Analysis
-
max time kernel
130s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 17:27
Static task
static1
Behavioral task
behavioral1
Sample
ec97f99de6c837e9401c6ecb4ba58db6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec97f99de6c837e9401c6ecb4ba58db6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ec97f99de6c837e9401c6ecb4ba58db6_JaffaCakes118.html
-
Size
158KB
-
MD5
ec97f99de6c837e9401c6ecb4ba58db6
-
SHA1
db77d1f903fe759044b0a16df8f305669d9e9d73
-
SHA256
66e6a10b0c6c759dba7ea93aac7eba08befd7122123fb47b0b36112c3d4d247b
-
SHA512
91a66091ced917861855964b0f22de66b032750b97fe63c93e4e9934980df280aaa4ba9435eee86a37273459b44faf0077b1d359c24fbae57401ec05d9dc9946
-
SSDEEP
1536:iARTKxU9Z6DrvyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:iqDcDrvyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2420 svchost.exe 2112 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2608 IEXPLORE.EXE 2420 svchost.exe -
resource yara_rule behavioral1/files/0x002f000000019030-430.dat upx behavioral1/memory/2420-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2420-436-0x0000000000230000-0x000000000023F000-memory.dmp upx behavioral1/memory/2420-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2112-445-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2112-447-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2112-449-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px44CD.tmp svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440272700" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D180661-B977-11EF-8632-EAF933E40231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2112 DesktopLayer.exe 2112 DesktopLayer.exe 2112 DesktopLayer.exe 2112 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2720 iexplore.exe 2720 iexplore.exe 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2608 2720 iexplore.exe 30 PID 2720 wrote to memory of 2608 2720 iexplore.exe 30 PID 2720 wrote to memory of 2608 2720 iexplore.exe 30 PID 2720 wrote to memory of 2608 2720 iexplore.exe 30 PID 2608 wrote to memory of 2420 2608 IEXPLORE.EXE 35 PID 2608 wrote to memory of 2420 2608 IEXPLORE.EXE 35 PID 2608 wrote to memory of 2420 2608 IEXPLORE.EXE 35 PID 2608 wrote to memory of 2420 2608 IEXPLORE.EXE 35 PID 2420 wrote to memory of 2112 2420 svchost.exe 36 PID 2420 wrote to memory of 2112 2420 svchost.exe 36 PID 2420 wrote to memory of 2112 2420 svchost.exe 36 PID 2420 wrote to memory of 2112 2420 svchost.exe 36 PID 2112 wrote to memory of 2452 2112 DesktopLayer.exe 37 PID 2112 wrote to memory of 2452 2112 DesktopLayer.exe 37 PID 2112 wrote to memory of 2452 2112 DesktopLayer.exe 37 PID 2112 wrote to memory of 2452 2112 DesktopLayer.exe 37 PID 2720 wrote to memory of 1828 2720 iexplore.exe 38 PID 2720 wrote to memory of 1828 2720 iexplore.exe 38 PID 2720 wrote to memory of 1828 2720 iexplore.exe 38 PID 2720 wrote to memory of 1828 2720 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ec97f99de6c837e9401c6ecb4ba58db6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2452
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:406544 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5854b93e507c4dfc272d06c8d94a3b439
