Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 13:57
Static task
static1
Behavioral task
behavioral1
Sample
13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
13078ac1461aa3432e0d4bf40a4be1e3
-
SHA1
f6a230b1675f2e53ab426d7a65337154bf69e1cd
-
SHA256
0d5b0e657e351bd8ad74d4d12983c5944f3efd53207271f9b5b4887856a7ddd2
-
SHA512
75ace13775065b47316249a59898019d32ac8f5c3d560ed17d495e0591563466e4d9d923f7e65c923eab38ffab1ba3a11b28c315f505bcd21779f85452684c04
-
SSDEEP
12288:3sM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQC/:cV4W8hqBYgnBLfVqx1WjkP/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2300 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchlen.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000002dc016351c4ed832c4f5058fe5a1540776d06af8df6f8190c72a5396e86442d8000000000e800000000200002000000031ae76034048c28c54984f4c989912b4234f8fe02a5a933db64b4ea5363951d620000000e366cf266b30a6a3f09150cfb6341ebb49eda313d015e8dfd5bbcb7666cd5b9d4000000034e087039aad942d7928d7e385ac80404ce816dcad671888fac50e4b6754b42086f1d18a25c1a04e7ce8b0c4f8278c6b06d0139d0ad542faeb9f0aedcf4beca3 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\{F915D477-E541-41B9-80C2-BE424E1A9AAC}\DisplayName = "Search" 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\{F915D477-E541-41B9-80C2-BE424E1A9AAC}\URL = "http://search.searchlen.com/s?source=Bing-bb8&uid=7735f642-4e2d-4980-8942-9f11fe37573d&uc=20180111&ap=appfocus29&i_id=email__1.30&query={searchTerms}" 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchlen.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420992924" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\{F915D477-E541-41B9-80C2-BE424E1A9AAC} 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\{F915D477-E541-41B9-80C2-BE424E1A9AAC}\SuggestionsURL = "https://ie.search.yahoo.com/os?appid=ie8&command={searchTerms}" 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c023c91b2b9eda01 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{437AD9E1-0A1E-11EF-A3B3-6A83D32C515E} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.searchlen.com/?source=Bing-bb8&uid=7735f642-4e2d-4980-8942-9f11fe37573d&uc=20180111&ap=appfocus29&i_id=email__1.30" 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2556 PING.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2388 2276 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2388 2276 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2388 2276 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2388 2276 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe 28 PID 2388 wrote to memory of 2544 2388 IEXPLORE.EXE 29 PID 2388 wrote to memory of 2544 2388 IEXPLORE.EXE 29 PID 2388 wrote to memory of 2544 2388 IEXPLORE.EXE 29 PID 2388 wrote to memory of 2544 2388 IEXPLORE.EXE 29 PID 2276 wrote to memory of 2300 2276 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe 31 PID 2276 wrote to memory of 2300 2276 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe 31 PID 2276 wrote to memory of 2300 2276 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe 31 PID 2276 wrote to memory of 2300 2276 13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe 31 PID 2300 wrote to memory of 2556 