Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 23:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7d4411e9149b858e186f9b6207b0424b.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7d4411e9149b858e186f9b6207b0424b.dll
-
Size
96KB
-
MD5
7d4411e9149b858e186f9b6207b0424b
-
SHA1
513fe691a59e66313cfe0e9680c38bf3443c806e
-
SHA256
0e7156bddab6a6a1ce983defc0b70b5e3a44113f1985a6e874738211afbc3cb6
-
SHA512
84cd28bf79bf5a27b7d5e8f20d93e612431246787075875126b113e729ef80e31fcf1026b540d3299d63222af3d1a8feca7f2c2e88a0b083f3e07d38a36b000a
-
SSDEEP
1536:zibToqp78CcNzxR2a/j3d+9BNuXVI7jWWSOdsV4AQrgK29fb+T76/ZGKKi:zibTTp78CczR2a/j3wU60O6tmF29jhGP
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2528 rundll32Srv.exe 2672 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2508 rundll32.exe 2528 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x0005000000010300-4.dat upx behavioral1/memory/2528-11-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2672-20-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px1.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2660 2508 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CBA83EF1-CAF5-11EF-A5D8-F2DF7204BD4F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442196118" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2672 DesktopLayer.exe 2672 DesktopLayer.exe 2672 DesktopLayer.exe 2672 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 iexplore.exe 2808 iexplore.exe 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2508 1780 rundll32.exe 29 PID 1780 wrote to memory of 2508 1780 rundll32.exe 29 PID 1780 wrote to memory of 2508 1780 rundll32.exe 29 PID 1780 wrote to memory of 2508 1780 rundll32.exe 29 PID 1780 wrote to memory of 2508 1780 rundll32.exe 29 PID 1780 wrote to memory of 2508 1780 rundll32.exe 29 PID 1780 wrote to memory of 2508 1780 rundll32.exe 29 PID 2508 wrote to memory of 2528 2508 rundll32.exe 30 PID 2508 wrote to memory of 2528 2508 rundll32.exe 30 PID 2508 wrote to memory of 2528 2508 rundll32.exe 30 PID 2508 wrote to memory of 2528 2508 rundll32.exe 30 PID 2508 wrote to memory of 2660 2508 rundll32.exe 31 PID 2508 wrote to memory of 2660 2508 rundll32.exe 31 PID 2508 wrote to memory of 2660 2508 rundll32.exe 31 PID 2508 wrote to memory of 2660 2508 rundll32.exe 31 PID 2528 wrote to memory of 2672 2528 rundll32Srv.exe 32 PID 2528 wrote to memory of 2672 2528 rundll32Srv.exe 32 PID 2528 wrote to memory of 2672 2528 rundll32Srv.exe 32 PID 2528 wrote to memory of 2672 2528 rundll32Srv.exe 32 PID 2672 wrote to memory of 2808 2672 DesktopLayer.exe 33 PID 2672 wrote to memory of 2808 2672 DesktopLayer.exe 33 PID 2672 wrote to memory of 2808 2672 DesktopLayer.exe 33 PID 2672 wrote to memory of 2808 2672 DesktopLayer.exe 33 PID 2808 wrote to memory of 2436 2808 iexplore.exe 34 PID 2808 wrote to memory of 2436 2808 iexplore.exe 34 PID 2808 wrote to memory of 2436 2808 iexplore.exe 34 PID 2808 wrote to memory of 2436 2808 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d4411e9149b858e186f9b6207b0424b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d4411e9149b858e186f9b6207b0424b.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 2243⤵
- Program crash
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2672b4e11f7e5b5f0dc40c3335f62c
SHA10449a8390cde6062f85bb8aa21d9029024c1729b
SHA256b8a28e3ed7139d728604be30082353543da9c64a77b2030117cbc6e034782ca3
SHA5129df00772c074358961013d3a25be36046515944480225ee6959ac3cdf9036c5cb46a0313473704dc7dc56ca2239f88a0c20484d44932e5eeda5eb8eabe8df853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce667ef74cf394373691d8de92fecf8b
SHA13a6095c96d86a4d2546a70102062f6a960e616af
