Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 14:57
Behavioral task
behavioral1
Sample
cd98c33b8c684c19e1571187a8ff3234_JaffaCakes118.dll
Resource
win7-20241010-en
General
-
Target
cd98c33b8c684c19e1571187a8ff3234_JaffaCakes118.dll
-
Size
188KB
-
MD5
cd98c33b8c684c19e1571187a8ff3234
-
SHA1
35714eaeb855124cfbf9607132db4d2bcbde3288
-
SHA256
43d7182f818869d94e4bd1e16bd157f1981aa9002bdc689ce2736b29354ec178
-
SHA512
4079f15f6b4c297d2b5ecb935570909eabcd3e6f08e613b55e8e645f2d5cd858b15edcea1fbbb1cac7db1cb82521abf7e7bf497d2fd130ec0e2b75ce0b66ce6c
-
SSDEEP
3072:CYQNHPn7TboFfVqQlXt4veso+nfXNyMDKieHeLvMr9y8ZoIyseKwXlc38/:C1lPn7XoOYyvxo+nfXNJD3U8D3KElcs
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2380-2-0x0000000000220000-0x000000000026B000-memory.dmp upx behavioral1/memory/2380-1-0x0000000000220000-0x000000000026B000-memory.dmp upx behavioral1/memory/2848-8-0x0000000000220000-0x000000000026B000-memory.dmp upx behavioral1/memory/2220-12-0x0000000000A50000-0x0000000000A9B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DBEA251-B3E2-11EF-95B1-7E31667997D6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b96000000000200000000001066000000010000200000002935c29b0de3efbd4ce4d4c61229652260e8b9b730fe683501415ff54f3a76b3000000000e800000000200002000000071169fdcb0c66001159573b54e5c846a5f959f5b82d326984ca3f2cc9416cbdf200000001990aebf248262d0fda0d11ac1690a5bdd1ab0aa08f896a736d241030c95a5d0400000007545edc17477200e3ff3008bb0bc1650416f99f91ecbaabefbdf0b1dafb25a15ac6f31063876e92f7964e1e28a9e45d4499241c5026de0a099f6301a62821007 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9087ab4bef47db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439658897" iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 rundll32.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2220 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2380 rundll32.exe 2380 rundll32.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe 2848 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2664 iexplore.exe 2664 iexplore.exe 2664 iexplore.exe 2664 iexplore.exe 2664 iexplore.exe 2664 iexplore.exe 2664 iexplore.exe 2664 iexplore.exe 3068 ctfmon.exe 3068 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2380 2224 rundll32.exe 31 PID 2224 wrote to memory of 2380 2224 rundll32.exe 31 PID 2224 wrote to memory of 2380 2224 rundll32.exe 31 PID 2224 wrote to memory of 2380 2224 rundll32.exe 31 PID 2224 wrote to memory of 2380 2224 rundll32.exe 31 PID 2224 wrote to memory of 2380 2224 rundll32.exe 31 PID 2224 wrote to memory of 2380 2224 rundll32.exe 31 PID 2380 wrote to memory of 2832 2380 rundll32.exe 32 PID 2380 wrote to memory of 2832 2380 rundll32.exe 32 PID 2380 wrote to memory of 2832 2380 rundll32.exe 32 PID 2380 wrote to memory of 2832 2380 rundll32.exe 32 PID 2380 wrote to memory of 2848 2380 rundll32.exe 33 PID 2380 wrote to memory of 2848 2380 rundll32.exe 33 PID 2380 wrote to memory of 2848 2380 rundll32.exe 33 PID 2380 wrote to memory of 2848 2380 rundll32.exe 33 PID 2760 wrote to memory of 3068 2760 explorer.exe 35 PID 2760 wrote to memory of 3068 2760 explorer.exe 35 PID 2760 wrote to memory of 3068 2760 explorer.exe 35 PID 2380 wrote to memory of 2848 2380 rundll32.exe 33 PID 2664 wrote to memory of 2116 2664 iexplore.exe 37 PID 2664 wrote to memory of 2116 2664 iexplore.exe 37 PID 2664 wrote to memory of 2116 2664 iexplore.exe 37 PID 2664 wrote to memory of 2116 2664 iexplore.exe 37 PID 2380 wrote to memory of 2220 2380 rundll32.exe 38 PID 2380 wrote to memory of 2220 2380 rundll32.exe 38 PID 2380 wrote to memory of 2220 2380 rundll32.exe 38 PID 2380 wrote to memory of 2220 2380 rundll32.exe 38 PID 2380 wrote to memory of 2220 2380 rundll32.exe 38 PID 2380 wrote to memory of 2664 2380 rundll32.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd98c33b8c684c19e1571187a8ff3234_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd98c33b8c684c19e1571187a8ff3234_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:3068