2300 cmd.exe 33 PID 2300 wrote to memory of 2556 2300 cmd.exe 33 PID 2300 wrote to memory of 2556 2300 cmd.exe 33 PID 2300 wrote to memory of 2556 2300 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.searchlen.com/?source=Bing-bb8&uid=7735f642-4e2d-4980-8942-9f11fe37573d&uc=20180111&ap=appfocus29&i_id=email__1.302⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\13078ac1461aa3432e0d4bf40a4be1e3_JaffaCakes118.exe" EXIT2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\PING.EXEPING 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8
Filesize1KB
MD5675c3e761ccf25e172b9d0d9fa78ddc6
SHA1cf52a72f2778f30949c28f8a0016221d44b48811
SHA256e4ce7a4e4b4f233532e4791b55cb195f449e7870e3ebbb7e72aab1c60911893d
SHA512490178cd0d70a954ba7c47476c4cf8c2561042112877368b687783a9a3883b6ec968bfd6d8eeacf91dcf01f12d702e78b0effaffffe4d1d53df39c6684ea113b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize471B
MD5ffb9efb3cc3a6418698e81bf348291a5
SHA11624a6f339845754a112752351829decb22bddd0
SHA2562e3a45e8161901e97f9ccbb1d19c539c7a331ac9ede64baff93edcf8d3196a30
SHA51277eac0b1d5ec1a35ca18bf8146acfee94196f37bf704c16aa908d22e72451e2b24fb1ef91f9abd66a3da3800b76fb2b04810d27d322db318b8f758bbee97f3ea
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5233b60815ad9b1d2f78780451dcb826d
SHA1d2438210ece2a7ea7c3b7ef1abd0841e92d42a6a
SHA256f348554cd87ff1c22c3f698e06599ce2afc5ea9e538e10ec2bb9c403800d150b
SHA5121157f1d7edbb8f1a2e9ff562fc13b111cf4c3080eeca166c1cf0f16e6511c12fd1a998f4466583e67e124fbe66d1c5307edcce1711e64df6b3a467fe547bb7f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565451cefa220a5e394bc4fc0ae60f535
SHA1c874ad98b7bb45e02cecaf45a271c78a60d29ed7
SHA256093ac3179f59b0dd57cb36ee873ed674a9d678fffca7ce161622bdf6be88888e
SHA5123b6ab258bb1f014b8cb937d9a827526832cb25323be4a28cb683d168a0c335f70382b8a218aba80b917e97a179bcf8d376d1efa134bd6c74c683ae54a0b448d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593c2069aee39edfb3216685cb8f0cede
SHA16636dcd131b9fc4dbf6e57c72d59194c9db7c3bb
SHA25639aa2f80541ac77e914d350d93a4c717122465aad442ed164c5af557538a393d
SHA51254edb17335023f3a42780cf6923b2940b8f4f9161aa147772c2bfc7cd5a48272ed31bc957c43efc7e9a768ec56be9e46636e37de620aeddd0384f90933ea1dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f139b7e85b5e5e4553e158db4b417ab2
SHA11242c7fe2127be4269c3f8560c3711515bb24541
SHA25659acab094c08d644c04044a13a16495694c625cbc296da69f04ffeb53840cd34
SHA5129dd0920e3d857f073732d8ed0376484836b6a6ac90a6d32bbfb8db14d979772e022b4499b4202e18307f20161e790de6f8f0cc96cc4cce9c3e6adfa11f90d520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be4ece30a059ae13c7042bbcd19769f4
SHA116dca42dde4fe7219528bd51e5ce4ca382935a2b
SHA256e12319b8758a7cb899535e4350e9edd23d22fb4c2e6fb7074c8d1a3ba4cc4702
SHA512c5e0bd2a140ef1580796fc97d13ae91029bf9b9406ac25c063dd147e8696c0bde77b399ed39d06037d8bbac84f047ba99cf0f7fc5ba513b833aa78a9dda73d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e1ed3097be654d5535cce5a00226141
SHA15a1486df62556f4046bab61474515f5149c0af81
SHA256f95bf5808bfd89f5d9bee1a9059ed9a119863b24ed37cceafd6ad2397e4ae6b8
SHA51221074a493a882f3d9057d8aec7ecdd14eb52d0a4328c530d8540571a49f6cfb794ff11bde47bf22242dbeccdc378551947207cfd53bfae8c16a19a00c90b3625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598f792c9449b24741935ea7563256329
