Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
65a5057aa3cd61160ce18ecf73ac5c28
-
SHA1
34c730fe1d3dfa2d3bc8c7c6d73d34f1dc0c9903
-
SHA256
0d53842e46ec3dedd8fc35eb32febc589c3c98db8a55db3343d0ea6337b07ebc
-
SHA512
9411a8fe5bc9a1fc5473ae6e0c7d1a5db10271417aa17f853d3cc8acf1dd02b19acd0b15e24010ceb30d566ce148b8648c2af1a5f6a07c4504526a53378deb0d
-
SSDEEP
12288:vsM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQK5:UV4W8hqBYgnBLfVqx1Wjk3
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2752 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
IEXPLORE.EXE65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\{C7DEBB86-5D00-4078-90A5-EF5A8DB2DA39} 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\{C7DEBB86-5D00-4078-90A5-EF5A8DB2DA39}\URL = "http://search.searchwtii.com/s?source=1&uid=20f06f9e-3b71-4c20-a1c1-415175d0f57d&uc=20180115&ap=appfocus35&i_id=tv__1.30&query={searchTerms}" 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\{C7DEBB86-5D00-4078-90A5-EF5A8DB2DA39}\SuggestionsURL = "https://ie.search.yahoo.com/os?appid=ie8&command={searchTerms}" 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78DFA2D1-17E0-11EF-8E71-FA8378BF1C4A} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70aeca50edabda01 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422505702" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c9ed8cc7e9540f43a939ccfdb1929bdf00000000020000000000106600000001000020000000c14c90590e6ff79b59695d5a83e80ca7bda64951a14e48354393147bf2ef9290000000000e80000000020000200000002c2b055a53f68932a6413080a58381231172b187b54e1bb7e5fa4d45d620da67900000009f48cd7c3502917874e1b7314d772689a74f2a72a08ec63c204932a6c076feaad91b497d3340d0ae7d264e0db2d175b033c7a11eadbd8ac32ba912f652dadacee7b21946c521e6ee50b97a0d5d50839ef861ee56ccd5f22ee39106d3e728397670fa14993d45dbc71e72e79e2eb2ca94553407ef1f599afd04bea74c1bd9c29e617ca347a5c0c78f9e2334e2ffac504c4000000042da9aa2c55ff3d8d42518e5749ff1f26467315ef942639fafb65e263158aeebf94e697db52c347eb35b0f818b80d5a9c66d5aecfcb546eb44e4bce809bad8fb IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchwtii.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\{C7DEBB86-5D00-4078-90A5-EF5A8DB2DA39}\DisplayName = "Search" 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchwtii.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c9ed8cc7e9540f43a939ccfdb1929bdf00000000020000000000106600000001000020000000f86dc86b1a05e6b45619f16fa58bb7a47efef2250ef1a56873337c71471d5866000000000e8000000002000020000000a7ff10418ac5e98fc9824e9abd8489203a5445854ff1b5f93f312971261f36f4200000001ffebc87f0db2d6ec5c1bb1e4f239a2ac5823efef89cebe0334ce88a47a23429400000002c4df89ad15ee1c5236db73bd4230f7e3395d5695ee70930649566c2d38e80e1b034f55f3bb91398c1d517e858e239f0d9db5051a6800818f2cf7474383e5463 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.searchwtii.com/?source=1&uid=20f06f9e-3b71-4c20-a1c1-415175d0f57d&uc=20180115&ap=appfocus35&i_id=tv__1.30" 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 2568 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exeIEXPLORE.EXEcmd.exedescription pid process target process PID 2208 wrote to memory of 2568 2208 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe IEXPLORE.EXE PID 2208 wrote to memory of 2568 2208 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe IEXPLORE.EXE PID 2208 wrote to memory of 2568 2208 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe