Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
692c83f78e8d8cb3291dd88d8dd49854
-
SHA1
ce3f94cbd204bb2324f19683fede00a7ec9a9d95
-
SHA256
61b0cbe54de1a0984850f07a50645977d2a3b9f77affcacbae0c2dc119876ea8
-
SHA512
88ed371215b20037303adeeb04e74e2f177e920e9d88896113b4fad2e0aa65b163c7995afd105ab0403d7f2727d72831b932e2983488e4621653413ad9eb6648
-
SSDEEP
12288:HsM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQy:MV4W8hqBYgnBLfVqx1Wjkf
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2524 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
IEXPLORE.EXEIEXPLORE.EXE692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\{9ECA9B1B-4926-4AC9-9656-2195BEBAEF3B}\URL = "http://search.searchffr.com/s?source=bing-bb9&uid=96584a3c-5b5c-4b3d-bf81-e5b4329287cf&uc=20180415&ap=appfocus63&i_id=recipes__1.30&query={searchTerms}" 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F9A362F1-189C-11EF-87AA-FA8378BF1C4A} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c2e5d0a9acda01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003a9be1cd8b0be44cbd2d329c1b7b3ba60000000002000000000010660000000100002000000000a4a95ef2c69b69092284b10479068c92266934bff26fabc5aeb6d1edaacf37000000000e8000000002000020000000e0109e6f86d9ab0e855dc2fb85f79930d09492183d5b17571cd5bc2316b6e101200000007bd3654ac4184998603b3c089eddef6142b7470f28788278149a87cd0cf8fc70400000008ad91e854d903c461c5c92b1971bed4b51e1e5de8b679f9706c2cdcf827b117c2b50ccce00228e8d2d2e72229853be616311bbceb16f21a6f5d93e9bb9ba6ab3 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\{9ECA9B1B-4926-4AC9-9656-2195BEBAEF3B}\DisplayName = "Search" 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchffr.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchffr.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\{9ECA9B1B-4926-4AC9-9656-2195BEBAEF3B} 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422586663" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\{9ECA9B1B-4926-4AC9-9656-2195BEBAEF3B}\SuggestionsURL = "https://ie.search.yahoo.com/os?appid=ie8&command={searchTerms}" 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.searchffr.com/?source=bing-bb9&uid=96584a3c-5b5c-4b3d-bf81-e5b4329287cf&uc=20180415&ap=appfocus63&i_id=recipes__1.30" 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 2640 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exeIEXPLORE.EXEcmd.exedescription pid process target process PID 1688 wrote to memory of 2640 1688 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe IEXPLORE.EXE PID 1688 wrote to memory of 2640 1688 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe IEXPLORE.EXE PID 1688 wrote to memory of 2640 1688 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe IEXPLORE.EXE PID 1688 wrote to memory of 2640 1688 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe IEXPLORE.EXE PID 2640 wrote to memory of 2756 2640 IEXPLORE.EXE IEXPLORE.EXE PID 2640 wrote to memory of 2756 2640 IEXPLORE.EXE IEXPLORE.EXE PID 2640 wrote to memory