SHA1d179ce9924760d18e1afd283f9fbf09d03206e69
SHA256554564aa6f3668e6439e3a24edfab120ab4c48031bff03b1f38b4f2903ad08f9
SHA512a9f3d964bc4f96f073211cb780b161d9991e457dcc9065797a698463b75b44519eb6c1235905932c5fce459859d4cec4e3cbd46668509b608849c62a323e420c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee7597fffe46cc97dd4ef830c161816
SHA18c4a6f6cacf4593edcbcaf2f507cf90e3f58d509
SHA25652a2e29a51c78ba44e8b57664051c7b7a4d96a84c4129b245e55a0800e2ffc68
SHA512c83e188c62a5240980dc2f6659192219d3c9278955916bbc915235d516be0b780bd9d0bf9eeb74edb6f5c6245eabe77ffbccd75004d679e3315a77ee32e979ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549cbe0e9b62d923a68283c43634a22db
SHA142ba54b9decb4e4319fb764447d22a26f6e5e3fb
SHA25637e342a49628031d3667f2ebb185e28afd9dd254358b1b61e27f51b70f60bf18
SHA51262cb3d795c9aaf31b0bbdffd1721c2cd85ba5622737470a23ff44b9245b76763a508cd05554ffe66ed47dfdbeef267f5ef1b9e7b92d785a79d8145f006aaee05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e06988b952712643f8592d11043183b
SHA1de615396842829de6a64656abcfd98f1a5ffb4bb
SHA2560924a17cd814eee855ffedcda505ea1ac9abbff34687c669a4de320d8fac48a2
SHA5128d46033d0df18aa31c4d084c1823c62b5ab4c7d8f8941292c4fe366c08ed17f08bdbb84c65aee20af73025f756f02bf359a01dce2f22ce9feed0178ddeb4c974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5191aecd022e22c9c7b7e31e26ec320ca
SHA18b24f530115bc826eb2c8ded31d1eba036765f9d
SHA2566e51dc6ccc4a0093976c2b11865f7602abeef3df6c4d52b9602a44f858aa965b
SHA5123fb9f88036d47a568d95dc4147c07ac625c1c9d3872c763faff530bc3effa507d93feed2529908f21f66b394e23a6b42eed2c5010cff86a3eba26549b90ee3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59abb28b472637418056a6d4364e61c4b
SHA152e39cb2817596a9808c7d1d6852bbcde3064fd7
SHA25630e9589ac27c25c4a55497daa08dc3c8e209e0006e6fad2de07b2f35c731dcb5
SHA512ce0b5d4c31e3a73b5829ae883e4f9bef9184bb014d7550ebf651f994d76a4dd716ad31f2d7a2a6b72e94849287be7fffcfe67c8b3915754ffd63c7922b7cf452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db1ee09f7380965551e1e6b85ab1747
SHA17557b3257c770af626cfda083f2f698c18489e85
SHA2564debcc3c60dc16b578dc0f16871415b00e874be4fb7dc8293a0e3f9067bc12f7
SHA51262f04be708d3a3579eb15fa932d601a2d92d67a6050c2bd82d50427f6cbc1cfa5ee7db31f54559c471a26bb77bc2d6134807ec22020dc7845050a4623b9ddae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57843525e17138eb0eab6668d351d9916
SHA14009880ccbdfd0a746833e0e541cb3c9830b58bd
SHA256859d82f92520059790f0f4e3b6af32b4da7107d9fff0f105ad9ad9dfc5e9648b
SHA512497931a0c6affd959d293b7616f76596a58b5a1b5a1e0b586e3a3e80da6cfc5a34c2082aaaff2d32710312f3a81712c3f1bfcbc5c452a48b77b8b2d4507831d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590691f91a5e99e3837dc41bd9461722e
SHA15721563af5bf31ca652f044b1b1026d3d068404d
SHA25630e4701178c09ee9477fcc95b0de920a029c602e8bad31b7e4835058f0dff044
SHA5123b35bb3743b1d2c9b704d546372d712a3c892b4884c4f67a2b13705b7c756b2f2e2e4bac265bb42a599b15473a71e1ab2248730c7da71ff6b27fb366c3e0c990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56217087f7baec43c9fb6de24d2667e18
SHA18cc2356b77ec1cd5b62237ce4a9cc224e764baa0
SHA25613c21d46404ba7e87a8d72ea8cac500fd1cb31eea7b73f67bcb98eb8fd21e275
