Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
68e51ec4ec1f60d580a50e9a1f049996
-
SHA1
e13e5d1b707b123b989395a2fb0889b0b10b0781
-
SHA256
a9ba5627a9ecc532112475ad87f5ed5358e1f0ce5f747440568b1733d31cb5b3
-
SHA512
e6cf041ad86a497d6133c82519f8818fd1a8641a5dec38b16294ecf61ed40d266943cccaffb3a736b0706a574cd8b8f3a1a3e95b04a709fdc292b3dae4db8d0a
-
SSDEEP
12288:OsM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQDVe:FV4W8hqBYgnBLfVqx1Wjk+8
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2108 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
IEXPLORE.EXE68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C3F2221-188D-11EF-A538-5630532AF2EE} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\{D8DF2BFD-4B3D-41BD-8D5A-29FA0BB324CC}\SuggestionsURL = "https://ie.search.yahoo.com/os?appid=ie8&command={searchTerms}" 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\{D8DF2BFD-4B3D-41BD-8D5A-29FA0BB324CC}\DisplayName = "Search" 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d68d239aacda01 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422579929" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchedd.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000003572d6a10bf8735979ca9a918027c30ad27d708d1af8c85ca18d577c11f5e120000000000e80000000020000200000002253299dcc77cbda726c48f1f8d5fd74f822c43d18a54faeb19558c44565c040200000009ff88a34b598759713d734d17c6619329926d2cd2ff4b5eacb898d32588ec0e74000000065d45055ac113ed066d4a9be7ef49cb54b60570bae21d5948e8c2337ed107fc72519d2f07908e12e76db6cc5cbee5344d18b0689cbb64bc560b5cbeb14985953 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchedd.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\{D8DF2BFD-4B3D-41BD-8D5A-29FA0BB324CC} 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\{D8DF2BFD-4B3D-41BD-8D5A-29FA0BB324CC}\URL = "http://search.searchedd.com/s?uid=b7bff847-e80b-471d-b9c8-ae5b489cc62b&uc=20180504&ap=appfocus94&source=bing-bb9&i_id=maps__1.30&query={searchTerms}" 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.searchedd.com/?uid=b7bff847-e80b-471d-b9c8-ae5b489cc62b&uc=20180504&ap=appfocus94&source=bing-bb9&i_id=maps__1.30" 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 2632 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exeIEXPLORE.EXEcmd.exedescription pid process target process PID 2148 wrote to memory of 2632 2148 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe IEXPLORE.EXE PID 2148 wrote to memory of 2632 2148 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe IEXPLORE.EXE PID 2148 wrote to memory of 2632 2148 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe IEXPLORE.EXE PID 2148 wrote to memory of 2632 2148 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe IEXPLORE.EXE PID 2632 wrote to memory of 2708 2632 IEXPLORE.EXE IEXPLORE.EXE PID 2632 wrote to memory of 2708 2632 IEXPLORE.EXE IEXPLORE.EXE PID 2632 wrote to memory of 2708 2632 IEXPLORE.EXE IEXPLORE.EXE PID 2632 wrote to memory of 2708 2632 IEXPLORE.EXE IEXPLORE.EXE PID 2148 wrote to memory of 2108 2148 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe