Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
64ba1387801bbe8d4dc3571822742035
-
SHA1
8bb9b1ace19f4ab725efd623e062c1e88d8096c3
-
SHA256
0354836d797de878e418135ee118ac65076fc639d987a39e1a4885abb8c4f09a
-
SHA512
7a2ab1324b0c7bfb20ddfd96fbe1410564d9e37f60d8aac6df6dad5998f3fe29840b79ada55f648fd8b49ca92940083dd77a938481051c0fa7b16bd616db67ea
-
SSDEEP
12288:nsM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQSV:sV4W8hqBYgnBLfVqx1Wjk/
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1756 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{3B5BB95B-A2AC-4A5C-8775-4ABDF91F21B5}\DisplayName = "Search" 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002c3487ebb6692842a52ae3c9e6efc15b0000000002000000000010660000000100002000000058912e2eb5fbe0f4837377b48bce5c3e039a3f9366ca649fa773cdcc9bf5d060000000000e80000000020000200000000fdbf44c2ffa6f2412ce0c526a4f88df87fb52753bae9bb8243796610fd63608200000009a9395fb5c0162495dd97ee0ad2c64a53f78dc779744a3368325bd854726fbf740000000ab08d3170ca7132b1e781a25eee2c73998ff53bf65b497314b6078904266e0391386a237dc89c417b02eaf3c4a653853fdb03c419cf2101aab047d5435934c0f IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchddn.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F712A5D1-17B3-11EF-87B3-6E1D43634CD3} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422486586" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{3B5BB95B-A2AC-4A5C-8775-4ABDF91F21B5}\SuggestionsURL = "https://ie.search.yahoo.com/os?appid=ie8&command={searchTerms}" 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{3B5BB95B-A2AC-4A5C-8775-4ABDF91F21B5} 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05824cec0abda01 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchddn.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{3B5BB95B-A2AC-4A5C-8775-4ABDF91F21B5}\URL = "http://search.searchddn.com/s?source=-bb9&uid=90f59d9c-6ad1-47c2-9668-cf651114a4e8&uc=20180415&ap=appfocus84&i_id=maps__1.30&query={searchTerms}" 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.searchddn.com/?source=-bb9&uid=90f59d9c-6ad1-47c2-9668-cf651114a4e8&uc=20180415&ap=appfocus84&i_id=maps__1.30" 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 2572 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exeIEXPLORE.EXEcmd.exedescription pid process target process PID 1752 wrote to memory of 2572 1752 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe IEXPLORE.EXE PID 1752 wrote to memory of 2572 1752 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe IEXPLORE.EXE PID 1752 wrote to memory of 2572 1752 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe IEXPLORE.EXE PID 1752 wrote to memory of 2572 1752 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe IEXPLORE.EXE PID 2572 wrote to memory of 2564 2572 IEXPLORE.EXE IEXPLORE.EXE PID 2572 wrote to memory of 2564 2572 IEXPLORE.EXE IEXPLORE.EXE PID 2572 wrote to memory of 2564 2572 IEXPLORE.EXE IEXPLORE.EXE PID 2572 wrote to memory of 2564 2572 IEXPLORE.EXE IEXPLORE.EXE PID 1752 wrote to memory of 1756 1752 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe cmd.exe PID 1752 wrote to memory of 1756 1752 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe cmd.exe PID 1752 wrote to memory of 1756 1752 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe cmd.exe PID 1752 wrote to memory of 1756 1752 64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe