Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
441e55708442dfb553e2b26af701541f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
441e55708442dfb553e2b26af701541f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
441e55708442dfb553e2b26af701541f_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
441e55708442dfb553e2b26af701541f
-
SHA1
50708900a925ebcf6faee8cd5a8bc6ceb9337845
-
SHA256
17812f3012e6bf99df90101965c3bb42ff3884efc39dd5c72ae21c55b2e268ae
-
SHA512
e44cfe3339f6aed5e9a7a32b6c37291f46a0616cdf8f74a784ce1239e226d1c63794c776b87c3658393e6464dcb411ff6847daef808de6cd1619af747799ff49
-
SSDEEP
12288:fsM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQak:kV4W8hqBYgnBLfVqx1Wjknk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1056 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\{F382D365-A42C-4D2E-9AC0-C5E3DF629F36}\SuggestionsURL = "https://ie.search.yahoo.com/os?appid=ie8&command={searchTerms}" 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421900890" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchffr.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchffr.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000065cef5f54c50b723a34ca90be37129e122e7ff0816f6b5d92914496647b4a93a000000000e8000000002000020000000ee89b1056d17146ae2496c39631f9ac13dfd696c71ace4bd12333fe2a65f28002000000010736474044333aeafbbb87ea68c214bb6f5e1a9d07183c83b0809358617ca354000000011f6e5e253f028943e2cf6e49faea75a0827f3d9c01a4bfe747b24bb456a42f725b6396c728a15944c2a7a7210aed644428d50f4c656f300a9bde617195afa0b IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c0ca226da6da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\{F382D365-A42C-4D2E-9AC0-C5E3DF629F36} 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4875AA71-1260-11EF-AFF6-E61A8C993A67} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\{F382D365-A42C-4D2E-9AC0-C5E3DF629F36}\DisplayName = "Search" 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\{F382D365-A42C-4D2E-9AC0-C5E3DF629F36}\URL = "http://search.searchffr.com/s?source=bing-bb8&uid=b3592282-4356-4078-9fef-987ee6cdbb96&uc=20180121&ap=appfocus63&i_id=recipes__1.30&query={searchTerms}" 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.searchffr.com/?source=bing-bb8&uid=b3592282-4356-4078-9fef-987ee6cdbb96&uc=20180121&ap=appfocus63&i_id=recipes__1.30" 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 592 PING.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2644 2240 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe 28 PID 2240 wrote to memory of 2644 2240 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe 28 PID 2240 wrote to memory of 2644 2240 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe 28 PID 2240 wrote to memory of 2644 2240 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe 28 PID 2644 wrote to memory of 2548 2644 IEXPLORE.EXE 29 PID 2644 wrote to memory of 2548 2644 IEXPLORE.EXE 29 PID 2644 wrote to memory of 2548 2644 IEXPLORE.EXE 29 PID 2644 wrote to memory of 2548 2644 IEXPLORE.EXE 29 PID 2240 wrote to memory of 1056 2240 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe 31 PID 2240 wrote to memory of 1056 2240 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe 31 PID 2240 wrote to memory of 1056 2240 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe 31 PID 2240 wrote to memory of 1056 2240 