of 2756 2640 IEXPLORE.EXE IEXPLORE.EXE PID 2640 wrote to memory of 2756 2640 IEXPLORE.EXE IEXPLORE.EXE PID 1688 wrote to memory of 2524 1688 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe cmd.exe PID 1688 wrote to memory of 2524 1688 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe cmd.exe PID 1688 wrote to memory of 2524 1688 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe cmd.exe PID 1688 wrote to memory of 2524 1688 692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe cmd.exe PID 2524 wrote to memory of 1756 2524 cmd.exe PING.EXE PID 2524 wrote to memory of 1756 2524 cmd.exe PING.EXE PID 2524 wrote to memory of 1756 2524 cmd.exe PING.EXE PID 2524 wrote to memory of 1756 2524 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.searchffr.com/?source=bing-bb9&uid=96584a3c-5b5c-4b3d-bf81-e5b4329287cf&uc=20180415&ap=appfocus63&i_id=recipes__1.302⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\692c83f78e8d8cb3291dd88d8dd49854_JaffaCakes118.exe" EXIT2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\PING.EXEPING 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:1756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD54522f982621ce47ab58a137c46de85f7
SHA19ae704c142188ebf00bb5952bfe1055e826cba03
SHA2564939a73d8124dc2b1609b019864a71da0008f846d3da1b946593864f6ea0ac7c
SHA51289359ff22cbb76d9816ba883f36590e6a6d6b7844bc97761cab40726f9457f4bbf1b39db0eac4dbfc8a3e219534e4062915d52e4a3bb1576145ba3de91a78a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56feba3cd2dc9823736e778c0c520f22b
SHA1be5aaab1238b1c62e99d0356c860ab5367b42df1
SHA256753669f547dde0196bd0036a9e00bafaa8521675997c8e8d9f7d5e0320b8943f
SHA5127a62b4d5ef0fe60dcc0762da6235f69371f52f19c8eec502182aba682a203cc1b7ab5cc31d6f7d1b266a4fce8441b43891e427f6ca9d52a4caaf7eaf74adf627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a189805af9024301ba96ca9edc415d7a
SHA1ccdd5621204bdcd22bd9e6127e9b0c787cfb7cdd
SHA256f5894f86632c6a51a066332fd593c04dfe6cdd3a4cc93b5480502045c4c22842
SHA512e0ec7ed3ab2f5107cfbaf5a19c9466ef188defb34cd65a36741b0d0d668ee645568b9c265e1fa3dbe7cf558843da7158d67579c22aa59ab72d93cf1586d1b0dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6bbc46337d01164d76489ed0876d1cd
SHA1946d6eec37204aa2411445166350321fb11bd669
SHA256c534be6ffedf336260e1d429703c0f2fb5bc57e0e232ae5e370d163bff987160
SHA512a9101f13267e44270eaea499d12bfe872eed16044a39db8b1c54640370e2ad75df24117ef9ab6b161686e5ecab0f05d741fdc3f8ba49ae041cab940b721403d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57efe1ba7fbc958caa2512df28c00513d
SHA1d4391ae6dbe2f26fd4f951f0948793fe8da81e1c
SHA256ff13876fb481cfab859e7b3152038f31b3b083905c6b582d710f63de236e2ebe
SHA512ce7e009a243c0fbbeaec91c94b6a91005ddab80c8a85409a4e7379d8995889140197c65c4118ab1381c230faa0f4ad1bc421f131b2ea95566b9d75d1ee93670b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511bc77335c0530f575c83012d12adeaa
SHA1a6c3687ef4b2cb4bf0be348fb0c251445bff031f
SHA256caa64e52dbb9fc18d0ab4a3e40ab3688aaa697c8bf6afc1a473cf384f8d675f5
