Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 19:52
Behavioral task
behavioral1
Sample
c4210a26cc355b64ed5734df960b2b78_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
c4210a26cc355b64ed5734df960b2b78_JaffaCakes118.dll
-
Size
209KB
-
MD5
c4210a26cc355b64ed5734df960b2b78
-
SHA1
d0716e4ee39e2caefc5844b35143a4d7e38ae4ec
-
SHA256
838d2f9aa24bb10a81b1d750e116c443100f2be1093fc138e31621fd5911c460
-
SHA512
f000f29368d3c77c14c901573995b05b3b252134af1a16c01e32e1bfb3d35195f1d220f380f7bf887851495c001d3b56dd86895ef608dac9e43f32f0da777f43
-
SSDEEP
6144:T/q32rRjPhKuDkkLjp+ScgBKozpJ1XVSGuRq9M:myR9rIMHZBKI/XV2M
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/1736-2-0x0000000000120000-0x0000000000172000-memory.dmp upx behavioral1/memory/2320-8-0x0000000000A50000-0x0000000000AA2000-memory.dmp upx behavioral1/memory/2716-11-0x0000000000390000-0x00000000003E2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CDBCB71-B279-11EF-869D-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d1855a5ccfcc09448612285b6e49ae90000000000200000000001066000000010000200000006cc8ac85531293cc7dd76030d88c4f098a0879ebd9901d533b15b2e8defd69da000000000e800000000200002000000006a3e336e146048bd22a649b3f50909a776fabf9f0174882ba2a6f0841b2745920000000182d0fdaddb5580241d9e8739a4d1b83a6b02c92431ddcd5185d5927cfb79bc440000000153ff6b73b530c10efcff87ae3764f1dabc9b00ede0477d9b575aa615e7b414c134bb1a95e6b17436e58ed264497641d7d1f9bc995824ae95f920916e15e3905 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0090cb3b8646db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439503847" iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1736 rundll32.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2716 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 1736 rundll32.exe 1736 rundll32.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe 2320 notepad.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2068 iexplore.exe 2068 iexplore.exe 2068 iexplore.exe 2068 iexplore.exe 2068 iexplore.exe 2068 iexplore.exe 2068 iexplore.exe 2068 iexplore.exe 2336 ctfmon.exe 2336 ctfmon.exe 2336 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1736 2512 rundll32.exe 30 PID 2512 wrote to memory of 1736 2512 rundll32.exe 30 PID 2512 wrote to memory of 1736 2512 rundll32.exe 30 PID 2512 wrote to memory of 1736 2512 rundll32.exe 30 PID 2512 wrote to memory of 1736 2512 rundll32.exe 30 PID 2512 wrote to memory of 1736 2512 rundll32.exe 30 PID 2512 wrote to memory of 1736 2512 rundll32.exe 30 PID 1736 wrote to memory of 2172 1736 rundll32.exe 31 PID 1736 wrote to memory of 2172 1736 rundll32.exe 31 PID 1736 wrote to memory of 2172 1736 rundll32.exe 31 PID 1736 wrote to memory of 2172 1736 rundll32.exe 31 PID 1736 wrote to memory of 2320 1736 rundll32.exe 32 PID 1736 wrote to memory of 2320 1736 rundll32.exe 32 PID 1736 wrote to memory of 2320 1736 rundll32.exe 32 PID 1736 wrote to memory of 2320 1736 rundll32.exe 32 PID 2548 wrote to memory of 2336 2548 explorer.exe 34 PID 2548 wrote to memory of 2336 2548 explorer.exe 34 PID 2548 wrote to memory of 2336 2548 explorer.exe 34 PID 1736 wrote to memory of 2320 1736 rundll32.exe 32 PID 2068 wrote to memory of 2316 2068 iexplore.exe 36 PID 2068 wrote to memory