cmd.exe PID 2148 wrote to memory of 2108 2148 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe cmd.exe PID 2148 wrote to memory of 2108 2148 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe cmd.exe PID 2148 wrote to memory of 2108 2148 68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe cmd.exe PID 2108 wrote to memory of 592 2108 cmd.exe PING.EXE PID 2108 wrote to memory of 592 2108 cmd.exe PING.EXE PID 2108 wrote to memory of 592 2108 cmd.exe PING.EXE PID 2108 wrote to memory of 592 2108 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.searchedd.com/?uid=b7bff847-e80b-471d-b9c8-ae5b489cc62b&uc=20180504&ap=appfocus94&source=bing-bb9&i_id=maps__1.302⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\68e51ec4ec1f60d580a50e9a1f049996_JaffaCakes118.exe" EXIT2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\PING.EXEPING 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize471B
MD5da487233f9bb79b1358bd2939c1237ed
SHA14c22912dc26e449568ed77cc583e8ecfc9c121df
SHA256dd34689445d6ad599442e81edecef9095893072ec1c674e2ee142db65039b1d9
SHA512347670d3567448c0917a1313b042c71acb3b30d2c946204011f14ae11020ab87a9b0e2a41d6a0cb076403a2f4f2284c5400ca47e9ac576ff0c533a86a6c46e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
Filesize1KB
MD5be95948964529ecad5eb2988d0fd8663
SHA10941de91aebb92626cc905e7dfc664064e4ddbe8
SHA25630604974f0132e05bfd4625f748f51c44e2f0eeca4b1dc31c0eb4d7aa2c24435
SHA5120cb2ccf9de9c78e91c5f3f1fd3e0392e4c3c19defbcde7553be5e66301b03b80ef3bad5cdff9f340860a21d94f43455492aa6ee573c481ffebad1f87541aa1ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5e0080863e6d7da26867ec5c81b494a08
SHA1f4fe1eb045c722f5d47a102bb54a0ccda305c8eb
SHA256a03ce2263dd558bbe4685e9a1f3b311fb7bfea8646968772e4b8525e86413cac
SHA51214eea34e58e3df07e851b2542b3ed64402c87a09ff6f688aa61489fa8a0e7dad196b5838b3d4c8aedcb6510d9a5c295c0e68df25d97484d86dddae9b474234b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD598df56fd888d2823563fd68323cb75d6
SHA1230a2bc1119682b05f6d14995ea2c44aed4555e1
SHA256cded1f552447c04fa4121bf9a6b0f94fb2d4fa73b2a27b16fde26458f33fc0ff
SHA5128a1ed670b171f1921ca62bd608ff22173fd916551605c06e7652f3ffd377fd945415004ac65b5508391d6c0d224513eb417de508dfe3a673767829d419f2b2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a1aa92fa69ee034668a42cd06b1c8e
SHA10241133f99c097896855a5dfb233288dbf17ae41
SHA256a3992ade2d754412c169860848bb9e7d6d9180ea1519e0ca9447c0bcdfc58e4c
SHA512d228b68f3085323102b1f1bd4edcb55a7127a6d06193f4d01ff41ca528736b5c61464a71592ab885ba5b9ab1195b82fb728c1135630cf6c83c1fe8ec4b971bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd277ba5b2e792555dbc01012bb69b1b
SHA1b036c7234e7d47ceccb8c93d7239594a49e59f51
SHA25631311f61f537c2e9d7c4769ee5f794f95a721b6e36265963b5677a4aac7daa98
SHA512753343aea80bf43f71eb95434919ee90d4ec32c3b9a4a70e6bad8468ce0bfda7b18bd7904b6774bee1e074ad1e54d2d107af2c44aebd266e279cb8d8f4dc5329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510a7cb5515b0ebbce27fe90b9a9afdf6
SHA1975e20914632d972e036c99703bf4384221a599b