IEXPLORE.EXE PID 2208 wrote to memory of 2568 2208 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe IEXPLORE.EXE PID 2568 wrote to memory of 2632 2568 IEXPLORE.EXE IEXPLORE.EXE PID 2568 wrote to memory of 2632 2568 IEXPLORE.EXE IEXPLORE.EXE PID 2568 wrote to memory of 2632 2568 IEXPLORE.EXE IEXPLORE.EXE PID 2568 wrote to memory of 2632 2568 IEXPLORE.EXE IEXPLORE.EXE PID 2208 wrote to memory of 2752 2208 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe cmd.exe PID 2208 wrote to memory of 2752 2208 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe cmd.exe PID 2208 wrote to memory of 2752 2208 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe cmd.exe PID 2208 wrote to memory of 2752 2208 65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe cmd.exe PID 2752 wrote to memory of 2112 2752 cmd.exe PING.EXE PID 2752 wrote to memory of 2112 2752 cmd.exe PING.EXE PID 2752 wrote to memory of 2112 2752 cmd.exe PING.EXE PID 2752 wrote to memory of 2112 2752 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.searchwtii.com/?source=1&uid=20f06f9e-3b71-4c20-a1c1-415175d0f57d&uc=20180115&ap=appfocus35&i_id=tv__1.302⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\65a5057aa3cd61160ce18ecf73ac5c28_JaffaCakes118.exe" EXIT2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\PING.EXEPING 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:2112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize471B
MD50eac59bb9858f01624f5c9b019ee1304
SHA1874d815e7993fefe6604a2ddb987ba561435fbfa
SHA25631fe0ee005b9d77aa6058111f1998ea449de5fcc841d7fd6b586ee165842aae1
SHA51242b24df68cae3ff676709b83ee95cd2cf55c9b04a827dfcfb1e1c8c73aa41f23d085bc667bb71e3c0afbd87871a7f18ff1269c377a29e19d8c060889c2dd90d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_D267D983F5EAE41D140C46E7DD12E7FA
Filesize471B
MD558217220e3cd3016e6e71dda3b4b617b
SHA12159102346e63e3f615409c809ab8410057f72fe
SHA2566ab9a77691fa2a3f61fa7d240cf573189ae60d44bb664a83fcda6c4f96935887
SHA512b0b750443e96fa284938726499400585c4415df855644ddfaadeb3abd6e32917788004a50fab9bcc1599e1bba4199034eb9f5732ee446a3cfa49a95ae162a05b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD534ffc19d333414385c4d1e0e4f059fcb
SHA1a4f3807281a7262cdaa111d7d909f1a9cb147c16
SHA256de0aa65498e22228f4311f0f4eb49d23bb9561226dc64962c968d6488a04abe9
SHA51248a06ad9787e8b2ab3d9e90a7abf7ac8682831ea0dd7e2af61d5a444cd66cbf0fd73d02489bf36db49fe7f804832e3c19bd54cf9835ecab28ac67508d03f2c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD59bbf3223f80a4695f597db63bb787620
SHA16cc3d8cdd95689afb7abee5dec46204b33fe8b53
SHA2562c195f16bacd823c773cd1f3c152db1edfa3236d996602970c2f0b581cf85ebf
SHA512404512fd06eb2b90fdf3ee077eb736b515dbcc5c57feb9859764701fe7ffc0e2acd2d1ad5b4b0e3ed8c953a6a78628e4a94781723dd124f3fdcac1ecc13a5f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56114a05c7fbf19c42c832361c5f9d0fd
SHA19800429c792875efb227c1f4a8f0b5192cd80d6d
SHA25622b9de609b298b787bd14ac1a6ea108128fe0af39f8f07ca587a063d991866b9
SHA512d31b42d9c50c31410196c2e21a4df140acc1f5ad951d17db7decd5823cfd21c5a813e76575542ef0fa71ffbb761709d5847f8131e6ca8c044d54a8a3da950395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5299156780a6c7d810f7a44f6b55fdd2c
SHA1f65d7173a8607f60017aa553438c1618795886cb
SHA256f8906ae8a68542dc71117b87a701a724502de2a9c2aefe2565a555bd35ce6da5