SHA10e57a1301bbd3f55a29615bf5dc411426b71a14d
SHA2564c24b68fb6c86a4602bf7d82f3fac312c531c6a9a50e0735bdb3f368cb6e75e2
SHA512d8143794e06f9e0280c94ed9910d4eaf4cd277cb0739fb717f61db8de353399cf373e2ab90e6b79db43b0d2d242afdd2208a7fcc2d2d62c761cc0d22badbf37e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5382849490feb9e0b822d45b952aae72c
SHA180d68697f3c7cfc40d7432fb9687b80447540aad
SHA256bff44d8dce7cb4111e6e5c9a84af2a0cbb10af32b9ff61ff02fc2fc5befece9c
SHA512d04af8e54a3c2cf58971ac3f2ecbe8d3d365a66a45fc3232ebf68178c0f8a89fbb59a377183922e14ac753c52f172917fa40fbfa50bb8df7a79cf5e0427111c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56166abf0d5844da1a01496a240d6b351
SHA1ea15ec58ba54fd7fdc575b470a464e26094b6af3
SHA256368c700a5e65297e36f273861ac01b89755b8c4191ad52f30c9201514b83f332
SHA51238fe26772f05b11316af405dde808545986de40f02185cd9db6e1c7689d87c632feb53acd0418f11109710f6785ea68bb17e30b383a01614cf48edc6620a5657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589748ccd67d28c298e0052d8ed22fea6
SHA1b0dc92f102c7bd28ecdc81b853c81ffaf854c33b
SHA256aca1d18e9bfa08489e0c643daf69b10e658a06883c4c25fb177dadd7a75a6465
SHA512b997ee619f527e1eaabb3d78c5c33a1d5d75451b1b84109e26e432ac0ada22f25c873e620f819d5fa1cab00fb41f30f9502366cc79fc57ca1bf895fb809ce9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5204c99fa6811927a0f8e4c85b446712e
SHA12c501d6b47356a930cbd4a644497b4da05c45d86
SHA25671670ff8e7dabb42ab15daca441ea81284fc75c36e821b0f821d8faedfb39737
SHA51239e3efd706336108ed2f1b405e03becd369d834ce39cefe246989b47c8edf9e713d554d0f0386c688cc59c3793baafcd296ae205cb88e550b718d474f7b7e53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535aec2307286234e5211fc5ce0293ef6
SHA1f553a23f73f716eb98973564f3c09dd33457f5f1
SHA256804d82417ecca68de1620295e7289ad506481b59a678fd47936881f6d85a7bca
SHA5129b56114054902c0ad2a3b456be448c52cca3272ed5dc9641d05f952e45cb1b9386268fa63bc4de371d1d3a19cf0f513cd3149213e4f2f580d9fb6755e0ec23f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570450b62070ed8c83a8a09dd994bbe47
SHA17b413c75aa8162a2bccd25c7f2e7139ecd5a46a3
SHA256e7b4fe4db9997b250daa9f8883a49d60c33012238fdc942008bba0f37625d0bc
SHA512fcb8e650c3291df06e3596d53f4b39c6b7ffcbc9c33632d4c7d910a75bfe5dca508efd11f09eeaaf76e24c2830b6c7467e1c085e5553c2b3184653a90507ba15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba73711c46176e410884fdb71b33f4c1
SHA13cee1daaaa91073b1a7c7468a1cff71769cc2201
SHA2563b96fa3a1fd0ff9f068305913fccb64f13087468d19d2a0414e4591162983d6e
SHA5129d26b85681c370b6010441de2016e189a14325dd527cc319b8cea98205f7ef7c0844d35e721c672f7669cd7620a121dd112fba09f2f4a56bba8e7bb77cce906d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c672281b6e1c085db175dc5c6ee272ec
SHA100c7059bef7a6354452f8dfc98cbdc362c3527b7
SHA2562760af41412cb32ec4d4edf95962812c30cf9bdaa3d86f9967e24974489875f8
SHA5124add13ef64bfc774581bac444073b6c3486b2ea33bf1092c3de5c04b06102e7a9de5607dd53d03f87c74426dfbf245186890f382583dbcc85d9da78dadfe3348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53942a26465dcb0adbbcdaee0c28a499e
SHA1e00f2dcc11993e001c3db48ae4c742c2e82de458
