Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 06:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4afb0546de239dc16fa97d58f23e0830.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4afb0546de239dc16fa97d58f23e0830.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4afb0546de239dc16fa97d58f23e0830.dll
-
Size
782KB
-
MD5
4afb0546de239dc16fa97d58f23e0830
-
SHA1
73c3adacbb4998bfd935b91acc04a1e2c2460702
-
SHA256
9301eebbe6e566d4278f9b6a5d3142b3146fdae48b3bac20a6463ac8af507d5a
-
SHA512
c3aecbb9c85532174a9cdd59d520b6c8244a63c3c13ccf8dbe7f69b4f4bbacf797232cd2f24eb6309ad84eefde98de1eac230fab7397681c324a1d414316d46f
-
SSDEEP
24576:lxHRCGMpEGZ87FESpY5kTYxpGxgl0tMyqniPkMA:/deED7NY5kTGpGxgleMyqniPkMA
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2544 regsvr32Srv.exe 2100 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 3008 regsvr32.exe 2544 regsvr32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32Srv.exe regsvr32.exe -
resource yara_rule behavioral1/files/0x0008000000012117-2.dat upx behavioral1/memory/3008-3-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2544-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2544-15-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2100-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2100-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2100-18-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxC3DB.tmp regsvr32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe regsvr32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe regsvr32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E17494A1-C80B-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441875749" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2100 DesktopLayer.exe 2100 DesktopLayer.exe 2100 DesktopLayer.exe 2100 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 580 iexplore.exe 580 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3008 2992 regsvr32.exe 30 PID 2992 wrote to memory of 3008 2992 regsvr32.exe 30 PID 2992 wrote to memory of 3008 2992 regsvr32.exe 30 PID 2992 wrote to memory of 3008 2992 regsvr32.exe 30 PID 2992 wrote to memory of 3008 2992 regsvr32.exe 30 PID 2992 wrote to memory of 3008 2992 regsvr32.exe 30 PID 2992 wrote to memory of 3008 2992 regsvr32.exe 30 PID 3008 wrote to memory of 2544 3008 regsvr32.exe 31 PID 3008 wrote to memory of 2544 3008 regsvr32.exe 31 PID 3008 wrote to memory of 2544 3008 regsvr32.exe 31 PID 3008 wrote to memory of 2544 3008 regsvr32.exe 31 PID 2544 wrote to memory of 2100 2544 regsvr32Srv.exe 32 PID 2544 wrote to memory of 2100 2544 regsvr32Srv.exe 32 PID 2544 wrote to memory of 2100 2544 regsvr32Srv.exe 32 PID 2544 wrote to memory of 2100 2544 regsvr32Srv.exe 32 PID 2100 wrote to memory of 580 2100 DesktopLayer.exe 33 PID 2100 wrote to memory of 580 2100 DesktopLayer.exe 33 PID 2100 wrote to memory of 580 2100 DesktopLayer.exe 33 PID 2100 wrote to memory of 580 2100 DesktopLayer.exe 33 PID 580 wrote to memory of 2840 580 iexplore.exe 34 PID 580 wrote to memory of 2840 580 iexplore.exe 34 PID 580 wrote to memory of 2840 580 iexplore.exe 34 PID 580 wrote to memory of 2840 580 iexplore.exe 34