SHA2569f69e8ff8a7f2c0e2d8a56b5c2deea57c887071eb555ec85fae8709ee8a83bbf
SHA512918928a57c09b441db9903bcf506bab9c391b5fa33413dd2a5e7659ec62503b8e76bd99dcf8815997fa226c49bc021be1570dd03c7169030c7e96e21c59797e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ca3fe9365dfe9aa3888f11589e7d74
SHA1d8295e7c5c2a1f8fc8ac0280425eefb6cb28504e
SHA256ad7d1f9bb747dc8fa8e26b0af5243c07cc91870335f2da0120c66dff02912dc2
SHA51283347b81de15183250629f0fda8dab42d61b50247388b941578b554eda1e46226f9fe73bededc15b7d89b08165ab14a45977a52eb843805726525f2c93568429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e56abc108a172a0954e5b1af127f3ec8
SHA10b80be44c4aab6ce9f9b70f5cddb82affed06896
SHA25627a7582438df9cf43f9f560ab57b4f683df5442b750340d92bede9dffa0c10f6
SHA512cf626e246227beb1bb0d92cc3257ea7f6d3c17d3aa8cc2c35a63e65a1c362b6b8e594037004edd1730eb686f7e2cec913aacb51d4a25f1474b35553eb0881e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b24b07cb1b540e7490a0d7792ef0eff
SHA12d780627700d57058a046a6990f8e6167ac6bc30
SHA2566d8e7cb445df87649e54ac8062fc33ad7f17ec0eaf8fcfc04fa3f365c9746806
SHA512d86d1af25a1582beccbfa6939b4bde9ae004f3ded7f055905c0f11941c6d4f9237e33e607057e4beb23c785d0ea45b57b0f1fb4474ac9b4f5bef2a373f46838e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52908537eb90459b085d79b701a38b872
SHA1ce03e924ed02d96221589c26632fa0446fbcb6a9
SHA256e3a143a4a5fd0d7b20bcc39f0fce8b07a14d541b51c3fea15f6a719cd50c66b1
SHA512baeeb72293f2e77ef6048d7c95b4f6f27d82fee5815c7f21f2e187c7bcacaf6056acd4b1f833716f41f5285244950389ea776e6cd3875b6f301aebac0d48f4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b14004a36dff5927723f09d93435e24
SHA1b122f529fdf6d60295a1d960a62b5697ab000f35
SHA256c30b8b6a14eee1e74d77a226cfb8fbb25c79726b9220f017bed4b670b7d89b43
SHA51247095ce7c0b6bdd287e572c9a555179ae8ffb449809d672e47474b013ed0e73529213e6548fcd66215f964bda1d386c6b91850c5c1427370acc0522059e799a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55097326afac0eb9a7d76dbd42bcb56e7
SHA173845297cc2df95ba5f38bd17e5fae3ee81d207c
SHA256218223f28efab9e5aca18e2b2ae2aa933e03322c5be24cc6b5c7c8ce15eb9b24
SHA512604ee60715a4327d405a55f57d644bfd44932e3f2f8c0cff83af4bb354f7e721bd51567c667e85ee229aa58e0f992c70f0a0baca5165888ab2039c7de4cfc893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0f71755d368cdc692a26d6b5bd476a2
SHA1795742fcbc638f1b78681a8f4fbe1e748fd7c7f1
SHA256c685cac90e91a96270f9d47d9cbc8aaafe58e2c924eb61271ed6e3751aab5a8b
SHA5126b0dea0582179014e73c82ada6bf04a93de73d32085e891e60e7bb21d88256bf7eb598f0e74415d53d1e2a632d18b7c0eaa908cc0816aa3d6b7a18ce283d4d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e58c63304fd8a8d9e4531d9e4b2176
SHA1333d0d405299ab9b6a9164ab00aced51436980fa
SHA256be835d18c6035292cdcf2692fa2b7b4b10d9578c3a7c758936f1ea0e9dc0caa7
SHA512b6cd2d5db02b654eb44a2846fc219d2b1e569385ce056163e86ff2271917436ad50962934cb702dfa2ee3ded718a3d649f0421ebcc47b5291aa1d1b429680f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be01580c3ee1b5dd6c7841584fcb1be3
SHA1af3cb7754b1f1618f8a65d48a8cd733e68577c9d
SHA25696df7bec55daf24e2d497dacaa05d8ab9d8e1892d4093ddc577ca855ba74fe5e
SHA5129db50fa7ea2f0e5e7739ae16e4ea8be20563591cba14f05352b3d261d64eeb9d44de790afc7676ed9057fe8a3805b280dda12e6774e1353be16390094a97d342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f74e0eed03ae089be8b58251c602c3b
SHA1ddbe3c951cc8592ebf5f7e072404349d711273af
SHA256e42653bdf547742cfad1194b4aa0e8f934169517fe38a143fd0006cf6d232565
SHA512a976067ebbb9064eb8e99d6c1be39c4795c2333cc6c01e64d59f62b0cc8367caee114c0ef6844264c9c566da58e81b9503ad97ef5859eb732b7baad3dfad840d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6cffef1a2035fa522ac98b8256b6750