SHA25685cd8e62aa40622e57edabc04028a7a36ff2a6dc9540886727d8a88c0928579a
SHA5123c33e8f01f7fe28b326f428da886242f16531065529c62d0f6afb5925d38b02e95e2a2ce5a6b5ccd52f87950b111b216312e101576ff428fc737a4aff27a66e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccbc8a1644ada75705fe527f5d6196f5
SHA1fbd7c162ee787cbc83b30a5145afa4bc503ff1be
SHA2560c7d9b074b82a2b50e67f070dec94d0b37f9578515d82e79cf245a9339ee5c5b
SHA512925b1e0f8c8f81d67f2dde84084c108b9a73c5eabd8aeda60664c61051c2afcdd6e91bc96ff8041653cfd1899a068262d399c0144851f772178d4663b468bb88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5301b20e29678c10342fec862425eb0af
SHA150907f0c85d64d0025d14818bf12daff3b32346a
SHA256ed1997fc7b4651b57f37a6b081a56c3d8beda3b9d65bc86ccab45e6d3b7cfca4
SHA512ce8e78fee5f29ba920aa6e5d174df7e661414029016340bcbf2c440a720596a42b5983dfb1960f03d0f3562c8574b937fc368d31cc470f1406578f9373487b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dd17ce5b279e5b3e83b0d5c9d6e89c4
SHA1c0bd441707a7d46261d59bd7c36401fa5b14a7bc
SHA2565d31723bd63d7cb1f82362e10bebb8ec2299b551a557b337da754866d03f7e7d
SHA5129d628308466b68c8eec05618d4599c19fce7d0d9b0a02225b1cb4a3e3410bcf51f0d29370ce2f125e7375287e1a35ed153684351e299ff15951071757a349b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b73d88815dfbde3aea03a1d7bef0745
SHA131057552678c6dbfbacfdb8ca07d31b90192d7bf
SHA2569559f53e00b591c6f3f96bc605afc5615fce17678106931966262b00d3df7030
SHA51214a6725936835bbfa763c73168d84ea1168ade93086239138293d944fdfe30b742443bb077cc0d73b3d3ed063bd91927abc839294ee2a5e02af03c22930c75a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba935e980b77a712fc122f89e97d8ba3
SHA1baa773b0093e069bf97011074f13a1ddebfd7ae8
SHA256021c966c6d189de1c68862c49715e46ee906cbc81cc0b15375e12540573a8084
SHA512290086ef1d249bdbc8865c5ded21e448c8447f702311da8aa02cd8c3d5f502915b17121c263c238136159ec81ca2a9f80179f73353dde9dfc7b45d3d39018d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5347bb4483765abb50f1380632a9c22ff
SHA1ce71bab939f5331eac0c71771a62bac9f5e65309
SHA256719bab61aaeb5634e4c6dab5257069f3d1bb968f7d7f0fe283cec50e29daf112
SHA5121d90a2635b38d9129d09dc3dca35a0cf4e3029d7ecf98b00c18de30d4f8d391b9270aebcfae55b2d545b07e1949f8c183a0889604bc269a1d0fc0263af24e78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e63cbf5bff9a98d2dbab90b2a18a7ae5
SHA191dcba44a077802faadc2e9a0d4b72a95c56ea94
SHA25608e7045c81aca7de39228c4c893f209991f61004b9a5c93c0c3c24e4f5da3356
SHA51278429f841da15c76e678dde98ad024583426b242bf43d30fc99cce7811d6c47493291d21cdb839188fbb4486120441724e32694ccb526deb1e03dbedbbddf329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b2d7b94a26821fd02362ef7c19746e
SHA1d86cf4ac3eca1c249b963996347c2d094a3ef930
SHA2562e1fe5a31055d37e70a0b4f3c20d89d7fa92e02aec9d31c18bf7001626cc9f4e
SHA512c9774e93170f23c04a77758ed18f6f25ae40052f700e2489ccc9a870ff8fa36ab5c40135062aef819925d1f74a99d26e6c975fa52ef8cd1c207b5ef55a214b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c11a824aa298d0395f1dfb32d9a0adea
SHA10c06cca02ff6cc1f0419d8418cddcba11d46775e
SHA2564f256af38007a0081db7ff2f0cdde0dd7155cbd1dbf1360db761786df8f85a2e
