Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:28
Static task
static1
Behavioral task
behavioral1
Sample
65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
65daef48670c78cab5bdc4b9936acd31
-
SHA1
206f6b8a76ee797d9302ad61eaaf0184f9ac75b3
-
SHA256
151096ae684862cf50122f311bcf862bc3cdaeb9bc29dc101af537ee6f9297da
-
SHA512
06f71391ba15c68627bec9282e60e2e1262810de169857fe701eef53ca67e6f5e2fb17bebc9f01e707e9d3d5cbd66cd4e05ed6ad9b3519be8bd18fbbce70478e
-
SSDEEP
12288:nsM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQS:sV4W8hqBYgnBLfVqx1Wjk/
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1936 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\{3E2AAA7D-42CF-4350-B6DA-7D0E01F25854}\SuggestionsURL = "https://ie.search.yahoo.com/os?appid=ie8&command={searchTerms}" 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\{3E2AAA7D-42CF-4350-B6DA-7D0E01F25854}\DisplayName = "Search" 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\heasycouponsaccess.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "21" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\{3E2AAA7D-42CF-4350-B6DA-7D0E01F25854}\URL = "http://search.heasycouponsaccess.com/s?source=_v1&uid=44ea9409-9ff1-4ed0-9ae9-a185efcacbba&uc=20180116&ap=appfocus368&i_id=coupons__1.30&query={searchTerms}" 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AD49791-17EB-11EF-BE0C-E2E647A5CFB6} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50aa3932f8abda01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\search.heasycouponsaccess.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\search.heasycouponsaccess.com\ = "21" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d643888382364342be37d9d5f3dada2f000000000200000000001066000000010000200000009282b066ce39bb7a50a9c005ed1c6f3920b76c3d975976d6ac5f9cff1f1f813c000000000e80000000020000200000005f73cae8d706b0bc4cb927e266138c4d0e3082849d96795db0ec4c715d91edc020000000fc0099125171f06727477d18feae92fdf0243d2777f3bbf1cb1699fb22056e3140000000371c7cd53d95ce9cd89e39174b72611c9a2508229eec5a73447dc39bee6e18720e8011b8cfbd99adaf9e7f12261d6e929c3e7d5f89c622cf4b164217d3655b16 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\{3E2AAA7D-42CF-4350-B6DA-7D0E01F25854} 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\heasycouponsaccess.com\Total = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\heasycouponsaccess.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510376" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.heasycouponsaccess.com/?source=_v1&uid=44ea9409-9ff1-4ed0-9ae9-a185efcacbba&uc=20180116&ap=appfocus368&i_id=coupons__1.30" 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 2652 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exeIEXPLORE.EXEcmd.exedescription pid process target process PID 2916 wrote to memory of 2652 2916 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe IEXPLORE.EXE PID 2916 wrote to memory of 2652 2916 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe IEXPLORE.EXE PID 2916 wrote to memory of 2652 2916 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe IEXPLORE.EXE PID 2916 wrote to memory of 2652 2916 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe IEXPLORE.EXE PID 2652 wrote to memory of 2672 2652 IEXPLORE.EXE IEXPLORE.EXE PID 2652 wrote to memory of 2672 2652 IEXPLORE.EXE IEXPLORE.EXE PID 2652 wrote to memory of 2672 2652 IEXPLORE.EXE IEXPLORE.EXE PID 2652 wrote to memory of 2672 2652 IEXPLORE.EXE