Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30/03/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe
-
Size
885KB
-
MD5
3b27806de4152ee59c982d9d67d7f470
-
SHA1
db0835a7487d0a66d38409df711fc5bbee6e9720
-
SHA256
ca4c8f542127562abb8035bd912a61e82d888fc957677f6c7e99f0d3ca32b9da
-
SHA512
38d7c079c6147a4ac220a3ac069e26fb7cc0f2ce2c7a09c9ba6a817b681374eb5717746cd6ad565eef49031de9e07941dd9a55b62f843eb17acfc7c421265155
-
SSDEEP
12288:pANwRo+mv8QD4+0V16jUba1dUHXTDBptaxyNgW1IBG7co5yLyWm7vtwrsKSO2OaS:pAT8QE+kKJQHj3uxBPuWQxOGnhmb
Malware Config
Signatures
-
Raccoon Stealer V1 payload 3 IoCs
resource yara_rule behavioral1/memory/2660-274-0x0000000000400000-0x00000000009CD000-memory.dmp family_raccoon_v1 behavioral1/memory/2660-273-0x0000000000260000-0x00000000002F0000-memory.dmp family_raccoon_v1 behavioral1/memory/2660-708-0x0000000000260000-0x00000000002F0000-memory.dmp family_raccoon_v1 -
Executes dropped EXE 1 IoCs
pid Process 2660 wotsuper.exe -
Loads dropped DLL 2 IoCs
pid Process 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Advanced SystemCare = "\"C:\\Program Files (x86)\\IObit\\Advanced SystemCare\\ASCTray.exe\" /Auto" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\wotsuper regedit.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 3 iplogger.org 5 iplogger.org 6 iplogger.org 22 iplogger.org 23 iplogger.org -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\wotsuper\wotsuper\wotsuper1.exe 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\wotsuper\wotsuper\Uninstall.exe 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe File created C:\Program Files (x86)\wotsuper\wotsuper\Uninstall.ini 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\wotsuper.reg 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CF833A1-EE8B-11EE-B6F2-56A5B28DE56C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000d1cb93737d8fccbad3e8322e9be030c85ecdeb6745500f03eaac83cc6f41b1ee000000000e8000000002000020000000b9f7b36ee92ca43b19e8053c33df835338f1a9cebd5226b41c49e28faae0d7fc200000007a6f7010c54e7c15c322c96ffd9938a57b675a97b5a9f2fde91328b211a2cfbb4000000041f69e8b384abf49d93fb1812e0ecb24bb87453354cd70405fed2cdc91d6e8137af558f8bcff8c751f1158fd943e71b2da294d106a06d0850764400e9871edce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CE2C741-EE8B-11EE-B6F2-56A5B28DE56C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417961096" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400d27129882da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2572 regedit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2592 iexplore.exe 2816 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2592 iexplore.exe 2592 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2816 iexplore.exe 2816 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2592 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 28 PID 1280 wrote to memory of 2592 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 28 PID 1280 wrote to memory of 2592 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 28 PID 1280 wrote to memory of 2592 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 28 PID 1280 wrote to memory of 2660 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 29 PID 1280 wrote to memory of 2660 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 29 PID 1280 wrote to memory of 2660 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 29 PID 1280 wrote to memory of 2660 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 29 PID 1280 wrote to memory of 2572 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 30 PID 