441e55708442dfb553e2b26af701541f_JaffaCakes118.exe 31 PID 1056 wrote to memory of 592 1056 cmd.exe 33 PID 1056 wrote to memory of 592 1056 cmd.exe 33 PID 1056 wrote to memory of 592 1056 cmd.exe 33 PID 1056 wrote to memory of 592 1056 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\441e55708442dfb553e2b26af701541f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\441e55708442dfb553e2b26af701541f_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.searchffr.com/?source=bing-bb8&uid=b3592282-4356-4078-9fef-987ee6cdbb96&uc=20180121&ap=appfocus63&i_id=recipes__1.302⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\441e55708442dfb553e2b26af701541f_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\441e55708442dfb553e2b26af701541f_JaffaCakes118.exe" EXIT2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\PING.EXEPING 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize471B
MD5495a220358bb5e4d7ac99e15a2f3f313
SHA1caf9950a8e85231c5998114f4c796dca7ca13a7f
SHA256909c0e5560ffb15516f1950902de242a660ded750c255d6ff2f1c61e6407433f
SHA5122644779f7d6dd4b0d4613eb37c51094caf08597a2eb958c7ed0e9bdd8fb6969821f32bf389cb24512fa8afb9ff7e753f5ea68e4908c518f296532fc0c82cdb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize2KB
MD5b22ea455a2c7523370e94d03d5e826c0
SHA1004198203dabb5ddcc5580f1566f9a2073f37b51
SHA256d61ef30776076168b8d4955e4a31a31a6b72c5beaa986589d9066c5f136aa0f3
SHA512ff737bfad92ccf0b38b2306de1e6d52188cb34621ae61e806093d6b1d8a5b34838961bb79591c10c909d746e099ab33640cd3ec8264969a20643cca5dcb22ffa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5808894e10278fd11bc802414e58ddf34
SHA1ced4421e55ecc635aa2e24fb0f516fead59dfd40
SHA25655f2a57552ba8bc285b04a684d397067e85ca1d66392dd84cdaba6a3a88c93bd
SHA512c59ca56e0eba11f4233095a8f0ad88b6dbbb2f26a1c29cb8cc6b77f84227cd05ff99c511940b3c574115d93ed18524108e37343d9cb0b1fc375e401992d8f001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD546940ddde4c0bc130fb49621df4d01ab
SHA118f5f439f6502d39217c4bce01eda7b2c48dd96c
SHA2564b6aa497d0522529da095b65ff51cf38f7a67bee0dac695dca6580a2e3983ce2
SHA512d693303c41e418c7e70b5f17fb088ce3358c7bab47a93d4ce185e817caa6794a88a15ae0471fde4e97ccb576bc047059c0d91230782014e8a099495cd3be69a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d38ee24ad4e70b99befe01af01d1db1
SHA128187fd7638e46e96189441a28b900bb0aa2e24f
SHA256e839e0f1004a1c57cb227e7fb5bf8f111b63269450a5be7f14a5f914702d076d
SHA512c5b16b69f98bb076269cff014dffd564a1d0960090e4049dfdcd9f0e2c75a9b815e1bcbe0d51655f3cd3374e911133af0143e97f3d3a00c54b1ccbb2248f87ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD555b3ca26d502d34161a7aaf7380b17ae
SHA189248d2a4765166bad8f6bb0bc88b2cf8664c599
SHA256fb5663b241e417d143f2a75697b1da15bc9131738e287da6b24e32827c22dd7f
SHA51228ea53f30c707846f23a4e919e85d4570e011e9b63f0e5a73679c58baeee2fdeeb961cfeff2d16b6ee6674ec67a0293f32895d22310d45502b1673128da454d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a46a274b5ccd4abb6dcc2a9f729ee570
SHA14415eee4ee9de0a22631e5f17b0b40dc9d7a107b
SHA2561b4cacab197ae1db00f0130be72899dab57a50d47dc7ce426c358d530c6a89b3
SHA51278c9deff8b9e8fb46843762ce7c3f27b619fdebc358fe28bc3ffba5e1b1d0d2c49e8e7c60371aa260a56b8201abb74e5c86a3c2914549e2786f5bd93eeecf550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e64501496d8a06d375241e33946d3e80
SHA1c5fe87c42b7a871ad42500e9413988a1ee769793