IEXPLORE.EXE PID 2916 wrote to memory of 1936 2916 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe cmd.exe PID 2916 wrote to memory of 1936 2916 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe cmd.exe PID 2916 wrote to memory of 1936 2916 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe cmd.exe PID 2916 wrote to memory of 1936 2916 65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe cmd.exe PID 1936 wrote to memory of 2524 1936 cmd.exe PING.EXE PID 1936 wrote to memory of 2524 1936 cmd.exe PING.EXE PID 1936 wrote to memory of 2524 1936 cmd.exe PING.EXE PID 1936 wrote to memory of 2524 1936 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.heasycouponsaccess.com/?source=_v1&uid=44ea9409-9ff1-4ed0-9ae9-a185efcacbba&uc=20180116&ap=appfocus368&i_id=coupons__1.302⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\65daef48670c78cab5bdc4b9936acd31_JaffaCakes118.exe" EXIT2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\PING.EXEPING 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize471B
MD50eac59bb9858f01624f5c9b019ee1304
SHA1874d815e7993fefe6604a2ddb987ba561435fbfa
SHA25631fe0ee005b9d77aa6058111f1998ea449de5fcc841d7fd6b586ee165842aae1
SHA51242b24df68cae3ff676709b83ee95cd2cf55c9b04a827dfcfb1e1c8c73aa41f23d085bc667bb71e3c0afbd87871a7f18ff1269c377a29e19d8c060889c2dd90d9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5c6f1c8b3e3c7542bde22dc45a56de8fa
SHA1a221fab546de07949b21438d7491aa771c975416
SHA2566350482c6fa66566b9f24acb8e9e672dcfa9876563ff56d54b73728fb90665f9
SHA512f55ccf5a55099355c913e845b1a8efceaa7cbb0c5bf60836c50afa098d42c8cf644ab319de47ac3e94aed81f4ae3ddbd2400f1b729f28c23df10e9d277cbd951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD543c6f516dbcad9d75a432c386d0179ff
SHA1d2c6ba130b2e5984de01d36353c8c217e343cdb2
SHA256d3ddcab12c1be9ab45580cd4b6b95c6c0450c8a9f4f59af5274625aa4c38ceb5
SHA51273f4af63227b4d8b5c07c2fe7b61a9a74f089b69526de012f34294140a51447bf010938c85b50b1c0742da027cabf6aeb573728c3ddbfa2eba9abb88c43672d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5893068f5221009208675ba4d8f81361c
SHA1611d3887955f9ece553bb40609c5a4aeb694a9c2
SHA256ba9ca731e6cebc1a3f4e6ce55ce6c0a5739b21e4a136c77e507dc9facf6a0add
SHA512597a196bbf3176ce93fb989da253094f720303669ed0777b9b2ee17ada5bd57d58d9bf01b0a8fb8b3f5f6328eda310108a13c5fac8e2c479365dc55be38a93d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6914048452aa44f80e4957df1cda4b7
SHA1a33dab7bfd9a7776d96e8f0b3c6d4ef520b7d842
SHA25606aa317f8f67d1a940b3c43ccee23ad43b0248cbdf599c61938dcac1a152b74a
SHA512e46b30cdeb5e3ea5784eb0f742165a120c136c006796cd3b4c3f2e6b10225d72052f88b5a634e3bf439e14f86870cc6d9e2a73f816808e6328c2d95a895397fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cdf3b24bb8a941d2235f049ff4ca513
SHA1884273998629b09a4efb1d4e575b02741ff7ee3c
SHA256258137545bcc064a95f070c7dce3f3cf45d96ecc90644384bc113bf2f01e58da
SHA512d080995d9abc0e0082507c854b58ebd0338e8a9672de9e29c74d025cffa1457e6797eea1307dfd6ead38740c3123701840975b3a34023e925067a47d3cce4a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2195669e11acd1191ad614747dbb53a
SHA1846785304a8329c344ae0fbd57ccd7804fdf32a7
SHA256ff85ea2feab317a248765558f8d22f92fb94c213eaab0f773977242838dda606
SHA512c20a0b306d665587f9fe7d4724c8d55fcbba74d6e1337a274f778642d3acc6ae7da1bcf781b7ea77b18975bc698371d6073295ed4d4c7e802a49a63a0a80d336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577c7abdde7bc81805bf3424376d70ef6