cmd.exe PID 1756 wrote to memory of 1640 1756 cmd.exe PING.EXE PID 1756 wrote to memory of 1640 1756 cmd.exe PING.EXE PID 1756 wrote to memory of 1640 1756 cmd.exe PING.EXE PID 1756 wrote to memory of 1640 1756 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.searchddn.com/?source=-bb9&uid=90f59d9c-6ad1-47c2-9668-cf651114a4e8&uc=20180415&ap=appfocus84&i_id=maps__1.302⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\64ba1387801bbe8d4dc3571822742035_JaffaCakes118.exe" EXIT2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\PING.EXEPING 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:1640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
889B
MD53e455215095192e1b75d379fb187298a
SHA1b1bc968bd4f49d622aa89a81f2150152a41d829c
SHA256ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99
SHA51254ba004d5435e8b10531431c392ed99776120d363808137de7eb59030463f863cadd02bdf918f596b6d20964b31725c2363cd7601799caa9360a1c36fe819fbd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD51d234356d23f79472fdeb0fe3da4b536
SHA11053f2eea5f6a0ecb39cb3367e16cedc98eef6ec
SHA256e0860ce73fb6df00d18eefa37887d9ebcc411552962a2aafcb216ca434ed2fff
SHA512f8f23cec80db285d3139624c7e6f22d340fc1b3b3eb2a7bad988cae1b2c7c3d3bbd565d6796eb71f03c7188feb1ce4ba18dcff1c57707ea32b2e3c5666f9f441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e262af9c478daa744e52e3af7a0d4b16
SHA1764171dad1e359098be43db2a36b587a392ccb62
SHA256d28e7639d65bcaa03474a46c482f255e991c47104286e65818c18c4daf085f72
SHA5128e2cc3fbf438597aeb346c497dca21bc260832572047de543ec1b54dc61120f6989873fb2d85cd8bdcde5a8d2ca95e2d3820203c3a2bf36797f3a1706c0a46ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4A9377E7E528F7E56B69A81C500ABC24
Filesize176B
MD5f121d53db391a7217c2313f59643dd8c
SHA1c004887e09ec05c38c78332738cbfd1a6d445b68
SHA256ff8a0cc0f5caf2e8d8fb2eff5e724659cb46d4184a9fb0aa98c2afb9cbf128a4
SHA512df63c4adc3dbc46c6403176c96aefad099e92bb3182ee37b756f509eb8ade39ae3e686f98632bc034a6006440ef9a41187c5c1340ecbbe4170e32f8f45e63830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4169dccc93d4f5e49034459e081ca31
SHA1ec562461ef878b2ae52b9c44fe580f73a3d3bc65
SHA256b70ef49a47a65850b4ec36d758de587e9acc9cf9bb39eb7b7474664266a4aafc
SHA512ec183626a7b2a5b0d58936bc4dffe4aefafecbcea3fbab8538e8a35e42a36b7361cd608ef3bcbf7d75ecff4d6aafb84fd74a5cff58c2cc43a49c7c5eb806c7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba34bbb244ea407bf75f32329813b011
SHA139a8a04f72baed404f773bd0c6fd93fa8a681c87
SHA25604526ff39d840793c2ff214213760b25b030e3a98581f7a4eb7c566237cdd84e
SHA5123be2cfe64b271fbbb5e90bba87a29fe576fcf51a69e1ea030ef5286a169482bdb0342a1cda9a715dcc54478cbc1c0bdd6af9dc056706606e4890b03c03395c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512efa9dc0d661b61cded34588a09da56
SHA188aaa1ee9183ec852fc0d2d3a2b395c585f5194c
SHA25625ab30b6af58ae8dede12feb1768aff203f63ba5d6a2b1428ccd639218655f03
SHA51274b37d90c251879eda43ac765210ebd4f2a34039a45cd7ab7dfb4455984b8542c32863d474f563d97de0c4daa26b1fba861b0bc95be6b6fd26e8f9476e9a4e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6b681648b1e67bf1d43e39ce3e8daa8
SHA140c605793cde285773222b6c5011998ccd32b800
SHA2561eb91257a54d161076a45375a45edc1ec419b6674cf3e79bedcf54cdf2f422a4
SHA51229f00a5869f77167d1aad2d8fc4f53265546a4c87d8afb982ae460288d3402e08f5d6ca3bd3446037647342801ab8d7fbfd546375238f23919c007d6873ec6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e852bc6731d3af2bbe3bb5612c49de8