SHA5121d84e1db27f68c799915bc1ac36e4a0587c88e22cc27467209149fe0d14a52d64ed35e594f33695593853d904f1ad11b29f9d2b68663fce50843256d83b9a1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aa7511f7b2ec3de39876ad391cf35d3
SHA15847c613e52d7c7fc54139e204db206bc518c1db
SHA256757f3d5e2eca874e706cc0d684fb6293d432c92dbe9d4483f1e373d5ef0d58ca
SHA512e0de23be762ceeb4e7e64e83e42d5c18ae244dee3dbb6aa3afa16cbdb8d6a16ec270c3a36d15775ff2030ef6cf67730048247e4f0daa7df196b93dee2a5916c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e378d90afe02939eb9d8bb4010b08ec
SHA1aebe1df3f0d01c9b6ae80603cc8a4ef79c09bca4
SHA2564689b3a8ac3f6b70be5bd405468ca22c0d1565a1be7d53030c67e06deb699728
SHA51263c1ef32a85299c314a490e4f577203810b7776559af86c01dbc8bd24e7a8a482d9fe2deb3306a8af750a160ac89ed2c8bdfe3b6722e3ecdbc56af8ce4bae645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5873ee6f810678c72ee79113ab5f5e0e7
SHA1704d24ce94bfa5d40fa54a33d1108ed77a7f73ac
SHA2566fe48e475923e097c24d8d058e07c5d30f527de120a1418b9076b56ff50deca6
SHA512486a87ebe41873ac1af66a5b7f973c957f3832297e3aabbf480017b221d69539049af916f1d058cb4c03af29bc94dd539d0a30cdb275f2ede406e2d8e507c880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579f68d307e38f59d1fe13930fd48a38d
SHA164e0740e87189ec423328c0cb5a51e187c99a435
SHA256b8cc9c9c11e16b7bc85727d737bfcfc0cd55ef0956a6c89274033dbde2bb0d94
SHA512aa7bbd7ac272438e3c0cf8e6fa2739a4b933ec466509a0193050c2290219883ad837dc0ca33b8d4af70bd560a3531c5ea2f20aca844803db3f14dc81185fdad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b56090ea6b3a42791559576f7d2bbd7c
SHA1c784149896f681f7e17f30a74bc8ba477848b22a
SHA256099b2dc7eaa14762748d09f9ef785669e381f5265b104f01a6fc9478c41d839b
SHA512651cc66b5d0b47b3ed05ca9e91031cf3d87f22adc58f4a637e014502a5541137d09a61ee7c1cb67121cd96ca6f06d640aba8acaaffffde4012c47267b1930dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57083c5ab399a7e2880620d5b0a98a7a1
SHA1fe6420789300de29fe4b9c4f51387d2177e0759c
SHA256eb1eb46e30f568c6b1df2b225ef57cf8e92783a52fb2873073491c075d2a5478
SHA51299d7423a4d8fae07aa3b5d182ee0588c3dedc72129547dd10aea56193d68a37f97361f399483783ccbb5e0e4ff40309639d226ffe799d38fcb3d97100d5bb219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e9bb78f7dbf951ffa0bb46e7478747a
SHA1072c54cf4c7047ee0eec6c173a263665619e171c
SHA256bac3f77f76c4940558596c0f59e39ab9a457aa6a4a3c3ad3d3cb21f35342d152
SHA512cbcef12d66fc1ba1570b5bb35cbcb57127eb68bb31969eeabee6091f4dde37699206cc4834bd159908830e165bb859b46b3209bebb45cf2902a41d20dcd73eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c9a9b269a8fc612739443c23923a11b
SHA1316e8ca93a2ef88fa0f17aa795028952cefc5363
SHA256e49939447523ec4740c4deaddd34621ae3e3658b27fe750bfc6e3cb7cb70a01f
SHA5120b156d7a425ab4ab6b962c5d6a3abeab3707ac0bb907b1100fc5628b36f00d48b0da1b938f596855c579b8fcb12b0f3f553e3f9f7599db31536c26184a923048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef3daad67d486e2cb13a86df84f49214
SHA160970adce40a912aece6dd181fb21dbd500ea627
SHA256c16a30fee49dd256a2177586ff7655750b6245d55393d4c0f76c7c132d0096e9