SHA512ef91a6995cd6fad168eb08b27b82423a4d8dcbff3283ba73063526e47d3e0e6fb75559f1d02bd79e92c391093cfc2a2af53e124c6633667b149f25172a514f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9152d1d0fc46c4ee74ac52cf03018c1
SHA1c8a43aff83b61bc661843ae3962982f49a4c2dd3
SHA256095c9d025f09277b4a22f42d3b1cfb3924ea9b769e98d984650c0fd7fa34e207
SHA5124dd051f3775524e157ec06ae3ac6ac1c9d1e4ea88532c59314500560d547a0c78879b85d547cb835ec528940bcdc4c2e67297965a9689f4191978ad708bda19e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5310d406607f8ba0813ab6621d5749982
SHA169df857dd73c6e271334c28030619c8ade33d016
SHA256afebdc035f9782faf892fc81eb1f2a08a5ce82fbea85031fc9440e00917d7db0
SHA5122bf55eb75d974c74641fd151c3b995de297761fee5d29105e0f346a877907346cf5a688a29268ce20617f3719b1c10050243e9e63322a045dfb9d49335753ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029118aa5938f273f1c6e797c9765af4
SHA10e03e2bb439f7213cdd223c874ba7a436b4aac9a
SHA2564f2517e86374c7a711f5acb92ce6db7ec10df134f7cd5bcf2d26000107ec93de
SHA51245f53bbae8c467c9a49fd0ff194fdee584eebaf1c174899a745375711cd1b9934a9513d2bc39e26df0748830633017ee2c62867c58e467e713ebc1498639854f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c11ac2a1499ff14fc50529e1693283c1
SHA193ef6f074608672b5655dc6403a9703b78606801
SHA25632de559f5d30e1c06b6ce396383013d105fce2e0fe09e28367fffd2e75be1786
SHA5127361d130e3e7b7c8fe7a98edee00bbe3dee1ae8d16b532d2fba843fa2489d4d5577da60af8eba12680cd2d51a2226133fc75f5dfde27cec005b64a750067a663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb656be50d4286b1e1c73d94f6de8c8b
SHA1b3f51a1f86b731d7173708b7c3ad69215aaf9286
SHA2560acfc49ecf99becd6aa2dc775094e520fb9dcbe43b93c77d85cbfb1ba8e4878a
SHA512300fdc6033ef328a5339434f073e1767ca6c514d4493ac6a206d25a8f84cbe774ab12257579dac82997010fa40d250d189a29292721823511d9676661e67a300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bea7ac411268ad454da4fa3ee955793
SHA103c8ab83c75abc82740498483bfb7d6b340c2b23
SHA2562b7098a0a030f13d48b443244618643ee5903c677b357acd6ebb708d964b4afd
SHA512707ebd82cfac05a22db916e554d619df008e496445b53a091358c42a034eb5eac2a97b9ff2d3fd62152df6d32e5011453766a96f720aa3d27469c6dd0ca668ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff3880e74195e2c644f1b918daef458
SHA1006889967a3aef72d882d13e6723dec4342feb7a
SHA256d9bd90658315345b2761d6fa6a657e356b30d48eaa96586979a572c923154627
SHA512c1e16d18c47a39bc91f82f4907526aee376560539a7eb633029f53a4a33773eca33fa692b6158dab3701147ac88f92abe23464e5abc01bd7274217b12b8ff72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9cb1f5128661887a6f5c2e4bc6dc7d
SHA191f088f43dac50815a46c93d728d1e881163e27f
SHA256ebf302aa67e185bc7922cbdd1b3cfd4e802932153b661648c7af7787e4cadca2
SHA5123db5f5667c94c7b4bbadf02617f2b53d1aaa882f15060e3ec4f1119e46b0f76810d021dd1c14b6347d911ff2e8d45c7db6d9a51b5d39af36afcafa1b4692bfee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b988b7589983b4858c305a340f72dec
SHA1eca02ca06bc985c18eb71ba9bb737b091fd3fe9e
SHA25640219797b0a688bc8a729cbf3a6f6839620edd85c07cea89d3cc31316e5bb19e
SHA5120fcaff02eda661ea1ec949c12be91ea01034d940ba967e0ec9b7a14b6bcbabd759fb65208c8aec5071652995eee7c1156a3bdf2f9137205b5133ed651ec1df38
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a