SHA2569dcc865d1965d3612694938e7c1a006f78755b6c09f1f28420e6420280f3de3c
SHA512a05e10344710d28da4788c31ebdbee3230bd0a76ed103d079d83ed0500221f0208ed6b58b2439e375d6b779ea51be487eaf89a026cf33b20064735e965b99b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc22d9ebef92d43e742aa0f0f8b837af
SHA1b1b529803c228f2b83ba03850c2059846c44e3ed
SHA25612735a754912777ea5d0d79c27751f0509a5d94788f2b89bdce0713e6d7660d8
SHA51230ec82bec4272b5696bd14a087ba9020f6244ac927b7699e67de899d619c2abcf743bc246d84a3a616ab5b851bb3bc99b7b3050cf54389b8a4e9e9753221bfbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a51951b885d707ae442930198a465f
SHA1f3b68a361953f151be9396fd07205c6b521644df
SHA2569429727261a17f31b69b160e50968566abe557619eda9de23b02f5239b9cd9ac
SHA51299d69786a6c4786bee30b5b74631391f83fff3164deee3183878bd3e8f184f659cd69ba24e1503978b06776453695d319ff635de39f9c2b2daadc1cb3fcff5dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a64a9d26ab6d53ac9e1808c0482787d2
SHA1b29193e178f3774e812169f7b3dbff2ff57dd64a
SHA2567ff7ccf3c11ada2e3add10aed62a83f8e816649e5ce2481457f2a4be5ca2a335
SHA51295519c15d1662020d06326691bcbdb66d767694a3d366cc283d58c392f3155057d0819d02255421558e33160ae03ed5296a66eb95cb9e5a8320cc4850a909f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a38f4841cb724cb92f11c3f9718ae5f3
SHA1e158dbe8fae18c97c9713ec60db89bdd9349efd5
SHA256560f8bd2d39a31d2e381a5316710d6bb25a03c204bd1d080cfce41f40750829f
SHA512a59813961b55067cc002ddb9556419344d636d75aafd9098bc79e474f03e3c2181c11a0edefb050f0ac4af43982ebd212b035b4259754a3b423a67324338b1b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9af38876bdb9e6411cefc48dc63b24b
SHA1ac3dcab48e8cd1d88994ca4292ecad5217cfc100
SHA25622d9f3024f1db0909e407ec8f6fcaf654b303e309ba0722f972269c835341b2f
SHA5124eb8a0d87a390b859ac57f47b259a7b9553be4206625c8b71fba1426cdd3e355d9e48d3264cb1249a1ea90698b2eee478831ffb316d3b2e93d8a83b9295a5fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564770db0d8dc9f5d37059327e9186e64
SHA1d0283ddf8b9e1d10a57b9ae914e505ecc2996871
SHA2560364889129b4d09881d6ede3488541904d347266e37dd8db513a21c1d8d16d24
SHA512e3c6130dd751beaf3a2fcb54f68d051396e5ffe5829da319af73d08b4da8170fe59d14bd216e4e5f9b0ea24bd744105d84f35b106421b34a971c0348ce50402b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c97afd0824a8d4e49e6db289c3dd50c
SHA14ea5258e00fbc58e11b2302b9eacc3d0abb312d1
SHA256e46a5827b2b63db8ea5ce4275f09d8e38f016d32e7dff8488f73e7e3058c1788
SHA512833012b88de80a2ffe897ae19de2af7be854d56c4ab35c55ac4538c090c8d5cec3044b3cc69183705e9b363b4a7c948903344437fed89dc60d2a190d2144107e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea4a5e9c1a8e68452c9c0661c77556cc
SHA12987db7a2d550bc916241bcdbd355ca5f6b55542
SHA256241bf26cb1fb818c6d0d7aebc00205b596a21018fca69ca02d40a480cdb0b9c4
SHA512710e271d955d66e89e10ba8a395f08cddfd4a46310b385da2239d028cb34568af8d4c18085bd4730eeb583a04ade931b33e8a55965a055fe443d799f594ca4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c847e517180229661e2b610ff73dea36
SHA1e7e4f9165e3f564efa81fc780d5c7627bcc96215
SHA256843b308acae37cf5bc2d3335c3078b247976adb2339127c3a64e5e822c6cb255
SHA512042443bb56c6d8c14e93279fef978c8824021391650b08324f605ed21aec260532cc50743f4ee060a68d452576790e47a1bc3b0aeb4810d79171589d874273b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ad43ccf3a8dbaa5556cc85dfa571a81