SHA167382b431e64ddeebaebe5e8237ccac94cea7cb9
SHA256d5dbd3de6edf8573e4ff35e530aa7d61e82f0b40fa5c1dfa809f2e26cc9a9691
SHA5120befa625d11d20e2cb9937199a4b5d920ee143d7d60f346431dd3769c4a48927fa0b70527435af71d8d517ce42a05ae378c53533c093e4f6e86f0134922b089c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599926862d186ce418fd427e57adef4d6
SHA11fe44da3681ab4f1c6e0e5f3f92d8e784698e3b8
SHA2563e5fd6e27c0cf29c52c0ddd429f930856648124a52cec433a01414bf2755c902
SHA512047ef244ac3423f3541a5109e70d275cbf3711a726a328cf1942fc81b252ebd271f106aa99b4ad73e8c5fbad76e6e60fdc72e9e9146683686f2f673f1ec3e998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a64270015b9c820058e457c3707d909
SHA120d9303d44aad5d65f60338cc1de5afdcc754424
SHA25680d7f5f481c4ca7a63b41d04fba38d652cc859567f112ba11433a280e7bcc318
SHA512a5394c22b963973d9cc3e1e95e4bd2dd0e5daf84f473ee4db55d9e9ebb7cf201c718b4d69e4ce98541a7d8af4f1289613645f029a734f517876eeef861999e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d6428d8ca0ced6265ea79fab3db3b4
SHA1e179d7cf0e8850573fbdd0e2f6138e2406838cf6
SHA2564ac9936d70a33ff8d6713b283f54a1b3e912f487812b0eb57420aed02c8a4d38
SHA512e5500863815f3c279f5fb87477dc090395c67a4ea466a75d3967f252db3ba37e9790b85259019a73598c1671805a4d703b6fab62187addb2d65f7663821991cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0b08c5151181b2fee42f95172af68ca
SHA1d87e5a1531a558014049a8a2b8e84a0b62992b53
SHA256ac48b4031a9aa7fe4ae5f453d0bcae1246534656f6b9d420e31c3534ff330aa6
SHA51240488b20ee61f0e6a5e24f39887afbb1fe920bef80a7c51e5d1a4bb7f73db7324d030ae59a3406b121ab939adaae0cee79923a9dd87c85246b3f4d736ac28bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9ec9e2c6b111baec27936f248e01974
SHA12055cac31abc78932a1a91ea5aa757c027729e0f
SHA256dfb8237d8f480bbd7967dcd007e91fa0d58d297fb99ef3c901935cea14df918a
SHA51262f60a6d1db1d094f84f817e899eb896c644b8e6facf4bae0f1c2ebf74751259dd52a238f8c36b9145593ebd3d2e9fc8b6e401a1fb6cba8a7c0e7175fe5d3de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b27e4f65768ed9753f3c11c8cc1b5784
SHA1e582655747012a8bef8d156dd2be5a05fca0ec17
SHA2563db226ef17a2989be3c131cdae6429fcea0f5a7dd6985b7302ba465ff356bdc2
SHA512dd0cba1ebfa6f7f501f0465f5649db982b79f12efea3b1c69fcbdbfc43cfbceb6c04d758b9e40f341d4f6bc9dab3f92f974460a4712e7694f068ddae253a0fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d40af8715e4545178ecad457631ffea
SHA1662dcf18d25342872767ff056bf9a54ca0c3067b
SHA256a2c12dd3189e757da1ab02d1d1f6555680fe9860a76658e13b5a1d572dc94711
SHA5124bf1de68cad08dc81a828b57673f4cf9d0066b2f3c0b6bfc93b655a827f57e366af79236d5e2feb63c6b5c72fcf08c9b4cbabea6f6a02a34018fbe77f196cabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0a7c6ea2b15fc0a8efebc5d44b22e56
SHA1305b597bd09dbe7f7b67988f68398f6552326869
SHA25659d0c711d552fdd502f18ff361c5bf992012064ca38f99a8be720c0c22693352
SHA512f79d275f145e17c1b57510f0178aec98d1c689ccf47ac8066a004943e98c2db04ec51ee05a0adfd44a4a14579e5430436b3278e4b888da057fb429b3354f30dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56821c70a31f5ce221e90acab85442675
SHA128b08370b8be17aacb98b62c2fc8d15b4ebe42b6
SHA256ef0471aafff55e0055844219cca6acdbbf951a5e6f7c4af252ab45c1f0053eed
SHA512aecd6ca1002df000a0ecd5489f1b781cc2428992c0359ecff9efdbe79683a94c2ff89bdb2f8c643c834767cbbebea1c90e5dc8caea32f2a48ac62963d0648da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a48f5188134c4952cbbd6d4d1671b30
SHA146028c77391b72bb43fb059a868527ad6fca0de3
SHA2565d12ed5509f2be9a628db17b762635af1447e17fb9c0c014c10d06bee5375073