SHA1dce2cc285a3e4917d0618572ba789c19f46e354c
SHA2562cd105f46e34d0c1ce70c411dd893517ce4c867df5366ae44d055b72cd83531c
SHA5128ca993bf102499de727d0802ab344b50fe3c6455744f8b3acaef304d5d14431516849fc99cd40bc97aa9fa78c708c5ed3fad373e6906e12d3b84cb5870c63c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a1d6f48a7ec2e33ae6408572c654e4b
SHA11eb76ea9f35e80fd92c1c449c39538a0339b1ac6
SHA2563a094ee527a7d16c644394670a4723bba1d70d2b801f2cea7d78a228c742e5e8
SHA5122749b469a149205a8743dcee742304662802b7806b836648ca05f286675ebb5e97751c98a5d84ee6b53395686cbf0a99edae893d0b28b25cdc8cdf696692812a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515478ecf0a3723c858ed836fa9c04cdf
SHA1807d0f9a82f0c48b12e9afca6ac3f338db5c35ba
SHA25635c98bea86605ca83345ad15a3be99da48fee5651d55ac5c677929abc3dd709c
SHA51213c6d66a97c4b2f67dda60df98b8dae988e0d8175e196561de6800e06afa0cb5792aff770326594cfe1c85c58219a84ac1d3b69afcf3a466af19fa664b522edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b89f18d53d2fdc9fee67c5bc062a600
SHA196cee457e264c1c09f17627b61d171898ca689b3
SHA2569a4803881c0355849ade4938342cdfc3d74b6badaf4425ec5c763e87eb4cafd6
SHA51270a3d8ab0c551f1be33944e6dcb89cac46478a0507068425fd5d76b04db5689333f72de0b0abedd8c0513883496f00b27f5c1407110da410a2c4af8f31e5beeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5586ec4325faefa8c837d342c18b17c6d
SHA1d3195a585f2d2a94047332cf3b94eca1b9a6c9bc
SHA25609fccb80417a75f078e062063f9327e9bd2e610b228a583f0fec6fa8ac866330
SHA5128f8f844c4b2834be96fb05d9de388bfd3d1d122fc2f03b07ededccd49f509124e44e577f3f65432e11afb2f4f26030e08f2e58e6159cfed1b98fb0201ffbe7f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c26e75aad690d110e8ffbc5562f65cc7
SHA10a94d23ffa912e71211b1dd66bb5227530244f3f
SHA256f4de12a2ef89f51ad51f2a59d00a725734ed8793de530b76f7c91867ad24ba0a
SHA5123f2d89c6ad707214d79be9aed563a436d00c381b0818970cc4efbd7e952b21d6fc0fc63d88bfd1636ce57add45883219a10a54a41c5fe6de4ad4dae4fdbcbcae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c36148bf1e6854e91e7733fd1a2ac835
SHA150aa77fa482ebea9a5456fb256a9d57c063a05d1
SHA25617e6a72b7b0fc0582c61540ba5247afb50258917be75094fcabc6e7c84a87c6c
SHA512bd9cc90484f4256a6cd685f74e9d4a6c94c1e17617b08d6a429cbc31271611d9b86d43320bc90dead3458701899b33bc62995ff6226944af26394ebc07a976d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58562aa9f1bb7f76220745a8c51c32c5c
SHA1dabee7db1a3ee0cc7f18dfe8590b55bcc8b602bc
SHA256370761e47165c135afaae8d4169017b27da68a6c8b48b4d1ed3707555c7bd6cb
SHA5127c864d9b717cb09c81a9108a42a74ba995bbc9073ec8e6d429bc153320783a7cac2344695663ba395e7d6445e7fd5306713f83bfe4f6664c8fb6704a4927dc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5162bffef0e4658e24ac53bd5a30a7c76
SHA1c1f431644726b93796594743a4e83c9617a0fccd
SHA256bb4f35122e288316efe1f2bd091f4f73564c10a7efbd013fc95f9052d6f3310c
SHA512d2fb1f937f37b58584c0259f239668aef468826a2bbd5a70c8d1a2065a341af017d18caffde1f8ec8063e56244cef12edc27b1a3047d6b27aec9fe633ab711e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526d58a18b7c1ce8f7a28e1804b4d8a88
SHA1da27b327fef0204e135f5d924da36256130aeb99
SHA2563287b3b1921cdd0efa77cb347f85e89996e76c645e542b104906e92a2eb5eb1e
SHA51250d69303cba5fc65b69c5f8edfaac1880a71d09f11a2370a4cab0c3fcee59d172dc6f464388f2783a01b18fd13fde5133956ad140aa5c10be20e3d9f70cba970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582757f83aa185316bdefb7d9d0fde375