SHA181b989463e4f3acb46ab78cc8f91c6c580f65ac9
SHA2561d5f2951b28784141a66e0ce9b49ee8aa428b53bddb20739e3ef7171db0a62b2
SHA512cdaedf680289c5a6ffc1a5539803ae85746bcadc624c15601888ce31df61c8b214243640bd0699358059b37f09ad21273bc29e7fb6f2aa7f2a76c9c80d28e598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c558661cf032cef275690a9b5a30ab8
SHA1a54bac75115235d245b74e6db4c1dfb4c81cf649
SHA256a40a9be42544905c9d5086e2d3f4bc13f9ddf97bfcb5acf0d9c725f88443183d
SHA512a853f2855da809cf09cc089b4f4ff8589be8197fe7bc98517a563b43dc88fcab55c97ae921da918cd082465bf1f01a9f348963009d2cd3877d1d73630a3ceef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5f402e97ca3baa5f0f2f77fcbd64935
SHA13101508c56c5f4a1e09e1ac365ed3300336e9d6c
SHA25618589aec76f1be8059483fe60bbf8f4f695031145fda85ea529750a09ca6d320
SHA512242b28d2f5bf92800d4fb35c1d2d9068d5b55a4d12ffb87cdd22212baa7de99c26299fb8828c2165976bde0dd452c74e38573420cf372cf72026459baeee87cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3354348aa637c4ef0f4c6f620e98155
SHA1672a6cbff4832ad2479f6173230ed60b76e2729f
SHA256a785bf86c65fb0b802939d78512d207711974de094b321d485fb6abfba2a2dde
SHA512b0fa0ef03b1e9ccce8dfa0b8c782672817f159ef5daab607abeee9f9202897117289f0c8420319954febea1004a59b6913a14eeea2d76a3a3697d6e98ea6f682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50987dd366b7af9560439e8e955c92e63
SHA1e5d75176ded542a19b83b4bf5b6db0aa49e5b6cd
SHA256d3a3ab52111ac551033e1cc71661342e91ec9449231f0b27d42e579216b56c3c
SHA512119fbca33dc76e6cd14b426099118ad7d0571ed10700a479210a7c42b6186af9e716145f3cbfd76d22587d36bcbb3b89374a8013665b5f360ac87398b8637a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530a6d9dc79ec43ac5e57844f0b5ac428
SHA1bded6da5d0941122d2c0768c3330881d50b01ea7
SHA256bc34a73817c25e58b78255ad7a3ab06f811ea66f971b6684e8b4ed3dce1af217
SHA5125cfc3a4f60a71316e9add13d80f7422dc52bd1a684916b72db79c796610f45396d2cd4b83695f590173681ddb3538ea05599a6d04326cb2b0f6a0f0d5416c63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504674c24de43fb126884eb9438332bbe
SHA1d8a736bc883537658f192705e4edcdac1bd77034
SHA2569ac9e6807ae683978a54298520701cea31483103a2fd62b36bac199f743bd45f
SHA5129867bd0bc1915117885431b7c790254288c30879119ca677da2ba5521fb52325878b3566c139ae248f2d469fe0cf85257eb67a54f57cf97cb30c594280f8cc95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538723eece039ec69473b80d044650580
SHA1ee5da07dab1b4b23ea58d6972ed58d28bab8cf9f
SHA2565967895ee51d8af00faae94a1c0c8ee374ae2ef3a2a9947cb48ae8b65308e78e
SHA512f827338b65bdcd848589391510c20fa3a5fef3e77c67e4eb456cdbc40433ade80a5ee69feddb35ee4bcc95909593f7ad47bc9c2d6fc6918fccb6110250868524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc8c87aa1d818d495db9b323769572bc
SHA1f16f099507664eb31fec624bdfcb720c59e10e0c
SHA256160c5d0fcb72ee258e223136c913d59cc891fc6e716ef8cd0ffbc4de5b7e16cd
SHA51229a0015f901a1c151d223f0b01098f7594162f84f710969658c066be2766012021738d1913aa4acd28511c8c9c5b9c967ef74035b960d40285b8cbbfc7303dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514758bdd836692766baafa316a26c971
SHA10188663aa2c926294e74bd7024e75d278a23b0b9
SHA256af72da89b601d7070a9a53b4076dc8642c025bd98480307816609099c5c7979d