SHA51283e7027d81a4299ddbde313a5964c713b097060f17412edc0ff2f3c74125cd9808a9767dd423b43c777755a0f616982f5dd5b8845cb08bcf7df4b2a9ce975294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f09127eddd38d7b318bdee672fd63464
SHA132c4141af6cafcb8a69b38ba783691390339c45f
SHA2564bb40a9a1f9ff537f67665c7fad1b9fb0c6376a1079dbd9c5c2e6318f791edf3
SHA51244b56d31aa4e2a9921a39741d41de017a6455289cf13af17626c94f0d4ac62b7115f155622b39195be6e7bfaf65ce25eb6772163391c52296420b9cebe100814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f63a7f38d5cce69c3a0629e7272fb316
SHA1725c43ecd3a8fdd9612f38147dc2910cc0640de0
SHA25691f6e2748e03b07a3a0c834f0a47989d87b770d77a3fec68b4909c102bd6b9b9
SHA512f6413649c7c4aa5e2a6acef353eeaefc07143f8fc7e39b5106068559af7d4ccf8c9d14b963e2c456320d30150de4daf88ee0f2af2d8827b2b922bd82c8a3169a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5884aaca77749cf4b1e391798cea7647a
SHA19e9d82927727f03a55d8297305bcd899c8214285
SHA25677b04c2bdc7cc7e02834ccbcafa7d65af4056ee973ff6e7807b73b86bc984c56
SHA5120d91b1157a76c2b0d74d112fbd53588928e70967db4aacf4e736a52a2f9ffb9be6958bf2b0146c40bb90f69ac351259a16458aa3b164fbafb73d4af43b8ce667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5575010926de792ceddf7cda38fc90f8c
SHA17c9b13467a8ffd461705b6ca9c81486aac638805
SHA256139c1f62eb83a8a705ed4fe85e2ad2ddd125544fd98b8e2b7064781aa6e56dde
SHA512e9f6b080932bd571345a5e63b3853b2cc97869131f6ba88849ef01f50f5b3493d130fe7d7319e86f0f12badcc76b0d80f3658f6f2f950cb53633ee95224ad77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a07cb78b3742364abcc2837b103f3dd
SHA16b9204fb4ecb09e3825da889b2116b7409eed9ef
SHA256c9d1eb6bb77c25a816a54d3efadba037aed96dea065f2e723cfc3ecf4df7a18a
SHA512ea6694be9f1c84adb60488f185df8ac3c9e04c25498696758a44902f77e5f3bc553be0ef24377a8be74dd2f73d29eb58421a4aa689d4d2323ea5aa33c7284ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54db637ada799c29c64876c9947ec1721
SHA1b97778f9ec4a44df3e3b41318f29af7e7b35ec5c
SHA256ace9980c19907cd01b11a8ad5f6ed64b471c072b93a576ad0238d40821902526
SHA51273291446cd6e56b278de8cae6889136978b746e286c37791b8aa58ff4eb223d508014221aea444dab6de9d49c4488f776a7f22d4e041b7f97fcbb5d126a68f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530de9cf1819962916279eb209b75afd1
SHA1e07e1e8a00ca5ea2a3ba0f8bbd4e7c5df0865129
SHA25641c1d942947ae848b7791fcec684276b8b4d471a1ec6c2660fdd06eed7c0eb3f
SHA5120390f95a7b61dbf957f5828b66325dfb6b9f5f62ca2b747f1140f8007a09c35f2d128f2ebaffd1458e4b421b97be4f5cd6da0d504e238371535f346958b52b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597e3a94f8c608cca876c735c24499e55
SHA139214e8072d28da838f4c21da0f875477c4c33a5
SHA256d4e79bdd30246c34638e725db8ab2c729a75934a84346cbf46d14354b3f7555b
SHA512f2dde053ce9d735ba3c9f5f37c0ee4533f06c1d8852d169a523d0d17d358b0acbf0ebfadd33c242bdd6995f9b2dbb6eb109df7d01185d4860d1fa2f4c72d125d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57747d6bb28622737cbdb83b7842d59b6
SHA15f2a7cbff5ab058e5a640c127df01b8db5b49f57
SHA256f4399a67079f52ecbf1fbf55ad43eb0604a07f571cf4f3a13d048d75b04e06b0
SHA512b1ac67266227bf22cfcc05ec0d5814aeb2e17f431c73d396da26d67888dc390a61bd37355aa3dfdd6dba80d9c2315a0ff780868b911d786482123f4df60449b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5983152b6e8410f6164e9838c7d0028ac
SHA1ccd31ac06014ebcf962b5fcf74c5d65ff24cc896
SHA256b6bb74dd30d69db2e6bae178e6c3f9c19235cd7ce7fe7fd0f366cf3bce18937b