SHA25637b3c8dd4e7b079bcde0124772ab90883892a726941bec18495054922c9d2bc2
SHA512fcd3f976742d5a7fed1078d618f1717e1ea41d2a357c4660c61a9a1095026fa7db38d318055ec936377ad3688635d11ec87293cbe41b1fdf14b7708a9057f82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dbb9846f959f8b32e1711e8df48740fc
SHA1df45f8f47fb80bb72e02f225c31a2af8958083db
SHA256b7a42b1fadfcf23940403350aa91d60edac1e753306f140207e09a8ae1c36bc0
SHA512f1619e8d65e0829f3be52416448dc46697928e0854af369f042e9b1f5453097f3cf4d0cfa6e1d2bbf71f7bba3429f78d1a614232d6903600a4480ce28f1cddbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5595c02b63214c74e4a54ae6f431925f5
SHA1a6b0682402527ddc471600a2d37c2923f6c17c2a
SHA256178be8eacea883fed62db42e1fafc07a8ce84545d4d434f22641fcb4d41aafd7
SHA51246182577f3dada0fcd788dc1a4c6999c0ee37da91aa74c00848bd21e00ccd777fc80ab0a91e4f61e92b670b65b2eaf197aae40d80851be81f7f0190067be4c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fdeb83e4b11a0ae199e4900377a07f8d
SHA1e67ac25e3458fc50cfd6e6a1aa39628b4d1858a4
SHA25603e942d2eff8659ffc4002a0e24f18230919eee12d6ad7a1ac2f783cd5ea847a
SHA512ab538438b44551d307d6f2360a8d3ca9b0262da233f80fe027d11171ea0871d55c1df7e8e8655fc69097a643870ed42bf55adfc36d6b69d68fd3208a5ce56135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b5586401d524cc725f05693b0d75550c
SHA195c610f63a37f4bcfc19936640399fefa9467286
SHA2569873ca490f1d7fa7c498e412f87038df3554ea161268edfbddd019e9effbf22c
SHA512ec3bc0f6337b37ac0dc728eae7c19a96f9ccf1b1065cb6d7979d3f3708e8735baedce0e78b0659b5ec30c48a46f5d09c8d000f36d5b0aa908c07665b8cca7663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5137526ca9606dea89a808f844370847d
SHA1082c86f10817a50df4034c8926e6fdcc63dfa88a
SHA256c02c4fb3fc939c63ad1d87fc629e210c770bce6695859db157971dab19c9e30b
SHA512bc31c843768990836b08c5e7f3e3b8b42acc319ed3456a1aba494464e71b89da84a8787a49834bc0a5171f52ff261cab7ed2d7617df1b77ecf9db0b050e01d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52a776aa1216aed91a69253f3a8f6cf05
SHA1f309e03238334097146708d18ecd400d5903710b
SHA256099b3cec9adb0231ab9daffb00898c23b1dbd08d50fb0599363c73d752926c47
SHA5123293665c43d8a21717b94d09015b7d557da534ad899beab0f39e0ae6b59b181fee37194d9eaa056c360c21cba50727ca9e839a5d1df651c1079f0da0fddc1a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54027f7849c90ff6bd55dc349c899bce7
SHA1ef1ea2ec6eaf8a253b4dfb038b7ab63b5dde8a92
SHA2563be5bd755b7e984a51b5669162eda10c601d59027b3225953da8945cee9d9c9d
SHA5128f4e60bc2ed308f062f95736dfa28e0ce5bc1af3b2a2ed27c337ef92356ceabbda51e57b59677a7aa3f6a210de7669beb968a47530c1acf93e3140c6aa6b1bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58ad9f75522bd465de26573507e9bafa6
SHA1f586c7c657bb95d314a8333cd1566053e0b78cd8
SHA25606ce513915f24dbcfd8dd44e0386e8371f627ed6c6e197408628191d39e0aa19
SHA5124f385eda18718e392af8a9b6de04b47926af979ec4949a4c01482fbde98cdb77e6a2b9797a9c763dbf99a7347936f29d16b00f3b7637c911e7e2d383ce955740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597428581a8436caeb14be0102c39138b
SHA1ab77cfaacb6d28c4204167d59611f270e73cb059
SHA25630eea86ccb75a0b9cbe364c94e80c911db4ee75741d556e625af0cbb2c5a70f5
SHA51261cefc60ae9921e7ece9766d439654e07b1c656c4168bde1cc99ea0c9dc7ec57e7e7e4967588e838907c78c52806b8e1b3c8d8f23a56c88a3d45187e93af5321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58ff966092ee0b694e81ba3e8d18a128f
SHA1868ec32abaf419746bde7e5a1644001c2fbdb372