of 2316 2068 iexplore.exe 36 PID 2068 wrote to memory of 2316 2068 iexplore.exe 36 PID 2068 wrote to memory of 2316 2068 iexplore.exe 36 PID 1736 wrote to memory of 2716 1736 rundll32.exe 37 PID 1736 wrote to memory of 2716 1736 rundll32.exe 37 PID 1736 wrote to memory of 2716 1736 rundll32.exe 37 PID 1736 wrote to memory of 2716 1736 rundll32.exe 37 PID 1736 wrote to memory of 2716 1736 rundll32.exe 37 PID 1736 wrote to memory of 2068 1736 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c4210a26cc355b64ed5734df960b2b78_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c4210a26cc355b64ed5734df960b2b78_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2336
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5321705bdf1e55fb046bd4bf528a80942
SHA1a84c719839474886fc9fae64a48232c79d80fc2e
SHA256a99ab9a04ec0e900baa6f069fafda75f7bf93f530822195d992e129537f98ca9
SHA51241e364be4aa26c0efbf0bc2a3caf0db718961acad2102eacdeaa03c875746a1b5e3eac67527168b6855f47109a22e16260c3061e9583af6e18d7b45002af5203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626706e4e9bfbb085e53acccbc16c49e
SHA146aefc035146fc386b333677a1983b9289fe8a8b
SHA25654196431355888c149a0514eefd994fda926ce6f5556094ef8ad58e462f155e5
SHA5126f6a91e835bb7f68c3b6302b9aa3add6a75ce817b88ed4b776cd8e0fc254ca240ffe973ec3a76b43d82f1257f9b2cefc1637299862d608a039a244ea91b0cebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc5daa0b879f0802e672e2a47c4ce79
SHA1cc7d6ca97aeb909e7277c6e9ad27b9268994ac0c
SHA256402371628e5b7bc44e1a702685743824aea267755ed0afc9f8f2171920b0a031
SHA5121b04a86cef7ef4b50d63fef9870340963b38d3ee8a7b6d6e8e05ed80694a56a6098018e86aeb36ab8bef1bf5901d6875d70b17ff9cb766f42c9b80aa19b8ccd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5628ad10fc34e85e5e8900fb47af8d066
SHA109e2e40dfc60952ecfb3335f198b0fc29ec93e13
SHA2560c827606bbdedcb10397f2ed5fa967b3d2f0b45456df5b83e90ead4d0905c8f2
SHA51284a70eb858b1e11ce49b89c03b544cbe06fac5d3f5580e93919af99e83e016dead35f5690c97e223b7d8c2ac39dfb938770fc9e7c62690049dcb036b8d1595e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110133d1b4939068563508c49822b963
SHA18fe50799849c918a5b864b4e77c4da2f0a76aa58
SHA2565776aed8a4849435475db61dba3cab2d4318358e3ea47fdc609c9564d9683bfe
SHA5129479bdb3eff2b6cfeaa756cfc9774aedd728a94ef4894316ae8a0f8ac5ae9726f6c1c073bab8eca7b06b7263f220a61f077a80902ba94f221ce6a24d453ae679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581079999acf3d93bb77e77c048213237
SHA1a17426655571f807ffb7fe5d2cee404717a4b9d0
SHA2564d11656160df7f73bbde01b639b8e5e27c1606530928efed43cd11e4f5c2d2f4
SHA5124175d04803eb6f6045af7f9d3d2a351578fb26b0a4935b9c222594f043b67bc111c751a84f8482b793ca1b17e2c40b9afdee8f239e3540d5824558c41a6afd0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c764e6c565ff6a2f79addbcb86ddb9f9
SHA13530b86eba991793329034b586a4eff4ec5d5f5d
SHA256e54b7f23085f5f5ba74f70158963641aed73468266b9ed706313ec96923c7ad4
SHA512ad7630159713eca69b946f1baedf174e9895eb44321d972858a0862ec5f8a5f1f934aeb168a0e935944ba093b8681770267a854cf1ade1fddd9d0e88c0ebc8ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594295d24ab4cc8b5730d07931b9f593e
SHA171c620b9c364f1e9a8efecab4ab9dd1319ec0eae
SHA2567b4451d74d4c2b30ae838afc10f62b67978b6043abab5ab67ad237adb7031bbe
