
SHA2561df07e454898220c91c7896ef6cd618029a358d2f736f014ab6d8cf5434b7f74
SHA51299991a17674828624684afcfd8148de662e826e764c87c8653547f1d4ab0f7b4e6608cdaef305ea35211361ac1621b356a7d02863d24aeedca4cc8110c42b18a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b