SHA512a18b7c2337894b5153966cab7b0b69070c18903c8bbe2757dc6c3812502f41b338c10f1463186b96f556bae561ba092a251cd9d947aab65f3a70520923f27087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f4450c6ff1c54da16d1f0caf4444666
SHA12547ef0e0fca9bcb41e2b398aa42a67ace33940f
SHA256aa7cf5aba6232c2137db2479d0c54b6725426ea67e3f82686eec80cf02f999e3
SHA512e1785ef3184616dc7859fb9fa8444dae6c3fdaaabc665da372210f6224196b69f47c0c92aadb903ec2daa28139491f418fd6cd16317f0732e777e014aa3b5176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54502592cae813b69fc5e346b245726ea
SHA15d2709c23b364844ec340cbd13f08ffe2257a01d
SHA256af627ccbfa1485211ef7618b98d1dc39523fc13cf2413adbff906879e87e6614
SHA5124ec65374110d9ef71042da1ccb128d8f9a2dad512b2e4d895e6715a6103e6493e248f8949a876863289620e32cda0ff8abad7594a83b65f10d66072558a2eca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521af07c09e274c4a73ccba2a50de1bed
SHA1b208bd02f3c4b040d0f9b6f99836dd9d5025aa10
SHA2569f86fac8b4c0f67afd3971871a14640add4fd1889aa6910a39a7bb611e71ce79
SHA5120cd83ca2afd968224b8aff1c3cd0490e314e9cd9a09fc127b3bb90295fa830e3b05d0d6d5553237ba84527ad4bb635736a214dd84e1426dd41c4258430f26242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d28312e1206d42cf6f18574fe79552b9
SHA1518c07c7c26162e222cee13aed67a1dd40146bb2
SHA256a6c380663064ebb4fbcb7c4553d1b02a649da2b1e7673fcefe63662b87782262
SHA5120c8b8a8b13ee3e560e969c16f4c8cc85f3eea7313bc6bcc5f681ab0d57799f6dd06fd1dd3bea3a8ef022af20182558d9ae1eac60d24b345654e5080ae33fb0c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5900f54ee6ed273884f951094fb56b94f
SHA17f0eebd571d6608b5c03b10f542ee4cc0b86afde
SHA2566a605adbf437dd32710fe7a96a8c4955d50f60f6003b916ca0858d06fbbee11f
SHA512e6064bedce0e181a34a465ef4c4cef7382681be08364e9bbedc7002dfd6f63f7bde7fffc10cfefbfe57d6fc0e220ebc953aac6af7cb845095ee1e2557d98abbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5367e3c2e73bc974ef84dd82c5d917dab
SHA1cf444d2f0273ca0146f5406cd9e323f380a1c869
SHA2567ba98811cd53de87cc2147144a4f0e6fbc2aa2973d01da1dd9d9b4dd81ce8acf
SHA5128feae14925017418cf32773ae1f2ccf2fdf0866779e82b937a1a2e8ebdd880cac62ef6eba3585cf02e13b38dfeb08576b68627fdc387596dffef7f4072c82a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540095d75fdfc6fff40420d193fbe5762
SHA1c67e970cf4f1769b58f6f402cde10fc83621008d
SHA256969fb1cfd813e3def84a1ad19bc02271d9429efb480885a8f3eacbee1fc9b99b
SHA5123d4f7303ac5eabe27e59fde1dfe28854179218e06a45c3c464a4d20f9959b4fb3c65946f8bc0d814cac7df084cb1c72712a80828c3c85742b2ce9f1272e176f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581ce2ac64503f373ba39da45b2cc4f75
SHA1514e8deb9c98caff44751bd3bc20dcdb6acd0b16
SHA256b4f970cfef52defa634eefd332b56ee30bcb237c15cc4443b64919efbea5f084
SHA5121a1448c38ab3fb6e155fe9d23ee82f0001459693565c1a2cb2814baa38b2c1e7c38b0c51ebd0a485fd85ffd01317eecca6e9597ca119220dd751ecfca26ed537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597d3465e9da875ac38bb08371b60ea03
SHA1e5d7dcc281181f869ab904b108dc4be35542f451