1280 wrote to memory of 2572 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 30 PID 1280 wrote to memory of 2572 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 30 PID 1280 wrote to memory of 2572 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 30 PID 1280 wrote to memory of 2816 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 31 PID 1280 wrote to memory of 2816 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 31 PID 1280 wrote to memory of 2816 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 31 PID 1280 wrote to memory of 2816 1280 3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe 31 PID 2592 wrote to memory of 2984 2592 iexplore.exe 32 PID 2592 wrote to memory of 2984 2592 iexplore.exe 32 PID 2592 wrote to memory of 2984 2592 iexplore.exe 32 PID 2592 wrote to memory of 2984 2592 iexplore.exe 32 PID 2816 wrote to memory of 3020 2816 iexplore.exe 33 PID 2816 wrote to memory of 3020 2816 iexplore.exe 33 PID 2816 wrote to memory of 3020 2816 iexplore.exe 33 PID 2816 wrote to memory of 3020 2816 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1eVfw7.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2592 CREDAT:340993 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
-
-
C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe"C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe"2⤵
- Executes dropped EXE
PID:2660
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" \s C:\Windows\wotsuper.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:2572
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1lTHd.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
299B
MD55ae8478af8dd6eec7ad4edf162dd3df1
SHA155670b9fd39da59a9d7d0bb0aecb52324cbacc5a
SHA256fe42ac92eae3b2850370b73c3691ccf394c23ab6133de39f1697a6ebac4bedca
SHA512a5ed33ecec5eecf5437c14eba7c65c84b6f8b08a42df7f18c8123ee37f6743b0cf8116f4359efa82338b244b28938a6e0c8895fcd7f7563bf5777b7d8ee86296
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD57440d455ea52e2c249b1f15fad51be98
SHA1bb239885b5113f2948ec967c447f5e8f52ca47f9
SHA25655a10aac730c34de2f7fc1914e857822e4906a79253f1bf2d3657c16800e00e1
SHA5123030da8c77df927a7494eee0114e48d2e5e3d775ab2e3d5e5e562a87745a9467c8da7bba5ea94ada01d124290cf4c1a41fd9f2bcdc9f8e9ee0985b7b5c97cb37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61
Filesize192B
MD541a700b8140cc3d498d8a320a0e9b3f7
SHA16b98422db82c699222da8bdb5f060687887ca00b
SHA256028b105ee2fc92c6e23b48bdfacee55872fd6d9dbe8f4c94593536012083749c
SHA512f0db6c950a8eda6208f4159ab39faed840136ae9aafcd11db2a396645cad902bb632ff616c09bbc9392c0227d2de95791612f4aaf9d9e746ef2f601cfd4a5e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57df7ef314505f38cde6575ecffc29238
SHA16e406d3cd25e102f62a867fdc16c051a3c2f374c
SHA2567209d8fd24a28fa525d685c0ea6f6caf884c3798ec33c0891ddf3b1dae0065a3
SHA512114552691e0b82dbab3e70eb47d1f89003a04543c6bc4022557c4357105298a18c62795a29a62d0f7b45044b4048004efc9186588b65e23d5e3bcf71a0fd3414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5789eff4919ca5336f562e0f3c9c50c2d
SHA183e7886b4c3b61c83357f7e4fb980c97a987267c
SHA2566dacc6b9e5f8a5da792a75855a7b68575d040158da8f72bf40fd0c1c504b619a
SHA512b32f03e437b23cb268a51bfcf3978a1c2a6b03c6bedd165f7aa372a070bc8855604b6a5900739ca5b13d36ccc4800660f56fc05e874bd2052887c0e817390290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f708b0416577b1241dde1eb914a6bab0
SHA1e70b856dabb6ca44f431e1da779368f439cdb39e
SHA256825dc2566c9dd9ae3add9704470cad770365e64d75fdb1a9e9baf66d344cac2f