SHA1508d8c822f8a422a74cb4ff3d39724596fc149d7
SHA256dbd0b1506abde0da581e21a46319014ca9eaf980787477ae9ea4bd8b00d01c0f
SHA51278bc2afbb05cea4980aef702ebfaa4b3a63de0f287d2cf2687deb246895ff8ca252298edb6d1fc9ddcbdb8366049d1c548ab2a5e8e38d321705b28fd00aa058a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587db9518706247d0aa26a82ce314d074
SHA1b4f87d0e48889310d34543b54eaaabfbffce4e81
SHA256d37fe268cd2e24951efef5278510c30a826d25f9ab166ce2422e2960e9448043
SHA512329b3ae716813b952b9ae772f801abf290912e9b1e96cabd52671da1ce5aa2cbf1c8065277bf4f4990e8df32de5fd051722757a219b56826880de81df13e0dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c94295c4e18af2daf1b2a220c784287c
SHA1180d1fce85e64bdfdab6d4549a97194457aa262d
SHA2567fc019786db4a69060a13004871f28d085044adbb7205c0f12496687b95d2a72
SHA512a3e37ec169e94b26187e26237e6aae3ac878a8f6a785b734092177ffddf1f841e56e605d215e9f1add8d0547c90aedc70348a47d752b8756c74b46abd693d92e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a76159cff7b5ecadd9719ee4bf9f2a3
SHA1ca44089afee20194b1ab26cd024418007af71814
SHA25667d23296a10ccdb47ac2b155dfb2526355df92d7302211cf08412dcde55684d5
SHA512d36b7ac3072d5c50be90ecc33b49686ab69a10c891cf5b397e93115dcd1537da93e9f793898be7dd9ad78847951717c67e386f10c28ad73b17bd772e215b0cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5effa9e6365de21212d14b93838699a28
SHA10fa50a3b2aecbcfefc56661b76e669fa360123bf
SHA25655772d2ea54cad5a7f5fea6511209739c8feae0a39d1719a81cee03043b9aa26
SHA512a832adfe5f790b8d7487e5f428a0027457f43f8d8fccd59b699ad84e1ac5fea80d360ebe9cc094b0b92fc967f8cc26ffdfd5b8550aec35de0fabb47581ef54c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298ed2011ba630ed68a0a070b7cd4348
SHA1674bab2f43a1f418e967d3fa8f827337f6bd071e
SHA2560585decd67dbf67e95e55be8b6e02e29515bc843cb143b44fc5c3892f4c99e56
SHA512caa116c2f3bf841456cdc35ed009c1ec7fc0e3d5611d112e30e89b7569d91c456981bd0da1457857f15fefcd3da3e9fe6fec094fe4ac88ba61cbe92a544d9199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c02c25f5478dfac00c01571d3a57d7
SHA141a00d2934a381ddabab361f7d791a51b138b8e5
SHA256bd7b2f7b715c1bb9e07ae020434e355752f4cf67172cb50720ff78f33711eca8
SHA5128977dbe206e87e3c3243e1f382358b3675797a81e38e91f81024cef79b739f90e1e1be3e80efb6e6310c633a2b333ff59ff69e26fbab7d6d6b1f75cf162d46b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57985629a2dc303a349ebd252cca554bf
SHA131b706cbba55479287905f259f08c49031e11387
SHA256cc249b0162e9bfcce8936f1f31df57ad1d5c0cb6e2d592322ef4417eafe08323
SHA5121badf6f00a13ee5e6349835ac4acf0902760af406692d1ffe831ed90ed99336b138ce330cdb4e1484f6b98bd8beae99daadd9d398c7b38f449cad5cc773d864e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c658d87507e5de435a4605c5dd27aa7c
SHA186632246932ab3754e349087dbd4bb81cdae62f6
SHA25629e79679660cc04878f97caed9e31a8db5ab6e0c9e04b58cc0a88747a63affd5
SHA512744e7eb5bf72ceebc5d99b7bbfc96d794fbbe5132619bc7acc15a3759f140a1153641586bfd392085862866a7d693b808d818831c82f0c4f1528378b5ed93c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc4124314f70e97ad5bec47d70735536
SHA18729499d365498f2dc0694d8a1068903c84d5b60
SHA25636ed031977fbf25414da9cada227b6be17b7536adef333a2d380d8eff5615790
SHA51290c69b142f08ca4466b7d2e84c1478539ec8043445f97caefdd8e786b8478d8fe41bb260c1b0de878e1a572b00e0c96895aaefac7fa94b41f2d2d72d073ae356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202ea11f340a6d9435659eeb93ddb986
SHA1179444b2cbaa73df1d94abce9ea33b1edd0cca59
SHA256aeb6d256ea35df37e0effb440d9ce131b3fd5f3eac759acac2719dea8432532e
SHA51272b88481068103d6fa86ccaff61bf6765ce78c81bf74c9065313fda10d4a5d94d427e1a94b7e6c8a9312a8c9917c23bda6ee0faca868fbc3d7ae4a73d679819f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a