SHA10c208cd65a5684f23324250f9f716c18f54bd30d
SHA25607a0cfaef4194be481dde5f0b24b210fe42116ef361c164b43932970ec725187
SHA512653726ee5fd8b0131b2ab3d6cec7dc6b03f34ae150164eccb22afb1fac719bd693fbc5f05adf67fb6169a8ecc4ffd46831cd706b43ca1f00624b1b388e9b7e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e7eca0b80709c9acf9f45125389a89d
SHA1d567d9cec8333a17e6fa0e2058fdc3e8cc923583
SHA2569a7bf6bbb6f27f9b43e59a418cc8d4c3c2287f9e8fcdf116c63a5c2b534ce327
SHA512d7c2c13578d3d980f6ec1821d909df3bbfd6ba9cc23335dd89d80f1b1e592bf7536a6f59bfa7dbb524724d465513cfc140a4ac54cdba4bdf54ec9f5e35e7572a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f59420b8e11aaac521169e61bb929b31
SHA17d95e8624bfe9c1a7b671de3b4f611f044c642f6
SHA256f32fd89a93a3ef2e29a6103a20c0795877b40fa6e3d94e54210bea4984243ec5
SHA512df877a95f9caefee6ec89a1734c97fbc2523a489369505fc0d06beaf7a25fb78b537ca6af3dba556171e0d72b54b34a1e5d526603a19973421926a06828025b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e8c9262d0a336515224f9191d367052
SHA1735d8078a0414e5770374855bc993bd7e45e1785
SHA25655a1a0f62d09ddd5ecdc3426d5a2fb45eafe3883ec1375c1188908843098d295
SHA512e916cd2273cf293300e6cc9504ec20c33c0654c354c30d7dbe9ba98caf013b84ea3f676ba874a10790c9e935d0e5e3d643092821d8b2dea8d7dc0976b4a975e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5833825900c68914a00eab67e0f1e2cdc
SHA133b75b6f81920b2e659cdccb3898cbfb349816de
SHA256bb0bb3805fa9ca55d6b6172c9267764fab4f2cfc20dc8af5570da719fbf05825
SHA5128a1b1d73e5974ce2ec251063d18fb9c9e0ccd750502c5617b3b7b349a9b336644b7b382b46e63eb1d627f34e2ea26d3da4d26f173aa78fb4c6d98c3f5edd647a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5723efcabad717fdc31442119fd28bb80
SHA12f2a9ddab12c9c1f8a94182bdcabb6d5e1ce20b1
SHA25644e334a4d431b232985487cc0595c35412b264ab608a8330b314975319fdbb3b
SHA512ae1783a05bff0dc58b2e11f6e103d67e9d1367e7a861a37a86db5cfa18ebefb55d8f41517de8a12d15519bfe970ab630210d8057b183b4bfdfb870da9fd95ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d24a77129b687b8ed1a6d4b53188550
SHA1a7427f1cd29eb1d5bae07322613623b1b5a2a067
SHA2565ab5ebc91c6d6a5ae53e7e454f3aaa0be36c167ca018186ea2be02b615d04551
SHA51255b7bf69fca4d90868195478be740b3f7ce040b795097737c1a932d5e8ff7aae70db6039a9b2f47b01a25d77e94ae75ece2437456b69bc25e99797aa0530c3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5040a774a284f64525329c08bba6938a2
SHA1882612aaedae2a55a239d2c1bb42359927bfedab
SHA256038a75dc3a07ac752050b73361a98363d0793e001d1f32d08d1e1d8bead76c66
SHA51293e7ade0b2b4e9dac72f40f192da421c4148ba4a5bea4c1a746531699cd11e2408003ea4df20f51851889b769eb02f4b79375ae1646eafbef672b1b50c1ea132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511612e1d55c7845116ba963eb2b14bdc
SHA1dd06a283b688cb3d6324e9a92d6f70cf60c867df
SHA256f75839dfff668f634cd0709b1a51d7dff736ecc42bab4e6f22d66ae23841bb90
SHA512fc734755b1e7488f87e4d595d4493a65ed5cd11be61bf0e61b13c0b7216142e48bcca2e7ccd800b8ede29328e6505ab35f2b107dd7db1b592d2ba0dfff6816ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53560b87f717697235290803285539989
SHA1f13fcf5e12d588cdf5108c1537726348621f3912
SHA256e7cfef91fcd165b19ca5931f510e5da6b5ec619307bd84c7b064eb6c302a7d00
SHA512eb5966f0ed939415c0afbd27ee6d7a30ab418ffd2f713aae70b4aff94aa6ef78d3cbdee9ae34b62cb09653aea896ee008ff5165708e851eaabde43b54a9ab2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ad2209055c9167f3be3916a66cb1f7a
SHA144366514f4fe7f91384617d43272922b87dfcc9c