SHA256b5f6e1d14850303f6d7827ff8f7ad11bc23b59919c18ccf50eea32b138b79714
SHA5125991c76d16315de7b124d10bb7ffbf6551ce926391d112d637626e403609617527f33bb44343b52b5004a4b5d45d99d901708f9f0b6ba580e435d307132a120a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD571ffe12876c3f7b3616b3d3390f2ea46
SHA157b0cd97c06402cb08a7f95262742da2ff7850f2
SHA256ab34cfb2fdf93869deb2ed5184f89da951b5e591b07a910c5cf11a1786eaf13c
SHA5127c15d73be44b66bee3d456229d384b060b6f68e2f3f238116db096df424097a559c92c265f5dbd36dab38fa0878ecc3668b411798166f0eb7e81ea2d62fb16ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51edb9a2a831d64561cd5fc08866c5b19
SHA1050d8d14559909a24d6203508b9670b129e0d8cf
SHA2560f5df2b2fca950fbd0b8bf314f5bfd9219f79eb6d721c0d6f5caa684fcc78cde
SHA5120559e7d80121f33092672f95e65d40f8f07328ebd7b6daf6753f3cec1448ce432cb97c289f7a6fa61306cd8ca16183f9f69bce0828f71e81a8e05176b2a43c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50cb155c4d3d517f669f5a0a18408d84e
SHA1528d9c7f132fd267d692d8971057c3bf98bf342c
SHA256f682119afd3ecaf1ace9a920311d83d9215d08f6f5e1bab6fd81ef6a8fe3b919
SHA51265a38460a9cafffdaddf1a79a80f365f194b21e9491d05c7ba770dcd6f70cdc7bd5514a1ac0d112975b21dd07b0b6fa2c9d243764b592766ccdec44042031aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f03d115ff83113c92ffea79ad274697
SHA12ff78824e8fbaad19bb3ed163acc39435ecc6b8e
SHA256250a92f529077d28b274d692d3506a2f4a17d81424b5ab0d15dca37d2107238f
SHA512f878f824e3d88073db7b360bd9ec2d8d25f45a8d9204d5eb3adf9433c2085eb39edaf0f725568fa54619cd3db9ebf78079320fe99c1de64f4acd644c5006ef2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51c1096d72eed76c591fea00e2e0b9195
SHA1739676b5f77907930a86a3f02e55d1a1757677a7
SHA256e4b8bcce70f28364f031c556fe38f72e56c735ecba6be1b4225c843e9c6935b1
SHA51208cae6817f7f1295a2e01a1586992531ad4725259a1388d1c8b43849d684c9db93e2334c6de6ed39e1056550ca358510a68f0ee1f7f24242206deb17d036ad74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD516962bcd6a062eb69d8339af8c806add
SHA1a1dcb31b4f2b9a90cf4c2358da0be8028e94fb71
SHA25662b2f3bb13812691970d3c165db8b15f0d3680c24f685756883c5bc8f7b4d5be
SHA51289126d8708682942ee55e33c0f0bcc9f2c6e9e8712559f87bda6976598085266a52d62a750e8dc7c910e1940ac1b1bdee84caf1642e7141d2fc2b34dc5d89aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5712f171414834dd4c327f267404092ba
SHA1a77e0d0fc6bac992e9ce7add98e3060480ff8f21
SHA256cb686415146ddfa27b2aa84c4f64a22306875c46f159babff464defaf696d7c4
SHA512b7c8432b7086cbc95c603b4e660b44f28ce4c5454af91991eb19dd375d5d21ad9cd5056cfced550cd2285a7b3140426614f7d5158185f8f53a264cf39ea36232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c0a83f41377ccec74cabf128fd9641ea
SHA111feed3492e59960b838abf10d2398968d7672d6
SHA256a9fd9d2c11e53d8869bed03064d4865b7d2f33a0d56a537099ee9f2756fc738c
SHA512757a3506b38c710fa67a0e7a0111d2768f229ed6b2da1de6df859bd0e3daea0fffc92bf103af5262884c9088e75bd1d5d2cd0b7c0876f61da22547dd74c518d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54f5d285e3f10daf95f7044ecd5e9d515
SHA1619b587a2a068526ec329eb8bbc15486ea08a101
SHA25678272bf1b32e902a53924a576085c77cf07717bae1fd57d72814edff397ab26c
SHA5121405f34ad0975b04e0d12281f9fb62e9ece27ed5b421f1fb0ce1c953a22ffb0ff3b52130a6ca103fbd55163ea7843944b1ba1245d042a9b9be32903f7e65f872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f9198c143fc38860c35cd7b275a16677
SHA1ba742c57cc2340c1c3ca7b46e4eab5e7d1087c29