SHA256892a2baa23b6a7bad7d40eec7ef2243aeb4bce1ab3eb0a009c78edeea62ac8a4
SHA512ab3e883bdcdcad8e58f3f3f2504fe911b898a2851c5415fa06608d69f6cf237e76e5abe33785c1119da0e4ef41596ced0767c7de2d299ec34c0381c2463b0acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50834a8fab84b3f445c45b66749e78dbb
SHA1621803fa9d18449f65cab4b64c438031c149a064
SHA2562d1d6d6f7a10a3bcdaef95c1b85c5753090866ae4f82f88eb81879c8a85171b2
SHA51270fc116bec886cf859aede106d92d457cb8172c35e1de94b36a868ddd7f404b15404741495326da4e17441f3ee520d9a3fdd98fbd1f9069ad9c10e01359032d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586b3351634b1e91155312b8e4993edee
SHA1bb5955f58eae1225d015cc65e5438734bf070704
SHA2560e63df19829f2226007c4e1b6dc8764443be1d0b4b1fc6ad91030d700fba81b0
SHA512c41a2b1c9aadf2d7010a16faab0e598402e2ad9e4d1dfb966dd774c3697188dd202852887ebe649dbfe64748780dfeb19ff91915ce28fa22d35ef0ad010d1640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502d5a8826d8b6ff6f5f3eed94cf05b7d
SHA1fbe9c272405db96c35f9873a0d5aeebd6ebe20a9
SHA2561c19383c5ee5853eb7e5600ba4200afe029d03791cbb87ee0c6ed18e57841ee5
SHA5129d8a424b31f20743419d591170fc603ff9fbcf5cb068d1d1308aa2b82edde755b21892439edd4e647e23b26e778de3d441d7fbd08e45cb31311eda0e82446f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dbea25635a76aaabba5802ec0d55d49
SHA185109ac2b443b17285a1e69ca94b6f86a0b762c9
SHA256cdf8c5907fdf5138ee4b17e48d0f3564cd60db8bcc9ccc9175eafe1f4191c21b
SHA512c1c60e208677dbdc306f2cff206e5b63d93ffff0e59d63a6a3f6a2b883b792eefe7f7c0410fbfd336cf8a79089dd32462f5f479507b90d3e6fac7c20060235f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff6ee04027c2c366b38a850af81d7bcc
SHA174f6ed2064d542bec0a2d0825a9d30e93aef295c
SHA256cf27ea1a569dfa27cfe16b88219ee0af001cdf77b8fd01a5315d33a2833cbb42
SHA5125ca13fd10f84a15ee1791adaf7592d3a6b0239ad08068d51be893d1db9b431eda306d88a1bf244f90c8d09b0191e4ecbe91f70dcd00f6c4a7a7f60a9a6963428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532e20e14040450ab4e12da4449720d36
SHA1875371accbac2c3211a69635f667c709f5f63a51
SHA256911c2f26f5ad20ccbbfc55ab37444ce14f90dce0d3e795015c4885fc8d7db091
SHA5121bfef5253494baef55ddcd06bab4996ded8a379d8d08013397dce98f63530fec65030ed97e53cd282ec0e753c0409364b3011e239b57c13a5c70a580e8af43d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549de22f76cecf7460784b6174fb68491
SHA17cd5294bf1f72457d763daa94d6381836148ccd9
SHA2561ba07e909cc26807b74af2391c1afc1d5e2a51dfec1d5d98fc0b00ed13694435
SHA5126a17a562c23c04196c7ca28031821a4ab5cef202870333ca2346fbc3fa58496c3ca20a20b1b9d0884749bf6d37ba2feab49230dab6d88f5aada19e2f9c51c007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5120cf7215cbe1986cfc641421631b8b9
SHA12162359e3bd0b199b462d75df3cd7d9cef694298
SHA256d203b5e97d0b5a899e050ce5ff0c01a260a93862fcd299fc28cb6612d2d23c8b
SHA5129a63b027958c97b6fa19990d85035f2f236e6b581de84551190585355e82ccec2500d4c90763fb29699a6376cf857ca8ad74169433b3201a36d5091bf2f21716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3bc3b434f6bf3a85b440077c92a658a