SHA51218cb594655e73697d5bd26d5b57118c37cf999a0493b6403737a165837329c662a75f13cc06d6a7d71851b6955baeb9aa09e2fadd111c6f7a7b21dbe9fb5542f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff1a0e65e27536c0d9e0c8cc0b479fb1
SHA19c096b534ca56808a97fc8bcf81f12ac304f0419
SHA256c58997801e961d3e703c0c0326fc9e03b70e340f8b44ea3d6986e0e98798396d
SHA5126b6a2b0c8e2ca7763fbc123ab050582e7e01c2dcfd4733c1a9d5a0abfab51be05d04e00b47a147900951b715c82d2e73bf688282f986215eec0d48fe4ff8c4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eebc2e997b7e525f78d7aee6428626ab
SHA1707a5bdf2934fd8cbea5c7ec7f5c5629e5ff170e
SHA25685c3e84df633815e19db18ed7ef24191b19eebd886a13d98a18273751fe43391
SHA512db9a201d2111d9bef20b14ab99c993d0e8538a8031d4e95f433ee4f062ee0105c47dcd992f63b0da71a0bd544d61abe262e6be6805393ce539987b4650a71d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e5f708d1ebfc7c2e9983b2c35660cef
SHA135c39acc87051aa9dfa57894788b39e19d1e2cdf
SHA256bdebfde7b09322229c8f36cc7bf0601187f1f3d32546025bf1bdd5e489df7f8c
SHA5121dcee49da3712eb888ddc7b043f2b204c6d935d5c0ff5c63a70f091685c741f52dde89f9579b0a8b94fb32c6c0f876ae48adf4584a107c8394daa875e674c3d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab9ce095300da2d2dd61bd4a6492ccf2
SHA13721d88f4fceb539ba6c11fbac9488c4eef0e1fa
SHA2562e4d54070cd0807c81fade8a3199bc2487c77cb34ff4eeb2a6c73440922fd065
SHA5126df32fbbc91acfac14ddb6788e6bfeeee32837f1173f563d3787d992f4a5beb107272a572da0662c333b79e9ba9e528b5e19f0f35c3fbeda958cbc02f784c097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c88a5bf62f7ac75218558792db5c4fe
SHA14f4fa9d43a694216a8e473506b4b378b3203d01b
SHA256d1b4f9e5ae4ffb5265d0b76a5c2c961626defe3829ad63f62b48cb0d672a3ab9
SHA512a6d7d8a0af039e13c7066ad2d15dc8e2ef59d1f570e43a0fb4855c0215e04e13770b86dc6191ee3916abd4542594131faea414a8c04ce0e8431ed3cac1738d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581ee332774556fe029affbf374bd9489
SHA1c14e612936b3292b077a36fb724ddef74704e709
SHA256ba1550d018ab7a86593549ba39020637df3f8084f457027d86173020f6260bfd
SHA512c50648cbc4f174d615d1cd0744a4afc82d65811983ce31e41abd3fd99139e5ea4d8f90fe0f7457faede8dd699797e348a7598e0e6c0b8413d01aae9fe8428595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54670b7cb5c5c251fc9526e1b5ca6a7da
SHA1a54b9ca9a3b8dd1af41e935c5858117407cdce50
SHA256e23fd629d140cfc273a9e7cd95cd7a534815a90cf4860b102acdd5a0ca1b575c
SHA5121d6e5ffbd08599cbc0232b1da57680f40dbdf51453e7029e0e33d4fd12f885aaf50acd933f7542c5ef47b929cd608df6f8ccebc748c61704ab35074b2b69ee11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ede73f6a05ad64cec618b992844e894
SHA1b6105cc73e31cda094352282b8160d91e4392c53
SHA2563d6fa350ca5eb9b01ed3509cb4ecf2464d7c194f992a608df314cf089c37d0ed
SHA512aec2323870912e70df16132102898a728c4c243648952fef0bfe292c4af7617f9e207a779ea70a7e11c4d664e03fd2f9a877c500f6b813ad8a2c15829ef3065d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518c60c7403eb84d52816506593696d4b
SHA1c8da9a02ea7ff3592a2dc02bb63fd4f11c5e68fc
SHA2565399097887bbbc46e03dba6bc72c4c99f958712c4908b149f7efb11faf73e5fe
SHA512f8d6a53269dd30c42d9e8e061290cc44bd69bea62558baebe9db6e6a97e2f3367fb3683f6f4a124e4a33da5dfe98ce1a1c24b798adee024e8a718f3ef2c93ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50336051a4264c20036a45a9029389686