SHA5124e4a57818682814e71f07d9e84e7f23b4ab4ea4ebdff99fc4ce727d2834c2b8830b54b3bac39db0d74a3b982d793f313c4c2c41e84b5afbdff12fa55e0da7195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599f5bff42f20b884778c9138eb14c624
SHA1750361e9183c56dcc910653748fb0eb993352b2f
SHA25659618ae30e06d774360493ee3258393a8c2aa6e037aac20c05ea365ebbd6d674
SHA5123d1ae47101deaccdaca339cde13f6d9adc5c3b593fa83917fcee949989fa7359ea7402491520259605bc7e2a2e4d466ba89b0a1415b8bbfc153e026c21432ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560c99e937aa60b9c7cf514fd69f9bbdd
SHA1b12308b34d8e88bad48b73e051bd1c19fd052b9d
SHA2566e5e9bebbd45cc5358e13e6be3fc5b83371dcd8a530519aae5af4818a5031e97
SHA5120b1985f884ab63b686d586b260e701700de0371ce62f80f6837e86cf045a5408fcd1fee1e7f3a5293d5903f773aae349b2dfb16ad11f1ffb1d765b97e1c10939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1844f68a4e936f3dbb6d06be7cbdc0b
SHA1f3973efc1f85e039079f17df7780279795dec518
SHA256047c1a1769e112f99033513b8531bb7a5b829e48cce1899d02810b67148a82ff
SHA51212413022954c73c36991f824fac4618e69ddc30a60da690071c6d5508c930bb0a0be8259e9c7acdf3e558ecfdeec23ce2e1caefa88c76f277dfdc0f0252ad5a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd31632659c0b60c0c418b44115df3c7
SHA1181bacb7f037b664718a5a56c2564a279471dd75
SHA256a42ae1585218e519eedf8e6c55a2cb36e6ad4565a094a83f1625ed8efe5d2f86
SHA5120e4cf4d6f49ee30a47a83ce47160b95158a629d082a99ca863bacf9ed306f9cd23d39532ac882369ab3bc5382dea985be3ee0fa03a65bcc00aeeaf7bd9deb0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558686b666a2a1b82af93580ce12c622e
SHA1671870c38156dc637a8e037db324708cd3613c77
SHA256d4eef815730d4cbca9b015a76850365e92ece95e8086abcc400d0daaee3ef54e
SHA512280569304d7b32c12eaa995b5559b1b38c6c346b98efbc4a7fb49f9018a2438c437fe7ef64b53e47101757172772f2dccab47c0af4d84086b08fe701334f5a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cff8f8947a33f6c19029ad80f5c2372d
SHA1c37dbd3f84c8cc00d7991d728b6c42d5abb5eab6
SHA2567b31d82345e35703a8fc0314925536aecdf8ce50c2dddd38316b9a0cdc69e29c
SHA5125a9f43c807050169c38624ed81372fa15a8fa4df9e44d6bdaa9dcb689582b24a04587bedcc4fd77ca56a3401616f01b1de10a3cea4626a310bc8fc1b88f5fedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f1e6f7c1fdd63edaa10cd6cc7a51708
SHA10ac1a9feb337a98a77f72c000a8495e2fbbae43e
SHA25612dd88c96b97873356fd0966f91448501edc34dccd0b3c5d110087624cfa93e0
SHA5127e154fa2cf389383f8416937c6a9068ce25cab97dceb3513f21fe59d42efe75661b7b64fb5d055428a03e82cdecd8f23a7778afde8a8d31061e3199cb5b238f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1203acb88c5df4895d6742e6e7f5d3b
SHA138283f35765adbde1e543dc0e74f7151d9b06a2c
SHA256c3709a15242a0efe32e9675d771a96ab3526e4ceeb95ece723cf0af044e9006c
SHA512bacd49ce95b18bea19e6bb702d7e473c5f78b8aa7ba17ec4ca7fe8c7de09256d4ea9c137fd6820756f86bf0862297b6150e051636a33a90c174b45148f74f065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df1b93636336390507c79c33b51e1042
SHA179bf3743f26a1f7e13f6669258721b9e17aeee8b
SHA256329b81dc4d1212907dc63de5a26b732242a28ee93f5417452e2bf50861f20978
SHA51221ebfbd4127751edd087e1730c45afd31e0eb5a4e765e53dd349f13dc2e5e21d6567e89dc579c06b1bb153bead788c048ee84d10ebb8ad9c338bb7482dbd8a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b73c3c73d7a53a334a28f8aeeaf28c36
SHA14170ef1cb02d49ac20c47313025ec187a0ff77b2
SHA256cde74c1e3b7c59bbf47c94a4a432d3827b1d488bcf62c90467f4d2a0e7350881
SHA512d1ddbb9ccf86380a699cf6a79e37fc734825fef9f983006b68f2f8b360e7ac464097a89195bf9cce2ffd75fcdb0b3c7e5282eaa0be587829353e3f9e16c6d916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57368357c8ecd1471f62870103d5a8cd7