SHA14ccae40e808a052381c3a1c3f2c6a53ed88dd591
SHA256decd061b3fe0f221b4c7a67aa0f7ff50fcc9fbeedc1de5e245183d8b9a745d9e
SHA5126d05295bfb4e327df41dabfd0b038f6084faf9a7d02f9ac85e61593f2385b633803e63d3716af4c8c86d35b5b70fc51b41fdece2b9be7394fad212c8ba67205b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b074cf8802959cf91c5622717dca0416
SHA14796b9693d84027bcb0b8d6f7241d03a713ee497
SHA2566044e09b71fcbe6643875aec5f1a49bf4a2b32a729fa3bc72ac9f79ad6d4b01f
SHA5126ee9d203d33ecb9b1a6b57eaef3ce3e60c9b13361b2f243e60a6c4d4031c8e468c7c0037a118c5456d51a4996412bf4a21a3e512f9c915849aaed12338c9c372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571f2a1ca11b8a17c3dd926bc24b8f2da
SHA14e506ac42fda9c245ac264d14edf806999b50ae2
SHA2562354271aee10f01552bf496293a92b616993342a4f54407a9ccff87366bdaeca
SHA5120f5e62e6d9f58ef95bb6d21d38fa6ce091f5b9aa63d3f1a6de7d4d318f8da06bd92c0ca81df7135c829e2763abfb8bf60a06fcf9502d43f83c38dfe75b933e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1ab1e3f1a59c59a5a24cde3262ba308
SHA1a1eba24ec2b29db1d3f4a07d359c07c3eeab79b1
SHA256fd3de0e257cc6ead7a16085e35106669eecfe11f73f2307902b630f08cbc514c
SHA512fce4a6c3562837ae6459f368a8c13e819ea7450efd8e657ba8325ea6b327681f031aa5b680b068c8768e86d483e2f34a04afce2a7c09f607478c14e164f0673f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c673037a2f9fa145226baa3fa44c7aa4
SHA15efb5b11c2d254364b6c105c628c6db812bbdbdb
SHA25670ba219d2ce10fc81ad02acb9cf65207beac9f072d55bac93627e05b19dab2d2
SHA512274841236bd3bf0fe4509e19eeaf67a9fccd87875f33c19f6b58c0e6fc5cf6e3f2c02e362ec126ad73d4313f92da8e6f7664d66eb46bc363af29ff4066270c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1272094813770d7c9269a9328e366c7
SHA11ffb7dbd05a6b3b9873c214f1966e71ffda0c363
SHA256f4971ca93bc2a1c55bce8e86a255d716503a944a76d774fcee2bbecb2a64a294
SHA512a3e9283d01b01e10e0e51acb25779d40da165966a94e15ea4aa6bdabd74eb3ad36496734cc50c91c4b3549066e01ecb708776e805bec8745b53badbfb7781f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e1bb20bc4d65ccc0ae7393e7ad82604
SHA1944458e3d22babc006ea1a176b5805cd2073225b
SHA25600af4a16e4235a1361350f23a31f1a46a53237d5ec352761df0b87dc42ab1953
SHA5129fc417034be653a19540f07add2a2c03bab4a397566acedfc086641e9b1ef83e11109a8d0f546065f03bf04d613eb7c073e23c5ae8323d96cfaa100690f46a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cde5c2a97fc7a89cebb5fb2694c0d33
SHA1740c0da3a2338c05ad6183600aaae8d2309773f3
SHA256c44c5781eb0d23fa267c3116127fa12c36f3097a01818ecb861d34cd598b1e2a
SHA512ae884729004461ffd867681513982e1013ee6df0aacf8726161d4049658e3c76a81cd019620aaced140b3e23ba01c50fda729f74611772d2f81be2692866e1bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edd49d0ae33618f37e2957e5713c579a
SHA11e72458b444585234c02fe04776ab694d3e2836e
SHA25632f87da82c788c97da3a1eaa5ed3a4cbaa59b45403977e0f2e4e4c2082be52fa
SHA512ea28ff08c0991a5d329e86a0cef869b33cad2a72d0a51bc319e7a5984920b00604752e5123d0528bf5d6efbfd0aa4a6316b56e054eb180f2066a4359ea92aa1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57998d5119982159ea6b34209714967e3