SHA51274028fa61f3cec681f76dbf0e8d0ac75d16ada2ef1f78fdc1b895e016e2aa0a20f9ec0a8ae602c1fe4ba7e228f28ce7337bab197e94ce5cbbd10f20a8fac5b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8363e9a745ebb1c629f8be50c9ab9a4
SHA1b05045f8e71918e35848e24182799c7df814a822
SHA25683332412ec8a08472264de6e9238cb41d9abbd507f929b882a0bf3881f7e0f9a
SHA512289dfeb289db562a49ff80d1846b85a8d12f09dfafd7be5e8f3f7566d462f9be581ea51bda231811b122bca9e2b581fc5b5a6d5b4f239c1518954d9dff9e46d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ab29156f887ecb5844ba8ba981b53e5
SHA1d0af4116621502a4a8a197d46f12521343b5f668
SHA256cde8eadef5a0ba211a509c979e422a2d99c022368c90a58d87f02524291e974c
SHA512700a618cce781de8f5bb88ff0c656a847825314d8e58b755c44a280b072deaabfb4ecd44602993b0b12c4f5e70eb04809b0b30cbbfad8429509605d953e286b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502744b6f04f73c199c766906cb60851d
SHA111ae1dc0a16d535b1bf44e4e1cedffff3d935077
SHA256f9d83009ca73a477cb88efd0ad49836a36b90de7d92c296c7d5f8c884a8d2e8b
SHA512e8c002463a9e5a9e88f9cbeafd0e23b90474173cbd4d37506637737c535e245fb9ee78291da58a455e1a6f9481100b3483655b24a7036ba9457f501a0dc27af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb5eea7f792c6e1ed392434bc24301d3
SHA1d063e575a2bac4039ab2656de20020c7a0db30c5
SHA256a7998a5327c208d7b7dfd042b719d0658be6f8e40075b85bdd35c97aa8015827
SHA5128bb496109baddc91722987d4a69585478319bd73671821754a54910067e5a9118ca56163316af9603e8160b6bc360827a8ef5861cd9d86240360b13d9599c2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea613bdb74528b3bd839af9bdbc4745c
SHA1592a465f755fc772856b18bf9d929bfb67c3d63c
SHA25647669c4c3e0fcb9e1e88f9625ceecd1c4249158e1cfa67449c7aa51d7147b775
SHA512fdd66e196d48eb8cca59c6fe0301120a6157090c4bb122ac1ab04f1845bc55c524687991082f6f308eea69626aee5a95c452dd0d029dd649edb51cdb9d9eee4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5062ca71c05d31852283c14a35c598faa
SHA118bbb62dc09428a27279608586ebb9c7edcd6450
SHA256f58b4f2e2d4295a06034b36f8a977105fb15b1c621e06824809141088b12fb8b
SHA512769e1d07b8bd8eb383534e2a6dc94b7e2306679c732266d75bad704d218372a45a5fc886a7e9168273b3dcb0831191f55b8e13608506b8dd58556e3993923b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5128167095637b4a7bf7bc6f9dd386b80
SHA1511c23cd81dc863eb473ae3f5672de24b04613d4
SHA2566d43787933c6e8bc4a94b84bbfdb4843015c42639d24487649bc5780e3ed59be
SHA512b2720eb5b44ef77c34a8627e310b85714bb4ab72caccb8684233bf74c3c6d4fa41a2c01e2e4dc05e25fe5b8922abc97199d6f61fe21d19b1522e428901b47fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5ca0a5d9ea59ccb7058ee5984d0054d
SHA14361fce6275b3ce59a6a1f2ead057fe2ef9ef548
SHA25688a6fd365549f3a64d72848c0d8e7c6a02f8c846627088f6a2b6f288d760f6c6
SHA51256dbd2a8f04f1414a1151645453b22868ec3ad7251f40ec3102a93d27baafb3e7f1f954862fc5f399aab4d4d1e207eec1a9848b0b9d981c3675fef3f24aed261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc0d7ec7dd7c55e44922b0cc62d4da2f
SHA1de09800a46dc2011d5b9924c5ad97033a105dc0f
SHA2565040a620748534e21397392bee907724e0004616e5204f7ec829e63a9998bceb
SHA51263af1065c15ea09dfcfcacf79d0430f6cc33a0f4fce694e5cc78f95528e8a7e776fc4b67db2ccc01d0b49de3c7c8293070aef3be2a1d30e545e310572c875f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7c20a930196218c21bdd1052210e6f5
SHA1e58bf3f20e1e2e55b98288f202163e86d9d91035
SHA25629f53568b3cbd780dae8e6530e08bb6d73e05f60ae104df655ff97d6047ab1a8
SHA512f9fd59e05eba7bb51b9b5cd4315054711dfb82b269265d43b2f75a4051021718c1dbcc4e4724b0c92de74dbefe92ecd0d4352095c24a4e09a3ae11260d7882cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b27ad74c336a3582d81721d3dbe5fd3
SHA1a4f5ee86e934c91ae4bc92e3e72c8521807901c3
SHA256f2f2084c8aa4646763e2c25970375147df46a5a6a554091c8b7641ff4b373805