SHA1a05dc6016297923dcb80acb71d35737ee80c9e48
SHA256875d72f46cb867939a0ec0ee3d95325821743f07848e9846d6cba968a7d2ffca
SHA51223bca71f2bd406b147a9b0052186a3c7f82aceb884d98269e39c5b44fb60e672fa5bda9d981fad442bd6124596a316be03b56b09de10c3007612150cb8afd1b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c01d7caa2e8a233ee2abf979d6ba12e
SHA185461ce6303b60bb048f217fc1b9d5174e0759a9
SHA25674b9bedf3dc5c694e515664c76dba4fa0b8c8152f5971fbc011b81ddce7d9cd7
SHA512bde300e22fc35ed61c0becd3d8c856af3f549b10540eeee048faf8306267ab19ca165acdee1e6ecddc826f0a6cc0d611f17f9c0d69ef66de9bfa725188d027d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545c89d5ec21cb931c720dd37a81d2a5a
SHA149e6ed6c0241d9184a3a02d9e5e137ca3dd27e94
SHA2567a496d52376287c0234bf8a8b2ed2984f3d04d2fe950e59c7e6db3c1d394ecf8
SHA512c8854ae410c7a56c1845fbbb679905e682287e80594bfaaa595398f108da64cf38522d4926ed8b2791cb899372309106922955c68074414d136d4bba0a3f1ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fb0a97348aa9868a69d68dce984d135
SHA1b150bfc456f0bebd5f5cd30b0d0221571c497fb9
SHA256f3dec5c82fdd6635a3015ff4a97d1d13d54c4fafe9d9efbd2895be131fb784ec
SHA512b10dec6f633c35a4cc01fe340ba0904b53d7ff8846776706e540aaefb55d7b82bf7d5e1e064085e99350a06b46cbf8cc91e2ef9a8c96744a5596e34bbd83cd3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize408B
MD58c9f1ba2c8804d595362d94b1983f221
SHA1fcaef470191a6d7e0988cf63100e798114437a05
SHA256fc71212c3f7ba9a115400c9b3036725a109dd24b44ee95118b17e6cec2864c51
SHA512c2af2075d319b8ea23d6221b48c3db4c77b4e481b322dd40fd715dc3fe05a7eb774af61e0fece58759bd44528f9e5d6b385f8dc65d4bbaf2c9c155200d13262f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize408B
MD520cb6d35e8b15c49ac32d737f7b7a8bb
SHA1804f881364e2762c33084ffd09aa6b065adc8dc1
SHA256c6149d0172508153f4853efb91468859155e5d09b492ab8836ef520f6ba96baa
SHA512e04a20b0f3ba1ceba9b9b0a0eb59b6167e4ed8cc07a4fe09eec28246c2730b643ac964e68deda612cc167d6e5589c62a0cce2b2be918a215e14800a344d30d7f
-
Filesize
110KB
MD50a86c136dd0bcb52e33782e661768b7a
SHA107cd9beb85ac3fa9c775c50b38f97084577d77e5
SHA25624e8c3a7d5c11396c74802b6168752a6c480e28f5ce259b96486f119b8b1d964
SHA5127ca51b9ac78bba0549b00800366800910b087055e7cf772310ce78c05b98f6b279d91f4462cf48fc4ea6de050a3ea8dd89e7856b4e45fcc4471e702abd9f1bb2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\favicon[1].ico
Filesize109KB
MD5504432c83a7a355782213f5aa620b13f
SHA1faba34469d9f116310c066caf098ecf9441147f1
SHA256df4276e18285a076a1a8060047fbb08e1066db2b9180863ec14a055a0c8e33f1
SHA512314bb976aea202324fcb2769fdd12711501423170d4c19cd9e45a1d12ccb20e5d288bb19e2d9e8fd876916e799839d0bd51df9955d40a0ca07a2b47c2dbefa9c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
671B
MD5fcea73f5b6a145c8b59f50f618f1729c
SHA163bd4babda89658c1c5ecd3fdec74837f6b1e046
SHA2567deab190f1d3ba4abdf0fd13c21e537bf3f6da4d7cb795d50389b6900ad08fda
SHA51216ee89c18f95d537bb8ca2b382600dc722163c53a3844dab6355848667f20c8a80a990f34fe5cdbd819ea653e772ffb82a7ccef8e025f8a4d01f50effeaae722