SHA256ef44b6aaf318ad9f5d0f8a1d8f0176d6380b1f45537f25d70ff13c5eb777376c
SHA512393ffb1b6af1e7d7c6b9d05125abf1905f8fb9e9101f1c1505d37ac692bbe4859a935dbb32ce924e88a2436b44a475efbc0580ff17ea6772c8d71590a72aa91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55585053eb75ee9e738c9087e863c2483
SHA15c356faff1ccba9411bbbb50e7f12500fa7bb9aa
SHA256af885e6dd559c496a71b729e06f619134d550e9f552b4468110aa4383cd9ad98
SHA5124452de037e14d67c5ecf7de25b8f77f75607968aad157a5ae8882efaad92d183051e7aacc8159200bda726884931b3e6e001d302397e7adcfe3dfd64c031171b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e029abf1b0b56e75f572f096c3fb3f9
SHA1cce660ba9483718fd6dc9716a3d9c2a990ad8c3d
SHA2565c7fe517569d1a66e1454247d62e4cfd1fb6488edd8b8c7a379a99709f06640a
SHA512ba17aa8f497e12f99c6066f90f9ea154414bc96ad2fd74ceed3111d12e1bf93c2c1803493ebeabfad3eaa003f637065b730235605252617559f372479c52b9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c264803b70b3447fb48014ffc3a9598
SHA1437262c2a4f19ec5cb3df58c8e5c478ad2feab6b
SHA256421a566cc190d41e2b5ee86c5f776b4cb7998ab437082d916645be1bc2292aa6
SHA512b986d9ad876efaba039360f2e74743f7b3e936dea260511ad9cc21f2aa0f12003199ad2a56fbb6444f6925879e4dd79f50f6458773b30834765cdd4d1b1c439d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_C23811B47FBB3622EDD1969B2F2E15B9
Filesize402B
MD5175433c4b5514dfaa9b058470fb22550
SHA12192c07c6b742dbcee0b702ac93b8b8b4808bbc7
SHA25616f31f6713710d9089dec666a2b48294bb31f7a8fc9467f13fc77d62139772e2
SHA5120c909cf198b9764c0e76f034c4922e8538c72def8b6595a10b942f11fb8fb119e7fc6c03e6ffbf60a8fa21b3f183a0decb7650121a49b3e752e893c0c7e12604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54385c3bf24d39410ff9282c0b186c5b7
SHA15e5d168f37c824650f5f87ae24a6e84f95fb389c
SHA2565fc0309eef6d547205f50fbe2d1e93afbb38683d81809b93082220f23db90b8b
SHA512921e5f7a934a011b10829e1e9e08b19c63304a8bd395e877adeaf9f224e06e8804d78c446b3339bead2e18f9ab48df96013863a0e21982b3a318536487a71fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
110KB
MD58afd68ceb0fb736dcd284a2ccfe08005
SHA1da95f3d2dd3d937858fadb8a503f13275d7dd06a
SHA256017f8caa4b54bcad936b06df7649f8c06c9bf1a8bc227de4ae172fd75876584f
SHA512766fe837433a6ddf52f36c8c4970f202931409a3fac44c0f89839aaa7caebb52bb3f10a36a8149504ac5a3fff8595b5ce24c61100ceb519506a9530200de24f7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VEK0X0HQ\js[1].js
Filesize191KB
MD5fd409779f02a367dbb62522a0bd9236b
SHA17e811dc639995085bfeb85c5495cb37e1a84c92b
SHA2568b4b26e060f86db33fd403f531b1d584b1c531e9abc0e0e82acc471b056780fa
SHA512e49edd0e4537755a1fd250d449220c319b2e05b2f187be7c6c4e37d58639198fba6df33080a537d27188d705887383ef316db8d435da957c3ed47335b7aa6a46
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZV13T37I\favicon[1].ico
Filesize109KB
MD5504432c83a7a355782213f5aa620b13f
SHA1faba34469d9f116310c066caf098ecf9441147f1
SHA256df4276e18285a076a1a8060047fbb08e1066db2b9180863ec14a055a0c8e33f1
SHA512314bb976aea202324fcb2769fdd12711501423170d4c19cd9e45a1d12ccb20e5d288bb19e2d9e8fd876916e799839d0bd51df9955d40a0ca07a2b47c2dbefa9c
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
760B
MD5f62ec4a073648a3da97bb8f27f5bf664
SHA10014b098247fb79473cd91b5c988eaddd8ac2a45
SHA256c3cb0d2dbceb1cebf3ae3eb0764c3e28c907342a7335d0ac23da730fb068bee1
SHA512a470f4a2c6c56c190727975838a5ec96e1ecf8ecfb5cd3056156686e4e1a55ddcc761a9327706aec256e8e1c7ab80569f0853eb098bcd2fb88ac09b501094ba3