SHA1df7de101968884c0a7b1ff1193995ff91ce46185
SHA256d2417671126370e7e4d2f336d1add9b29936e6e0d19ec0eb428a8e94d6b63212
SHA5127c8ff8544a9de0a8b8405c5becb25a1894f72e13d7cf0da4613f2d95f3df18dcffd82eca217782e4c5e2075f7306b5eedb7ec08319dc238b709269ce8fcfa60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4afcf77022a6989f8600bfc141a3540
SHA1df2f8f98491810aae4996278f96fe1e765feaaa9
SHA256144197717ba78ddb0dcee51844af8a0e4697d7fc3a923aa0a151e30b5699edde
SHA5125a58a264a83e0dbd560f57b157682bcecd6f483d95eec52467848b0f7598251a0235dcfc9cf53cdb5782743e60684c0ce78e05f1ffc7f6e5f5c9cee6892c87c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba56c5d9300442661a9609fd5b33884e
SHA105b987e5de01ee0b45ad9390e03c04c042ad31f9
SHA256a2f726e3b930aa98e06561260efca2ec6cd0cea6f62777814dfa204996be7fdc
SHA512a08b412d4614761433e35c0b749c8725f95df38c63a2d57b918e92119f8341fa0e32586842e9403c4c1a12a85c7a536319dd0704becf754a650bcae97cf1d34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572d130692799026bd065a530569c14c8
SHA1a7e5de22c4a10583fdbca779719b3513bfe4da1e
SHA256fcd48099ace86bb63e5c102cd35178e1798030e32839c742b5d6b43a4ed831d7
SHA512b2edd31bcaecc4b21b7bf2932563d7613489c43f4425c47e91c832680b3f6daa8ca134e74360b7c72bd7bd891df0381a8ba5d9a7c977a0032f3433b0a9aa0482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522985a05fe24693d8cd26f8de107c30d
SHA132381f5f7ed332d383d57f952e76dd0a3e7db6b6
SHA256e92d9a22ceaadf407de84cdef70173645b55cd1b56dac19ce0fe8f216ffcac31
SHA512aa4c299441e4be944c7350000a4c28560a1815ae69311ddd0519266d1c4a998f23f4133514851aa370ac2c525e9afc0cc9d4c03711ad8db05cde763fe8c69052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57861f274e656a869af5bb46580e282bd
SHA124483042332a44aaf7a7565815fcef8daf817076
SHA2565fed91d2cc68f1b7ddcee13bed6c9a8d6e463c07c0a52ad94dfd4af5ef3320af
SHA5128278501f8b129cd7c835276b848a45f00f12e0ccf4fafe50d44d18b13a475874e2513c03016b15c8ef114fdab51c4d8ef2c1fb8241b38f0853e1510d560db694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf8cad0ef67d2c4d4fd11a3c68d148e7
SHA141aa63e75587a2e3b04aa53d07ca10345065fe7e
SHA256953511631864d3f95af34210222e19d7998d70ae92e1ec8153e269174c1f7b83
SHA5127dd09338e790df3217656b5c13346c08ebddedfd7a5e3f8dfd6864db0a4dbe5be0368622c60c5c5db1ff0a56ed8f864556aaccb1dc90c4d02db2c9623ad15434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5642a5538bb51787f4793fea4047d5db2
SHA1780f9990667c55a30b073e264f9bc22d1346664a
SHA256cdbfa1c9753fa4f48e9400b39b9e74dfea24597dae57bf87b78c2c084d84d831
SHA512cd0f1f686a6c785f8d1c66106c96cbc22e21e5a1affacd091cad22df7f36584bd759832bd8eebe042c807da9429304d73fa8d5a5bb53eef11d91e1235d574c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54be0d512a33e5684ce29a9b1cd1aae60
SHA19401519e91afd7a43bb6dfc6113eda61f9a59cef
SHA2569d8a2deb5ac615a1d6badd4fb6ea740d3920573105aa79243a46421f37d60338
SHA5129827929d91a7a4efccb15c93d46e97486d22c4e0e6311748451ff7d283463367ce1b03d0e51053e608d7c55c02881e1b83cb80408590c97d9525980d70cd3553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dbf3dbb0ab0685dd110b8a5cfb149b5
SHA1d1fc03b81974917b79d1544efb4caf1fd8566206
SHA256e3e72864cbbd988313e33bee49019028df2732e6c7df001d37e2ed1fc3759fa7
SHA512eef601dc94f930830b6eea9f8b91df25b6476e45bb33bd04946b43720946d16ae6529e2d7a4d7c4e6edea121cd99959f39c1b1f6039cad72e183277a6b013bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6190ea03b8cb29defdbae2be8a3d572