SHA5121307d4d2bd63c6655a9f3ecebd53cf07fdaa66d24a12299282a3f76753da0b525edc3874fa96e305977f2411f277b6f9ec8548471f00630c4246879682d9afe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd239987b12a319221336b0f76b3eff
SHA1fa253ec51f077f2dba6c64565be0dbe083996825
SHA256eba115e71e30a75d4cc06db96579d0a1b6c1e54989991a87893c56f0a9789b08
SHA51234bfd9467487417d1c849864fbd240443e7c2563d83f38a9650188a0cd6fbcaa3991c55f1e494d3d103468a4cc9545c63486ce96d441e628890fd53faa569146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bbf5a5e50176e96b267bd6808a0f156
SHA194980adb1a3cb607106955aca8d9bc5e82832d8c
SHA25638ac4bc9949c92bbe83ec77dbb6d58e8e8fea1a70a6492816747af10f576bdba
SHA512ab8d7d5a5c359092f018dbc4193fa58add9b24ef17a2b76685e76c96ed959ba795314ec35bcfef041eee2c945161af0abcbc6d884c378e4276510227a74b8823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53211df724255a409469fcc37f5fa89ba
SHA11cb23270efbe6fecdedd4b546fbd2b3ed9337b03
SHA256b604fa42efa769fa7cd9c12b399f938588866847656c1bd181755f744757d2d0
SHA5120778166c1671a968202b2abb26cbb092fcc8e3304e48d37d222f5060798aadea2eb2b48fe74ac03b9df8032541b8955ae19c78ebdd538e84a43469cf985d327c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cc1e2b4f567f8341d01595320a93f39
SHA16b2b3aa7d47fa6ab18830abb90d11a5aeb97d7da
SHA256a471dee449a8e52a765b33fa5630f97f4117a5ee14ebcede9e4157e4b6ca8586
SHA512538ffcfdb45bf0261284ed88b95167b545a2b36c7c27e5020e07fa45937126f416abbda5d0de4875a5eaa0d121c03cc36195303a51b6c2926d03635d29b167af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e15b8e9ee74acaaafc94dea7db2d89d9
SHA1f0dd478814d802bb9fd01c6a8e049def2aff84c9
SHA25624ed7068f8ad30bcee9ab80952fbcb21f4f072991c3f8c4bd7baf83a7a054231
SHA512045f0cd80f16a123bb7e69bbc346fe91f880ad31e915a869e96d8ab26125bfc4e6cea8bbc504ac5bf7e57b2162ccb8cad43db400a806888a4cc8e9cbd8d0a355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54348e4b622107d4faf15a7b95aa0f885
SHA13b178985bd5eeac85aed89225f3570f08035c5d8
SHA2560f6ed88336e40522f7c5ed616d691f9dfddd3f4a5a8b59b1fe858469a99ddeb8
SHA512f2d84baf12771197c8c13b005146d2109eca13779533d35bf6a6023739db2059ab6d893168a67fedd53943e216226b901f86a5a6151700be4044ec9b2ee7f753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8fe67a76b63441410c3d3fdd03f2e1d
SHA1aa3324cde739863bb29d35cfb66a9653b7e3d302
SHA256dd8cd70035ed0c4b56e928ef80832c00991d1e85fa93bd9b873cb65852cb8384
SHA512d66622d6bb8f68d3853c399e725dc4ea64c2324a72bf9817aaf921c71baa1bc0fb4affd73ae97b8bc89181d4cf2427ca148574e2f59c7e15117819d8a6443d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ab7e7e037f0923ef2b6dcd63454fbb0
SHA16ef3371c17186ffa548bb4a804c536288812c75b
SHA256e3988791a6e747f3b46de89f29c25637f6c9e0c545c409a69312445e465f9312
SHA512fc4b886e6b0375fce344f9ba5d0b48719bcd6fe15202314037116a49b9f6557b3794f0c0c5f63f31fa20ff1526b8fbb4ebaed1e95ede91f5aee2711a3da279f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de76f247f9add5a35f09f39f248dfbb9
SHA134e2323633f5f27c476a5328cfffd797d259f787
SHA25670bdfcb86d1f83ec6ae14e3447ca286a2a831986f1a63c76526fb4ef7a9286d3
SHA5122bea6525937eb0c3581983c286f8d0731acb02cbbf8877e888a61080ac68fbafaee34ec7382e1c0142794a8a5c08358eafb71b746bfdb5438777396324eaba0b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b