SHA512023c8af2285d0b596317fa486a9e723d9b252ebeaf065bc9001867bf6e2eebb2e9dd6fb59bbe9f3f669700ed6af91f927d4fe9d790ea0032a87eacf249ea7c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5597ef018d4cc4e45c0c7a972c700a4b2
SHA185ea00917a0382fc3425f6ae0391638c7d582ede
SHA2569dc7ccb885269428f65f84a10f3d913c10a951f2cd2b87429f1db3a5fb82fe7f
SHA512907ab3aacc8b2fd35954d99af87ade8810ff0ba541666069ca2dd1e65f39eddb457f230d85f5f36e9b4db385ed0a68ff9bcad9d249b82f0c08f9dea250efff93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7d96868ba38fad903491fc7c3a095f9
SHA173bc59e26afc540a1c2d4eec0a340cfd5315f312
SHA256cc10cd63147964a5f850ed033f64e4104050862c01455826cce1a7bed48d482c
SHA512a89e4d87b883c742450bc3bf198f098059a04c9eb82255f82a35d8ebf05ac2e8ab368bf8c180be2e1276b849014772743908c812750ab80fe79c0fdd6024f083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5740d4e901ca2c5cc2589041883133c42
SHA10104626884cda080d103fdd98c9765df63c17dba
SHA25621a4886c168f396bd44e3a0d9a3121651201fea2b00c60ee7512215fe1ecf65c
SHA512eec0956a548152096877bf89dc65ad5b94a0f3f08c6e7bce365a1aadce39f78e2179b4b1dc3550b7c1a65b72a2d92a8dc15722e394fb0bc3bf3a5ee9d52e150b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a243623d01a607d71cbf5aeeb536b05e
SHA17041c873e8ae9eea2a9ef1ab9bebb8f3354a591b
SHA256368372bd631a7ddb522200b602ae8d11dd4d2e0517f1a74fa404c87d0cdd1f13
SHA512e7b8b8b422a4983ee56911b91c9c3dd0e826c9f6ab9cff953d52f3d05a15ca66c089958a72225eef8ceb270ad4db17331aba2dd7a72dcdc60a6e94edcd364502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize408B
MD56fea3b454e37ed029d7683b7dc504ebf
SHA15d9f0d6a0c3e3a671a18109d1aa377c3ab219693
SHA256e7cb5b7d56f699bbc82e1ffd3c37415ec69a4aecedfef284800bb0820a30a472
SHA5127794c3ca4141667af8355aae072770e6b795fad33970c94cf3d40befe4ae13c822a541e7eec625180f60e7aa50cf8510b9522e5369a9dd1aab41a29d58fdc97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD501f24a3bdbb618b4942de5af0e69231d
SHA14265a5a6f924ad77c4d604c067aab7f4b666a3e6
SHA256a6d74d46859fe7f7610c6be6554c940a32a79b6a50e99f60f135157cad2ca3dd
SHA512c5306901c231af7c1132edff4b16522ca9ebfc2341a17844e49b812c9706ed4af6a678976bf95bb695a1ac99bc640296e5b639b3c462c99e596b11ed5cdfa9f7
-
Filesize
110KB
MD5dffd6ef3c528b8073a900332b9355f38
SHA1ffa181bc069a58fd57ad5432a8728229d7a0aec8
SHA256c38fcf047c98ebfff8d33209aed74d33481e8bfdaa5b360a090b9c10f9f5c1b1
SHA512b4a3bcc054c426242dfe535eba323e2850c82d555814021a6187a4dd78b4cf1692976cbe35b6121b7f0da2f0b8d657e1fbdbf09c3eeeec33d3ed5589e4780427
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\favicon[1].ico
Filesize109KB
MD5504432c83a7a355782213f5aa620b13f
SHA1faba34469d9f116310c066caf098ecf9441147f1
SHA256df4276e18285a076a1a8060047fbb08e1066db2b9180863ec14a055a0c8e33f1
SHA512314bb976aea202324fcb2769fdd12711501423170d4c19cd9e45a1d12ccb20e5d288bb19e2d9e8fd876916e799839d0bd51df9955d40a0ca07a2b47c2dbefa9c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\js[1].js
Filesize191KB
MD5ea8405a2925bb3362de7d130a1d96b27
SHA1d944cedf815c8e7b05ecc6d41d8782d7cb3bfb63
SHA256cb917826139cd04f328384ac988d9f619c6aee8346bcc84eb44caac9e765bc62
SHA512eedb8c31917318d90084089b9c3083046ca087124c31799fefaad2dfca02c6aefe3ed68f8e192b07684e4557ba1d342475779bd8024e98e790f3407713b2191e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
738B
MD52005cff76c345c2abcf88c28cdbc379d
SHA154fcef28d7a3e025c0968bf3cb32138600235811
SHA256447315f8052637277f4d2f5fcbd2f9befdb98100195104255d7597f4bc121741
SHA51275089a81ec9eb81b60ff3d02635b52294a11c0881cd76d7e971656cae524b1ea7869bcb9c6e2f41ee4077dc6c0e70a07bb6fec8f2037f4a1f323ddd71fbc6ad2