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4afb0546de239dc16fa97d58f23e0830.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4afb0546de239dc16fa97d58f23e0830.dll2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\regsvr32Srv.exeC:\Windows\SysWOW64\regsvr32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:580 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516babd5190bbb15ebc6b77462c3664c3
SHA1153889b27cb9dfa01058dfadc8bdae05c1f0bebb
SHA2569caf0a7c4bab31eff4f7c188c4f74761f2ea3a41580213c86102aaffd480ba90
SHA5121220294e28b2b22203942f80cf023e9c9d4f9fa5288c3a9cd2e2a1cfc7097faead5166095f1bc484ef72ea881753738841a7e282795e83ef3a101b6cab470195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b14703c5010fc5f83bc14b42e57245a
SHA1f0b98752601e6e4e7f44c5706890753d419ba9a7
SHA25673cdbdcc4d7317123343cb99e3ef13a2877ed75052269080c77d0c96c0cb3850
SHA512c0d59f209ebe8ff33492e62d6c74431b674ed633f7fd80ee70551351b0645d882e134ba821767ba405eb7e3db6b97cb8ac6d18b9924b28721455801196a6beba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795b94386d6da6f24e2ed69c4cac0e6f
SHA1f2f74697d105d4f70473e2d6070733f7f7891b1a
SHA2560144cbbeac6ea177adcf45b7e48f68c6507786abbb10ae12115c04ffcf66b14c
SHA512b5532291069da51b978df4f1cdddf2ad269a36e681af38035fe6dffc0e90d9acd64130b28d3ec775cfa5a8ecb38672688ab4f1bc015f218f0b1117f65ce0f44c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54751aff75fb5305952c06fe4e8500a0d
SHA18350185969177baf7f9b8726b2e6e71414c8d73a
SHA256f9613e6ac59d596fbdcc2b5451fe6b556d9be7ea90a4aa45a5fb36e8be53d48e
SHA5124686cb71128cfd10918a36fd0adbcd2034982485549050bf575dd112a74a6dd9de20a773154b4b7bc7852acca7f70ffc4bdd206d21c08e9eb414413bdc3bf2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fef3c76ec86a0f35067b705f482f4b5
SHA1743f720347b0a10bae1415eebab28ff6aae3775f
SHA25689ecdd33714fa8736961b40dae96809c788bbd231a930eb69a1802cd9777d675
SHA5123e01f560e31a6714c1a0ee5606fad5076be00e1a93af42c3839921f36b49783b0756e91aaf7dd276d7f6c40ed1680339eeac2a4b78338f42bb2cd4c4ac9b0a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e6f721f82c3dfb26432be8f9902b9e2
SHA1f1e3ff0c674ac3569da0647d4147ae2ceedd0dd2
SHA256d98a7aa96cb34fa68461531a114493a7edd9713e94dbfa066a95d50722b91a7d
SHA5128f8fb0b59aff38aa1dfc7058d35db0ab62bd9317485d39b12cbe13600a6d10a7c43de9536110d6ed64efb37f565c0b240c519c2ae95869f49dab2101444c7174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f2240fd258cd81f924964f454bdc60
SHA191ccd0a39c10cf56992970583ca6ee33da370a0e
SHA256192940615cad1eb5fa328322faa1c7677bf7b49174e75d482bb06ad0e3f2c28d
SHA51279f9839f5e0aac07444224cfb97c5bf7405721d0aafbe7bacd3214d8f6b31cad1e63ed87ec308f7ad0957f75e5db5f6848a3976aaadcf7ee4b757fc48deec12c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514064a56400969f8f384837a700e47a9
SHA136f37f7eb59f50b0b1d0cfe6df8cad3381b896c6
SHA256147a1eb0cd84992b196f532c31609b4aada96d4f7fa990f0884b9ef6c4c5c18c
SHA512939ab6352185f7ef75315926c812bc3e3183b1a1e4bfece5151d4258d2cb401e35d23842d0efe5933baf48c7d9a1e0fa188ad13a87288373472ce59fb0f360fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f9512f2012a4b9fa9145128696c489
SHA185e0f82bde6928b813c080ae4691e95d829112e9
SHA25613c3e781df4d339c588fa0e9dc4c913e7622400692bb4409f8f26d18969de272
SHA5127ffceacac07aadbc982c3cbdc0baafb88b896012255f3c190ad1f3aa764fafbab1d9be98f248f5ee12c3943d87971b7b4798a2166e9a0d12e0efac9fd5d41d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d06da6813626a5e2f136268b2967122