SHA512e23de40b55bb2e864c1ced5b3a9a85326e50c683495fdf9a1e5dae2e9a3b1de31597257ab2c80b08e7d52f00d67d0a272ee8c23e5e8128cbebd70b2dcf15a0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508dc24a1ccf66158a0c14a909420f5a2
SHA1e51c67e77b8b8334b310af1eb91c414b4c0aeed2
SHA2566d0ced6c3cf6c72f2ac510f8c14cd11201bcf9ac5ac3456e93a32c82d089c3f9
SHA51244fcf9120aba7bb12a9e2934105794e3eda24b67b996c6bc43e7f62c87f0cfd3e16f8e96438add42c22ea43da2a3513758ea22981c4c2416c63429b6f525e779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb514f0572f4ab9f42fe1ecbde2cf412
SHA1d2fcf93d316af12d1a764ddb6b7e66cb23a3d2f4
SHA2560840244b6bfb3e0fc68d23eabe11c031cf012d26ff1bc02405129ee02659d1b5
SHA51285710c1ee085365c4829429b97af36b592cd4ce8fb4ba86a277c3af075ae319545a310893379f4b0cdfeeec28d1dcffd12669b2254805b5c7da076c2ddd5bfd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize408B
MD55d6eae3fcc9932dc81a4d89d03911a9d
SHA1559ba474d4821a5a0251bf27183febae76b7122c
SHA2567d11e6bcec015b38cdb37abaa6af4c4cadaa1260c95c72e3c8392af22c8e6bdd
SHA512d192b6c2f83be1edd4a67021eddc27fad3a899d2bb64ddb35a816ad8662f90ccca7ee0fefd7bb409573e64998a4c1ff3ef4385d4258a326ee5e706b2e5cb70d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD572a63f9e57f7bcfe1d905ef7fab9d86d
SHA18872f01773842de04a6c9c846082030fb2ea921b
SHA25600416d5940cf352391b97a61b6dc9c17adce2b4a963040c0840f037caebbda7c
SHA512858d4c06519400f5580bbe309e51bda1fa34dc62bc0e38f985b082e9ae82e7c7dd849f231677c714f2ea2e107359c78206736c213cc64ef16bb15cad32886c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59583c8e2830f5d98ff7722489d669d75
SHA1de7be7a7093c9eb7aa9f5c096639f71abd7f91fa
SHA2564d80eef83097900fe5f33b5096a2c86a084b93f01800b448ee9c4fd025c4bf30
SHA512ed65e8f3cf07b4bb133358f77bdbe52ed64188098696d6dbfce4a73e9e583b0681732a448d6e5f3664d7393f5f77087c0ee2893dba33ba6f077a468352fc6a37
-
Filesize
110KB
MD56d2cc5e20c87b0d785c1ac23c579ab69
SHA1fd46dbd5ad8c1192bc07b55c846a3dd8167dcc77
SHA256285dbf9ef9c78b41e9a72aeffff135048a26022d4d7926303afbccc45e421267
SHA51211bc439c1f8be4e0772cff6be29f9ca4defd487f4187faadd59cca6f00698e15413f7303cfc76356f9272a6089623fc6487a3aba67a1ff8503d1db2ceb3e6d72
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\favicon[1].ico
Filesize109KB
MD5504432c83a7a355782213f5aa620b13f
SHA1faba34469d9f116310c066caf098ecf9441147f1
SHA256df4276e18285a076a1a8060047fbb08e1066db2b9180863ec14a055a0c8e33f1
SHA512314bb976aea202324fcb2769fdd12711501423170d4c19cd9e45a1d12ccb20e5d288bb19e2d9e8fd876916e799839d0bd51df9955d40a0ca07a2b47c2dbefa9c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\js[1].js
Filesize190KB
MD569634f21103d882661966e8ba1ce205d
SHA169f6ebcd91520a84a51c5e5561e4d0b51df06bd8
SHA2568b61b7c2b3260c152e5eb5b83423fe752954ffaf173ac48e193df1a738f6a7af
SHA51238f12119b2683fce4f19a33edb8ebcc7aa3b3727f3aad209683c46c0a1fbf5b6a4aa781eedd67a906b1d179e59e7907a1e41201b4d14d2cc394d7b2d2f115a0b
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
105B
MD549f8ef3768d206de3f5f0d81304c8e43
SHA1c93380b3809c539a18cf794ccaaea10658bdf9b3
SHA25664d64d648c9a0aedc10bbe43b2f1b59a6efe901e60f4c1d3336d7f38043f1394
SHA512bc0b1c99ba0df50614df41e1ffca16e78833f380c6737938b2ad83ba8cb395961308f449075c6a9e2e7e35b1a5bacab3ca862a7d8654f1be9a3210b23a834228