SHA512fe0fb9727dfcd04ce95c78f0028e48de722bfb7a0b555c14b54d89d9bcd585e49eff1ca3b0400d3765ded8400c6af8c288f2b9053eb7fb7af5015172b8977b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1f6bd1cd14fb67645bf063ee6b91faf
SHA158f8fea16ce523b5556e5b169451bf58dc8a7e69
SHA2562b108db26845c60326960f4c050e0c6ccfa6fd08ae5c829af8c01122f2680eaf
SHA51229c820816864d8e1890dc0bbdf2a4e4d12d1b9061c37b4aeccf587ff57f051bce48d011b92b0c939bc90224fe102ef057eb6f567e822d3d8366bc71dbc5737f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bec14f172f1f34c278782a7aa05bb00
SHA19484fa5a5ec99eeaa02766ab2728acd3dac69425
SHA2565f3b5033cd0eeed300410ddf535cfd20841ba89b14e144436ad032579507a522
SHA512a0231e1a6a9a064c7cadcf3d663a80c32a6f06abb3db03719e3b0fc9b92c735212d6852c18f30fe43633bb7915c714119a45f92a662f0d5e480d0db55592f60b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e134b77b05a1e62a5dcec3bdb4ca43be
SHA1b8c71493a1aaa93722f20a24aaeca9df9264d869
SHA256c8bd4a8ec876bd040749b86a5746241c3c29476564d6a7f6945fc080783eb13e
SHA5120605eb11f3d9845b27e12c3aae46cae34dd6f278fa4cd756219e3c2b03f2b00de2d9ddf90f801480ec5899d40705524c41bd7cbb92ecab9f995e90040cc149c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac601a186141bbfd73568cf316d1b294
SHA13bf4e9dcafe031eb5d67b45d595137be5433d0dc
SHA256054bdc7c05765d9e5433e487b103e78ae69a2fb871914ec43407ea1b91347c99
SHA512ab65a2760dd9a84ea6df4024158ecb2d1fcc485b8bf96351058bf85c98d579b2366c5228a25910400086ef2f5b9bf20de0f579973a3b19c1db597dfcfd13958d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de2417558480d35ebbf076e7b1420b7f
SHA166a0d6a1794b526548bcfdca8fbfb9b55fb52e16
SHA25615c465f32c2df425c0d624f6b7b37bde380f076a6548658ee8fc6fb0801410a8
SHA5121725e7b73f16f3d5200aa8a9462aecaa459ee4e66453faa90a9d1270d3874b1ccfd28debff31425e6e348f4bd7c94552a3b599033dff2198513542f13c13d0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521469eeff02d4658aef1a08c7b1e04d9
SHA1dd72bf1863447007e96a23b3a2e58964ccef5dc0
SHA256a0878224b828b58c7ebcc52f2797e2b76037ddf253f8db5f4d08139d29743633
SHA51271be76e305d2f6ff6ee961362cfa807df84e53dda813d58f11ec214299369e4d76c6e395c12268a191e15c579b170ed7d2372c89e0cae35a042e51c4a8f00003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e86ba0ba8d8ccfadb36b6e69c6bd32f
SHA1addccb3bb8f74eda3d9f8747c895e7996bfdbe38
SHA25645a84126197b80fd5f185246334007f91223004b58090a9035083c0106c08f02
SHA51290c14dbce6996a9067241b3209ccd431f3a8e03e54d2487de014d457e97b919fe104f9315ef090f9282b2bd3fd8c2b8086ce91ffb88ea0a7d82dedccbc741ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f76d2881e2f02e84eeb0801efd8c211
SHA127df46abf9d88c49576f31c3b1f8093caa48bc3d
SHA2566d3dde0f9aa0e7418ce212d378d658556048ffde7e0af00abd05c9f5885e7ced
SHA5121b5d956a63c4492d20c451d544c55555f6cae0f3c012ba4a270ea04e03b7e94663483ecde9d4dd5dec0f4792d9df631d3e1fd8a35731785679264e8da570dfb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d428c1b635a6913ebdda4b1c5350d6ec
SHA13ad743f110437ec160d076b79023c2c6dd2a71dc
SHA256df858b1efcfce1bc0d25d1a97d97ea25fedc33f49d330108038fff0b2a31a7e6
SHA512034cc4b17d095d32268e6a76150fb0fc540e11407def03417820a67122473ceb40656b43f34ac6df09424dfe4de7f8e0739f07a23be3e47418e33b1461a7ef16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f899c04112cc6110f23da4058503e886
SHA10ad33c8d925397be4b5a7f41106d2308d89d5f30
SHA256a0fd439d86c8f0d0eff301787b19940db73965f09d0482817535df077aa848ce
SHA5122547297fca2faa087303e313d6782c40ac5e99f8e89d2f20199e7d026cfafce4c87577a5c83aece249540f2a640107c402dd9bbe05183c63c6b85e75e07115f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea4643334442eb6faada6093868b8a5