SHA17aeb325564619a6aaa1fd61ae496bc24032688ec
SHA256569190a60f6e803530eba93e7929496729d87df79f835bc5c395c98e1de04ff6
SHA512fe0055370ef230c82faf13309cc7f110d1675c4295e9a07b9951ff7515da2169304ab2b425c0913ba9810888a4939a25123ca426cf72e1f242251f341d4aa807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5067d4fb2351d31e0647b493eef68a2bf
SHA16e36b08cb5a5b7173b90fbc954f1da73de5ba457
SHA25603a48882e55c6b7458474b20971fe3b36c41a170b8cfdd933202a1b0e9482cf9
SHA5126357b1a56be15b51ed5e5c313e1c05e58b0c98797677baab5b22b899d2194654634f821cd109fa1419a66041b6cd0009bc91d30a546656b8d00ac7ffb96827b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7a66be6f98560bac54586a4b910d78f
SHA1386b17eff4531bd950841a3a272b963f949ec196
SHA2567d25e8280f6b9753795a35132c24a66dd6776d79e3bedc1dcf5a2639bdc43269
SHA5129920fd2500f0fa7e126930cb3dadbd812b9000419f05228bff288e2431a6cc6318d5cf22736eac038c623f365bc09ce1ef73819e2c15ed2fc2da3a9da65519fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b910145d9a6bcf97ae336b3ea363634d
SHA1a51118b8771c21dfbb79f881a74d1bec12187e40
SHA2563aab0f0e39adba704838bd4f2dbfe3d9c3f33e46e7e4eecbc19c8c4f33036024
SHA51216d80dfa601804cd3baa1550060a9a409557eb77e83357fd816fbffe13b9fb45a16d297b8ff3dad2c5a9e09aca73e9ec388c42db5982f3ced8184a5490c9fafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD528cb9d698008b9fe447993d2c14151f2
SHA1b465742b373e7424fe15d237c245753a4bf4ebf9
SHA256b55c3470594d734c397382d509c5ccf835c2ed8fee91c278b64a214cb48bd59e
SHA512f8cd310611306b9ad86485c2530b117eba7be88c86dd3e1f9efb7c73d4c4de01186a9e08d22da3d55ccb00ab7e5a1b6269b98cf964fb341e34060e0567d58eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5eb316281c2e7b50c1a5893829cee9318
SHA157f364a9ef7b6c288feb7811d72a496296e0ac02
SHA256e166413fd9a2a42df1f6288275ee77df9af2ccf4edf349f7ca1063c8909baf56
SHA51228670ac2c4fd245bea5917e6c5a4c26a8d462b4eeacb2c7a75c5cbc62ea16dc88ab14025ae3111956736c3ddd5e2464e509326bc2bd5a01df821f249e449d37d
-
Filesize
110KB
MD51da20bea9f35e91224f50e8451fd6d84
SHA196b7c7f96bfe5ae3f7d2470650da03f8b8e28836
SHA256f64a1df160fb177d49220b37c722e91584dabdd8112234868e472656edd4bf2c
SHA5128201e1e818f4121887344a66b6e2829fc4f570c4d1a8969e4bf24308fc81afeb5adc8a3b0d8824344c4993666d47882e2f54f2ae78c463f37c70fd3682a56cef
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\favicon[1].ico
Filesize109KB
MD5504432c83a7a355782213f5aa620b13f
SHA1faba34469d9f116310c066caf098ecf9441147f1
SHA256df4276e18285a076a1a8060047fbb08e1066db2b9180863ec14a055a0c8e33f1
SHA512314bb976aea202324fcb2769fdd12711501423170d4c19cd9e45a1d12ccb20e5d288bb19e2d9e8fd876916e799839d0bd51df9955d40a0ca07a2b47c2dbefa9c
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
684B
MD5e5244691905f2e26de9d7cc2f254402c
SHA1471a38ba2be263109fc5eb4b5f9d56e530f98963
SHA256771e0310b638dd7ce943b880e7c4593538f0869e78842a5c941ac79f22af05cb
SHA512cb6cf557c9a749a7720eee89bac3837d537f308a7309e75148d6a488def4ee261b31291bc332b398792dd51e7289e297b1dd2cf82ab4e8ca225f367157fb0a91