SHA15d24b06b4e01fb8a9ab7e197335bcfb6bf8af252
SHA2560606aaac4e474cb57a7b436f204d68c384522c749b7b9c09dd5b7797172a5524
SHA512eae54994eb62d7c87b57a86c3ada6076d076f16096e746db8df8c0614da0b2d53e3cca7745589efd3d9206b94aa70b23fcc19f489e2a34fc55a68298b585872f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e39b8207d80fdece6172a498fbe8c3c9
SHA14c42c15b7eface0bfbedd56f1e51467c5ca89fe8
SHA256eb04b8e199ec871ec01829bf1e54891fb6771ffa806187c6e1679fc8d17f4bfb
SHA5121653a9a17197104f805810324ef9dd15da0cbb4cf25bf89f44fbea89e5304b34e06076815d6d93963f6ec86b12fb0f7c70a23723b3b0fb59efab684b1ff2e8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50165e3d0b49c6f06cb6ad9b0c943a70b
SHA175eb2b33f457167a33e5d1d74948674659e5f440
SHA25655c097bc3de5933f213dd4218a4a512beb71ccb37bd8f42e725b0965fc2b159c
SHA5127c7e63f88c06687b445a3aaffb57435b35afe8ed0fff0aee977c5574d4862a2036fcf9a95976ccdaf07bada4173312e9dcbf9221aa49a291351a35312dbdbc35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4572f02ccbebbdcfd603498e757d13
SHA131db3604e465fd7142a5bfe6fcb7a1c68b57d720
SHA2561c6fa7d4d81503e13f46736e243780eeedda33c529a09873ccb66f1b465b08a2
SHA5120a9468ef7658f8b82582499d93bf72a3482dc4d4719e0bbc34177e2f6a9cc8ec290186bd2e5afd62148daf1535b587ee79e026c63f0104719b66b02e16042584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d458ad25d8ce6a7f15f0b365b7352f9c
SHA1e4a06bd0c46a080df47c2269530ffe7569643a73
SHA2560148170c3d6861712f483c48d75af7e9a54c9eee36534dcb76bf1576ed1cd081
SHA51258a76eca18bd8b24ad98f530568ad41c09d8c0db7114dfdf123d7e3755b29515a141e77bb49da6e1e60edb609d61d63f2f5fba45bd6b80a5148c22d5a906b9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d00c35260442e2a3be007d90ffdce1
SHA1f7824c474fccf8558a15b1fe6e2c328c611f996a
SHA256daf91851e8a797fe32163fd3a1ce7405cc0104e8ec98dbcae035bb540a009c97
SHA512488dc0b23f4a51930fbc5dd38ce50d0de950e9a9961465fe7318a4db4d3bb2e8cd2745af62eab5d53573b92831f1b3c257e6749a0600cfc6b27d5858cb0670d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c31967a73fe60035e171b0f1e9130820
SHA135043433f30f856c69061a24195ba256441b0897
SHA25626ffd08b29d1eabb437df69410160c147ae86f85eea9a700b84c9175519906dc
SHA51262aefeaaa178508b9ee2f9a0c86942cf5b930551def8ea9319fc826b7df27745bcda025ee6a139934f50af27bd20eb6d47c66b48b2b777809ab0d293a0b3fa0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd68a183242310d21911561f361027d5
SHA1722adf42685bfca443f28c03107051000a002850
SHA2568c86c98af41264caf8fd5a1d7f38901c2014f20da937ff1dcc8c035d69afa59a
SHA51223019927a958a707e2fdb2e27b2fefccc9148a7f58146acaf0e1ab97e113764c816ab5bbdb56afb301cf86104b2bbfc6976b7e36fc14e846118c9a125e9f6a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552bb2d0cc4492a0a3b3d89fdf1090618
SHA1f0a2272cdd6baefa1f1afe979ed67da91dcb2a33
SHA2563b933d6c8a42e4fea3b0184ca53f9ac3322afa51346fd1c4cdc608874c65a51b
SHA5124e2e6af96a915b67ab6fc473006f57139e35ff40f361782f5424b7d88670c3940bc1a02ac4ccd3cb7ba03f84303c43305e94995a95dce970fbec87c754e45f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533333b45c89aca88f7417e010625d2b4
SHA1dab75e12ab893850db821ca675ee0783010827fb
SHA256f3e1a97b8a30700dc9adfd79a479a8f0dd70b9a5662c174dd78d8dc6ccfde629
SHA5125d36991ea92de9141b269cbe8bc3e7bd8ec95ad8cb0e755b9748f90657d0126c0fa9b9a50ab568daa31a2de998a25afa6fd79d58dde65be4d361e29730b8c67b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a