SHA2566fda791a984fc320e8141ada1426fad53d5159d68dbae44eb05d9c2fdaca115c
SHA512974ac30df99391e3950a39fde23a8b94fc4ffbc8a63f3f52e9f1dbe285f7ea0b1100637a4acf60cdadaa1cd72696fdcf9f24fae1c5eb3511024dd290ecf74010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD526de0eae587c2402c06d74e995f0613a
SHA1511bd8306726d7516a05367ee405fa14fbcb13fe
SHA25690aaf78819f73058c54612834cd746f090036eb564d0a25430e616160a1e81dd
SHA512817922ad5dcd6b8f1b6a05ff1e59f1709e9cd2138047a9168f4e9036c7f680ad908880870a017033de1b4234022dafa721efaf35388f2649c743001d736ec31a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD581de630b4dffaec56158a485c09dd050
SHA177e2b93b528e7d0924651264148be5d31ea762ae
SHA2565758397050da1047a7bb29b805504c33f03a041b45e1fefc2a79f546e86e8576
SHA512b0fc80ac5b1bcee12ec0b02d5feb780c9b3b918ad6f85a9040e5c25ed15f05a5389d569f9da892a2fe997a79d864bd0730d2501f868c5b3acbc3736180eb2071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51aac292e4a6458a9aa29c3ac256a5654
SHA117fe8c018d8293f4906f236ccc48e5da91e6abc9
SHA256a9d9ec4c4c230cf33570ea64f3cfda58c3df66d1ac604896545d1f7bd96c7185
SHA51253cf038ebc65dcb2a8c290d117d0ca6a46eb9323bdcc2785cffaf84649d040fc4e37dc9314b6020ded5d9d4bee3f2ce02bf18dee56813da5c40e1be89a3cfa0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53381b8aea4900ddfa428e2d84abdcafa
SHA1f92e27461535c7d5a28a86b0441e0f5fc74cac74
SHA256b3d675873c304a94bd0122ebf3786ca51ff7235220535cc6ac7878489aea9455
SHA512bd757da66d27e32c2051c72c2838547d8ae06de47ce83789ab940cbcc059c85c329b64fe4f77d567bf744eecaf8b53c94d6a49918da5b337b9d3557c2c0bee6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c36e7785b5858db702ac1ec32f67249d
SHA1527a102e7dbd997a42253b3e40d53ba1061fe042
SHA25628c0462aff5aa37c7bbab47740181d7b871d9339cde9c903ce3f5254f9d37780
SHA51268bb4333313606f4a9572485b7e78783204d1fe442e6bccd049705659035fb153f5c7996a0a37c5f49b42275041da61f7c13b8c15ffecd96e9ad5896122bc00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c2484411b5cfdf731fdfb4390054372d
SHA198601f7ec05d22ac51449b062e39f82f5ed87125
SHA25626d167cf99a857df56e32c0546b8b6402c2f59ea60fd7bcdb0e04fdefd6957c4
SHA512ad01ec255f1faaf661fcb59e4c4a82c8a333ebcdfc2f9d1ebe595890173be30ac11ec28cfea8b944a8ac80be8ac0e7c14f7dcc64754bf0810dcf12c90e02d701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54763d60e3e670eba7cddba2504e7dca0
SHA13c1b1e73cde6afce4410d2be880140da29a22d49
SHA256523ea396150051216b64a756f11c34e738087e40b1a9c2dda4ab158ab11c84ce
SHA512e525155dcf3a4ace736449f071bf722d4936d9144830d96a777296316095d98feb8c455bb9915e82e070d2945a78160d84aab8a7a73b2b2bb910f4afe13d0184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD530da1b086e62074c1e11204afe2fe8f2
SHA150ff78736212ae4322e5735354e8a0f7e0ecc367
SHA2563e2141060c7ba222eaf4598714c3ea4bfe253f503cab596e931bbc49a67bb5d9
SHA512353cb8755bba1f5a7b192260a35b63b6da7660f45f87f3cc37582daec3fffe8a39bcbc9c556a892b660ac7ef2b25cda5710b183836f22811bbd46098f2e8c1ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD513b2ae8fcaac8f5d804fa98845172bb0
SHA1f48f0abb316d412003637f6ade9a5d8d660e01cb
SHA256f02e9e91a5ce871c674f5a68cb18ec8e1d74d4ee5965805e1f7ffdb1d39a94fb
SHA512d3475e363c135b3119fe0281d3474cfec14f72a5d9854eb8177a2ab88bad94930439d636ed3054fb1c3a66eaea1b4656b8ec7ac95d16bfb348d443e050c10259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize408B
MD53283de8d2f7719ea031ce79a63396013