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6cfa21e47b330ef3a4c345084dfbc7
SHA1e63c34716277bf32745bafcc5618a1d0d83ef2ff
SHA256ab044fd5218ba6ca332b2f7caedf318541ed20b49ac7848937379f28ebea488e
SHA512b27c357764e1e14390950d1240167a5b6c5a04eafb017ea92e638ce48e2c89faedd2ba466b5417b8bddbd19f6b285c7464e3d75c70ad5764cfdc0c3aa9c5a0a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae60aba66f323d10f9cae35f29b65169
SHA1045082545cfde4070c6a827052834d621834deb2
SHA2567fed78bd7344b44d011ec5cbd69beed2baf75103b316b5ab85160f04b6a5c4c6
SHA5120e13630122d93dbec4a110a4419b31eb1558998170a753a89b8997a44eb44fa41ca9ccb8c6ddb8dc0fe2afe84805fd15a13c4dac787cdeb2f60a308d8b68f9f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f3b12fd69095dcc5dc007aa77a23225
SHA10920f2b827bee6ddcaf7aa1089246b72568cdb13
SHA256c429ef7e635012cd0773f63d8a5a57a1590a6886f0e2771cce1155117051c39c
SHA5121978585d69ad0172629289b66d16209b7e63ef448cb7a5e21adbaf57cbc90f13853c2fd36be19a1428133401334d6fba9cdac1ed67243309d8394a293cefae67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b866400ea2faf12fed22de32f56f33f0
SHA17a8bf070b390af4358436ac07cd13dc75f3361cd
SHA256c0bf8805dbdb9a4bec51ecb6618bbf4a9b0923809ec392504765cd259f82dcee
SHA5121b9db0291856dea758235b0717c733b9710e9d5ade3d747403d7480617c7fc1274528d13736101e56c04b14840dce200d5187dd6cc4337ea38b10ca25bcae792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e0e577a6e74fa1c5060c6a34d30515
SHA1f9822ca45063882d2f5bea154d82b84c7d4da02e
SHA256d3cd2ddb3f4c2164b3ed30d00da4ee165a9eccd6b6fa4d0442210b2ef72f821b
SHA5128b53ab2d842a1e927714e4d907064cf41d70434d8549d604e27c9ce0962051dcd72e3af24bdea6df4243932f8d8ce258b394c30b66980424cba0640a40ab67b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064927a1d5ea09c492b8073d39bb9815
SHA1ea7b42f8784b4e517e615b758229131503313a11
SHA256a8cd593391e7956dd39d4dc018a434d5a0a219c555b889ed788d82e76b7722a1
SHA512c8ef51e63adb0a679b7e87123d969a60339fb89c9047b92ceaee027b523ab0867c922915703de544fe1006bf225f2bbeb5b8802555a724f6b81c94d8404b5726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be6d832924e142bdf5f3269a7cfad25b
SHA1c97b7afdf03dc816b745e7855902aeeec4436399
SHA2565cc56c07ad73e5c3fec4b9fefea54ee6518e6bed0d8a0cd6ecf81547e7280501
SHA512b7f76e1b0349af80dccabe568ef28fcd216df32fe866f4e22f3b1855ef788d48823b19e7a8425c25ead1e436b2fc7e7e5970be379eff7ffb77dea219abbf8b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55868a755b2a4679a243f2b80905fd954
SHA1e59f6fc346a28aa8887f11f460ec78af490f9734
SHA256ba1b99a85ade299d2a05a1527306db5610d56e24254cd7a6bb55a3c779069937
SHA51226af8988f28ae4e82d6abeb48067ac94428657223f42e932e2b70da9940df1d0227b6af7caef72885ade1eb6d16d7970d9ac2fe81922926d48a13193a9bc1576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcf19da2ec10c7edaf1c64c683d9c140
SHA1aaa07261f590181e0f1e0690756e0bb2234467af
SHA25603c2ac9ef5920f22518e941f24be5c63b841ff7678715fd841185e21779a6ec4