SHA1bf6077461cb6fb2779afd1536e41d908ae72645b
SHA2565c9550b1501f3f5bdd99b8ee7e906c46846cdaca1498d413e9e651a94d531435
SHA512d4716071c0e59e5d8f265e21c9ddb556fa9ccacb8b8a14fe924cb155f4343f9df8750e681792ded25f2fe62c86d5c033046c875f19fb623f04a3e74cc17bd2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c02e7cd64614460ea2335b9a618a115
SHA1c434930ec3d31d9a059fa55c96d47f203c0afda2
SHA256583ba2cd66b68cf4083bb2a9c0625c7f4bfe123b8249d918707019ddc33abd04
SHA512a319a457297022fe377c5a29357fa8e0418f3e2038cb424b0f02f01da7d684676984a18dcdacd2318907c502c67d7153dc5b0d6d1e811799732fdfe6c04b4e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d8325ea10d2554196bbb2a28a5b39ad
SHA1903ead486719eaa11cfa57ed33b0032c7812be9f
SHA256a5154b22383b43e33d05ad2fb9985264eb13c49ec52e587e5ee958f7a35fee7f
SHA512c2e4fbf3f6f70fe45161dcb3bc595acd4955eec526b4566805cff5137021db3738ff0d5414c7c88fa7a49244a1b78efd9da121478592c9742a950dbe581925d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize408B
MD5f9d0b977fe6d0311ea921bad1687d69f
SHA18c5b09f084bdcaa97ce40c25946dd8c19ac0d646
SHA25617d2cf5834e280f37e8ee0edf31ce7ac261aa435c0a2e124f33c5eb6ee9ba3e9
SHA51203dad74b8f305d6d787097a7be5269a480f181f03baa4de0bc2e621aecb6270aef1526ee0d197da8b7c9a0dc1220e4786f7d1bc8a62dd2e50183174b7537ddc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_D267D983F5EAE41D140C46E7DD12E7FA
Filesize410B
MD57354f3ce71fdaa74e3195767e0d6a2f1
SHA12e8948f0be27b77a712cccbca596592c11975d79
SHA2562199c204741014658e0188c97bede228cf2a597792376e2bf9a7c23c51897795
SHA51211fed81a5f6e5f3924ab2de02e4c56e5cf8fb22db1b5818b1f25d185afc96e1362efd21d40837814c9d1d16269862ab1a238cbc7a4affbfafbf89b2121868fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD523775a901630214cbead035e432c3f26
SHA1ec9bdede4ca567b0f3634af4e792deb655a71a0f
SHA25620b9f2fa6173f151a74bfe9fb96b8a719c4789fbc084f2f8e17676372a7ac47c
SHA512a19df7556ad53385f8cc3ee5af01aa5f68a35cd90c3edb7d999abe6f2eca25d23bfe28c8b01f5ac9dac9e628ab1757a47f48e56164e444cfd225ebf10313dc85
-
Filesize
110KB
MD5a973be019238d5f5de5bf259c1675de5
SHA14388cd786e6384a772be8dbcfb074900216d3186
SHA25642e308ccdbb91834c5fd002b69aea6ee44ef697f22901f0cd01ab492b92e4cb0
SHA512776c6a30126ec3417bd773cccd5924ab2def2fc6a662d5b1a301a479a6c1d1192583fb9c4253eb1bb469a908d49d0e6542b41dcc4fbe4b4c50abbf9d6d3daa5a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\js[3].js
Filesize191KB
MD5ee4fa7552a2ad184689e702ebf5277c1
SHA1d977833f542ac41c01b18a686424e2cf050e21e3
SHA25656b0319e0a98833af49389f7aafbaff2453de0367b21e0a4248f11f3ab9dd426
SHA512ab0e32f60ed5b56f0cf00c1b93ad3016fdeab01d149b51db7650534ec1561ef74b9473048c0943e1b0355d2d6126c1514422abb2c445bfcdc41e01c748d02013
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\favicon[1].ico
Filesize109KB
MD5504432c83a7a355782213f5aa620b13f
SHA1faba34469d9f116310c066caf098ecf9441147f1
SHA256df4276e18285a076a1a8060047fbb08e1066db2b9180863ec14a055a0c8e33f1
SHA512314bb976aea202324fcb2769fdd12711501423170d4c19cd9e45a1d12ccb20e5d288bb19e2d9e8fd876916e799839d0bd51df9955d40a0ca07a2b47c2dbefa9c
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
688B
MD57f0a0a866fa3c821dacb7ec639ea3020
SHA1f5eeb74e50a4be9f6ca19368587eb627b1a2a976
SHA2563714206ebb1bcc8870d9ed199fe0251bce1617787fe4577268dba39257d967ab
SHA5127ac1d167d8ad8f754e1a4e5066ed89fc810905568d09351461087ddd7b5e2b633d4dbeeffcd855a55221d76d04508e77889561c174838de33456bcd24f61a64f