SHA1181aeab87e2d4b6a6cf19e37d42b31523e48a30b
SHA256196bacb321ef535391ae3b24e74805c94336bbf2fc8e88e2902a559da0081a65
SHA5122a940ca397c32e23e2d36f41a193db4b536f40be3824532522ac08786654a570204348d4cb093aa14c85aad02dc99894f61a9e4921b10d830e05e4fd78927a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD5946aa6b0ba8683d0abfb71e253d6a1f9
SHA1aa3c69c968495bd0fd7df61ed2d6b281470a6d67
SHA256c19eee8c60d3c3b16e02a888b7ee60068a539451331c1117c197c87224b2aa44
SHA5125d7e0d221fb7346e348f05ca28195bcc7e4ffe94b0256198e07c1e29c2662e245fa5640ec89ad2b61d7ebf095b46db55eea1059e074a631ac1e4c87c51e0a92f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize458B
MD5b0de374209e3575c1f5f5659c5926e5e
SHA161ade5f2fb7ca9b842e9bd479afc3780c9da4713
SHA25647234ed3727f6daba270732d030af22a41c4b46e67e39a658ab049c804ff4ab2
SHA512df47100ddca9af36bfe7f808691aad97bc6ba7c9fe7818025d1b3a406aedabb3bb1bd54cbd64282bb2536c6eaea6d630e2ddcf7606ccd294394f17b3bef420e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize458B
MD52f9e2a937425923e9a64d41f11257c1d
SHA1c44cb5580ef9177ff2cbf86de85a2c83a03733d0
SHA2566c00f56ad29fe6f9682db3256f83afa3b13141eb224d99425845b27abd9d970e
SHA512c22e83e067538f9ceb7611308e825e4e27c06f597e505ebf0292afb20f62da9789e325ced6dbe97dc1676c4dffe0b5dfe25e9c4da65f9b818d8bfecaabe241e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5659cb0fa06be243bcff7138661f9442a
SHA1d79b74c8cc5c2525fa0b62dd507048f0efb0167e
SHA25675bc03449e55a5a6b915d81c070b1a639014de4b56a966444ef065968d17a828
SHA5124e4bee26a45cf1d286642ca2e34beb7d6f1388c60b95a9646e82b9a9ed9906280c4c3f88b6334c0f2e2ba6fa91c1d8bd705ff4931840e70e2992993153feb3b2
-
Filesize
110KB
MD57d8b9ca34fe0b43db927f3630f1f77bf
SHA16bfce9eb253467f7b6bcb07d5b8d03df9099227b
SHA2567181c92fc0aa90245d10f2cb179c756ff1e050fb4e5eb3f0c2891da0fef5cfcb
SHA512c8241a883fe7ad0811d6052b971b53d588a28a24220b29e451ad3a07a0a027fa6c3a29d994bb0c51552d19fb208e7d2b59076ad5b3ac6891a3248daeac24db6e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\analytics[1].js
Filesize51KB
MD5575b5480531da4d14e7453e2016fe0bc
SHA1e5c5f3134fe29e60b591c87ea85951f0aea36ee1
SHA256de36e50194320a7d3ef1ace9bd34a875a8bd458b253c061979dd628e9bf49afd
SHA512174e48f4fb2a7e7a0be1e16564f9ed2d0bbcc8b4af18cb89ad49cf42b1c3894c8f8e29ce673bc5d9bc8552f88d1d47294ee0e216402566a3f446f04aca24857a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\favicon[1].ico
Filesize109KB
MD5504432c83a7a355782213f5aa620b13f
SHA1faba34469d9f116310c066caf098ecf9441147f1
SHA256df4276e18285a076a1a8060047fbb08e1066db2b9180863ec14a055a0c8e33f1
SHA512314bb976aea202324fcb2769fdd12711501423170d4c19cd9e45a1d12ccb20e5d288bb19e2d9e8fd876916e799839d0bd51df9955d40a0ca07a2b47c2dbefa9c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\js[4].js
Filesize191KB
MD5d2d4c58f945846f665dac2cd082e0679
SHA1e3c2636e949a5dc11cdef78810e811648b34c897
SHA256bb811dbd98c944907a3ac28fe0f6acef46d306b982d5a296f54eaf3b1388afb0
SHA512e9f3fa1c476e2918ac07bb3f0896a3fa0cda9de179c20270e148e42f621bb58c39817a22f320f3d90118a24dee114ef3adc4a67337df4f121e3a9b46c70445fb
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
673B
MD5a7bf678e43dd66302e8b6a871ecbf408
SHA1ca6f73a016e46f984b6eab5807abba44b96dcf4f
SHA25678e35d714a2e4af698d980577adb2bca22d0dde6562d4bc61a7da3f1fb8a478e
SHA512d2c745dc950ddcb15c7ec77fa4978449652366d2b855bae9c011f54c09c6f3082b2e1f2bf67ad8139140ab54b2602918e0409b27097e583c618d83a7d2c8f96f