SHA51280d8e2bbc059d650e5e17bbbc96e43fd2f3e9814981be99b1c293f7dbe90dcb0953c1e5e575278000b5779fe4db0f995b7d4a5a66cc1173239175e747e56e1f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d03a0640fd4465ae42bf8416f22818
SHA19d4d95d14375bb3771109517df8043961d0552d2
SHA256a2642a03edf4b290108f1ea033ace6979de576ce6f3b98b69b2b99a9bd2e236c
SHA51212a3529153d4638257b2be6acaa2260fddde4fa038b7d7e76a796fe3d99b07986705850565f62199c1663fe8141a8b269ffbf6874bcdf469f9ba1cfd9fc81ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a95b887ec1b8f257f94781a7ee18a6e
SHA17f31d085ba68e3fa3193854123ada93e388379e5
SHA256712b7bd1d046bc98c45aa8d39d6624056fc7759f2a2c435d27f9c84e7a3686e5
SHA51208e8b094aebfca6631d98bc88fcddba94d7cde1f4e52cb5e09d041d56e9416ccf619e1d4f072f7e96df9097776427633744fa2b6e931827214b82839af1083b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a6c0a7126970de7f5ea9d32ca8f130a
SHA175249225403380d590124126c69f4217b5bb9de9
SHA2567506c04da30c279ed992af40b45dbcd1cb22a3df31adffc26e3056b53d9ce11f
SHA51281a67546ff07b84ffecff2eaf53b7ab5747de5f821b59c72045b9de6fb95fbeca9096237936905c1660d9af3beaab4bb104b4195fc73f436f47b97f85c122228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cfc74c36a16ed9e6d187eb716943953
SHA19492cc47dfca3abfe73632c34670704ce131c618
SHA25663a5da3fd53a9ffac8897635a41c27b6c178fa0d507df6a1e2c7b82712b165a5
SHA512fa3c9f0b0135b332e0868d27177fa7b20c1026518fe0165516d1579e2687fde5a037f99893e6b8117bb763c84fea6729f7dded6a2a0131dfac05eaccd10515a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b57ba99a549360891ec0df1841b1da
SHA1179dc9efcd85abdf87032551983b5d67a4cf771d
SHA256d5665bfbf86f350e458d5a2267954e2c38784365152529ef9b08f8bb7effedac
SHA512b3f55488d43e64629d5d8008e6b7913cf6b5188399952befd017de3470cca3dd496c7240155f30b7afcbecb51a80173b5dc5e316f2fb30816f8334aefeae00c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f28fc6847067db764e10442ee707cc87
SHA18fb2264d7233b8be56a63a1d556c0ce08143fc50
SHA25621954eb4a7b91564e5872f78e9af667db90bc7710485b7ab6eab432a90ea8036
SHA5120b95a8edb6a5a1795583b0b4476f03af2a9c1d7dda6c683bad218f520a40f7632c6231d50e04a5cee092b1aaf0c27b9477cc884d04c789a79ebe6066086e830c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f4267c8ba71041120cae85ac669596
SHA11839a99e29fb44e06a3c8d8027585395d93768a4
SHA256b0d741c67cf50a859533581ce80f5f385add130e50146df01d485c65068af812
SHA512d0d5b9afb8ebb66f8422a6e0a851284295fa06fcc503d38627022ee38d6af7b7ba5ee2be284fc965fb33f9826f0ba079b954744cd84ce56c492b7b8ee7b6af94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ebe292d856be96ca0f72e4505c5737a
SHA18c0a4960aa6938e0d286452581a378ca33b19eed
SHA256efb7a9b303047bd8f04379d0eafa10d1ccb98d8847d9d1d94d166b27a3c277c0
SHA5128a3d9cd22a9afa9e847b41342cde3f6b1c680de859125caf8d0972b94ee4a4fb7be8cc47618b2c398c317bb497743d4de1d80f91a3b406360867b6e700787f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f6517706e9d5f60e9095c2635951aa2
SHA1a98ac976fa3d053d2c5d08ea51492144af7451b4
SHA256c0b1b90f6483997b12c14e3ae0f0975960fea7e05e51dec93e988670e770c20e
SHA512c1a007270d4beadbb304ab6f909d8658b5593f5ccd1e397777bc39ad36e6a0bc0ac53e3285d5cc986a63d755cdc810c000529701e32d82a861c2db2431676b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ff5d513328002206d347687f407b843
SHA1559ab0f2e03ae6873b343552f9ae2e051437bbe0
SHA2567530ed46a031ce2ad23b4c85682fa3cc186311254dfadf70a57e546daff55da6
SHA512d3d3c5fdaf02604f3c47e5339314fecd96ea0295a6a83df778cc1060ae4cdd559cb95abc4bbfe7a0e0861be51f5a6712b65649fd80bf6e533743d75af5ec86b0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b