SHA1e6be0f3a3470180c897f57f7a7b0c4ca4d6ea9e2
SHA2569a28135b219dcc6dc22ee1d7d35cac498122d7b645bf9703df9170fb594cc429
SHA512f7077dd61b64e8940efcd3a9bc301cad608e463798750f710666487ee143abb09e720fe5474e06f141c999d024ee18dbe4d106b2f6bf8bd71b6880b936f5444c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548e7c9dd4c1c6fb5449d12a787f8221e
SHA1f8fad23447730c20e14f69806e4a2e22329f6655
SHA256cd9c7f3ee4a8cdfeb9adac51693f8b84a8a70aafc9afd463d518ca4c90d366fd
SHA512da4794511110ebfbeaadd75dd271cd486d048d1d83ede816837d44d59d46d58eabe2068248ff99bcd375c69ac96d78a11e8df62cc3dbf28d2c7350662ec7157b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6107c5cec6d40f88db18d0a051cc900
SHA17d44a1981607555795f65d2b3720c2294aabe4f5
SHA256e75a178f47037c6de1506d0bb89d70cec8ff17c42b1d7e1da8ce1432a385eddb
SHA51200a3acd1593b31171f5e1b95c239ff2b27e619e71280b83f3a81b95ec481f6229f394d515e1755063c77f2021169b0f2cebab73624121643565fc1c0fd4eb0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51898f0ab9cf7755f98c47f5c4a8c024a
SHA1f0cfa29712e4091a590db4562597212fd4455230
SHA256c6e4d1b215b938dadd5339402395b2ad81615731cf2feee22ad9fac085fbb5b8
SHA512bb3bee4d6eaf854e0066c1479d7bd7fd719f42712f19215af52f29750b5641fa953267b43ff81a9edd1ebaf73b2595152f84966c33df68c4883aa85519bf5daf
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3CE2C741-EE8B-11EE-B6F2-56A5B28DE56C}.dat
Filesize5KB
MD568f75ef9cbfb27b75df2f4d1b02f8ecd
SHA1e346dacc781093da67271928e10eee6f882e8a1f
SHA2565681d70c5aff45d2c76961002f83e6cab11365ee49efef323e4c5240da3965f6
SHA51290e979b2f4bdcb8718a7bbd2eebcec105cc154b60c00a37622dae449a5026a53d086458b7f0c84381339ff75ab50df3ee75d2beb0195f2224d438bd159615360
-
Filesize
2KB
MD59b5c6ba250839ede60a51964f214c068
SHA1e768ceb6e62415e2b8fbe18239944db576d6dbe8
SHA256cc4cc140666461a37b70a047bdc1e58288c7139b023cce1043aa1febe3d758e4
SHA5123c2aa7ea6f832d681a0d32c272adbbb165c2153dfc031768a9accde9c901250148814ec9fc576780fbcfa3b76818635d76c6b81303d712cd1e27936c17c435f0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\favicon[1].png
Filesize2KB
MD518c023bc439b446f91bf942270882422
SHA1768d59e3085976dba252232a65a4af562675f782
SHA256e0e71acef1efbfab69a1a60cd8fadded948d0e47a0a27c59a0be7033f6a84482
SHA512a95ad7b48596bc0af23d05d1e58681e5d65e707247f96c5bc088880f4525312a1834a89615a0e33aea6b066793088a193ec29b5c96ea216f531c443487ae0735
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
164B
MD5f67083d94858846ce2c965a34919909c
SHA1c4cd769bc2863c71908c413e567592be377a6620
SHA2567332b2f6328f5f540fe79ba86e380a238d653e25c36fedab44e3062d3fce4c8d
SHA512b07df857e68649fd3a75c6ab7f2b15dc88cd68cd473a630b9f7a9e9a9b0b21a4c6c15f7c4b20dc0751a4034d84c43a9e9b02d8b05e3b2f809bd291a0a74a9f08
-
Filesize
243B
MD589b82e161cfff8c42d3dcecd45df3a58
SHA19cd184504c836b46c22cea797a97026175044a27
SHA25678376e5930c4814164c52ff3079d8458877f578973c5b24f50be4897977ea06a
SHA512f194f2aae1fde59974f62cffe55a50bd55657c488cb54de944f07624f614aea73b5daa13ba1ac77b261a710d5e123107083dbfad36b8a1059f6335b97bbddceb
-
Filesize
450B
MD542f073434559fb6b9c67aba86de89d1b
SHA19b969de41fc717353619068e46f21ec1db093ab5
SHA25603ac69047bce954fdce3d00af881161a073f921d73ff79369e9ee96a109f9eed
SHA512b1ae4fb02d7e629f824e084c5cd81e17be3bb37937eed7a1bfcd6aec0fd1cfe9a7299ecfc35958a5d98d11941fc6478e653b69140de02cbec28c4bf0647bd547
-
Filesize
490KB
MD514e3a4fb7e7f51c099e72372e2bf5d82
SHA111b4c01ae3ab9dc000fd1534846660983f6dc527
SHA256ca2638676aaa3aff95d83564ae8012a6e3d5eabf2d710cef3eb372af1bbda4db
SHA512dec12490f346dae89e0b499ea1a8927e0c7e294638a5257276726c44c093e2bf547831259b9d60ed13b0430ee7d03dbe97a1898b5814cc2dd863b63da2004f9d