Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
694bc59a30d8829abd4b91cf6b65dfa3
-
SHA1
d59e1c1af7774921101f50c4a3f40d63d37f2204
-
SHA256
a86190c5c3c1960089f965b63dcea0d97b9334c5ee3c397cd51a5dcf205d7d78
-
SHA512
188c0915f999cc58fb6fa51219c27db0fb5f59b0154c2628ea87889d062bec677bb23a60fcd955bb4e21911fcbebb084143303f900e894a503a534b0807335dd
-
SSDEEP
12288:XsM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQi:8V4W8hqBYgnBLfVqx1Wjkv
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2428 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
IEXPLORE.EXEIEXPLORE.EXE694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422589768" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchcl.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchcl.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000ff919b17b76b27cefda4cc0d0b32824ebcfb98ef6a4228be0a03883e78fcd0f1000000000e8000000002000020000000f17b3fee9c48b5cda61102722e6d71ba1022e5a57d3f2a9f002234b8f0c17ab620000000020f080cf935b846fb7af26716fbfaaab6688a72afc56c8100d4d6f553a7b54540000000108af8929bbf7f8ff7229691930f125de22d0e4b4b237470699b67310821c2766b5983b494f495bd89e5edd39465b6c3a250bdb63cd3d6dd320fa79a87ec7995 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\{EDCEF62E-7354-4714-BD52-0ADD0448EB8C}\DisplayName = "Search" 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\{EDCEF62E-7354-4714-BD52-0ADD0448EB8C}\SuggestionsURL = "https://ie.search.yahoo.com/os?appid=ie8&command={searchTerms}" 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\{EDCEF62E-7354-4714-BD52-0ADD0448EB8C} 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\{EDCEF62E-7354-4714-BD52-0ADD0448EB8C}\URL = "http://search.searchcl.com/s?source=%7Bparam%7D-bb9&uid=b5d57ace-2798-463d-af46-307055e720c1&uc=20180415&ap=appfocus84&i_id=classifieds__1.30&query={searchTerms}" 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608bdc0cb1acda01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34BD19B1-18A4-11EF-B27D-6A387CD8C53E} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.searchcl.com/?source=%7Bparam%7D-bb9&uid=b5d57ace-2798-463d-af46-307055e720c1&uc=20180415&ap=appfocus84&i_id=classifieds__1.30" 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2636 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 2056 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exeIEXPLORE.EXEcmd.exedescription pid process target process PID 2716 wrote to memory of 2056 2716 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe IEXPLORE.EXE PID 2716 wrote to memory of 2056 2716 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe IEXPLORE.EXE PID 2716 wrote to memory of 2056 2716 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe IEXPLORE.EXE PID 2716 wrote to memory of 2056 2716 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe IEXPLORE.EXE PID 2056 wrote to memory of 2636 2056 IEXPLORE.EXE IEXPLORE.EXE PID 2056 wrote to memory of 2636 2056 IEXPLORE.EXE IEXPLORE.EXE PID 2056 wrote to memory of 2636 2056 IEXPLORE.EXE IEXPLORE.EXE PID 2056 wrote to memory of 2636 2056 IEXPLORE.EXE IEXPLORE.EXE PID 2716 wrote to memory of 2428 2716 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe cmd.exe PID 2716 wrote to memory of 2428 2716 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe cmd.exe PID 2716 wrote to memory of 2428 2716 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe cmd.exe PID 2716 wrote to memory of 2428 2716 694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe cmd.exe PID 2428 wrote to memory of 852 2428 cmd.exe PING.EXE PID 2428 wrote to memory of 852 2428 cmd.exe PING.EXE PID 2428 wrote to memory of 852 2428 cmd.exe PING.EXE PID 2428 wrote to memory of 852 2428 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.searchcl.com/?source=%7Bparam%7D-bb9&uid=b5d57ace-2798-463d-af46-307055e720c1&uc=20180415&ap=appfocus84&i_id=classifieds__1.302⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\694bc59a30d8829abd4b91cf6b65dfa3_JaffaCakes118.exe" EXIT2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\PING.EXEPING 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize471B
MD5da487233f9bb79b1358bd2939c1237ed
SHA14c22912dc26e449568ed77cc583e8ecfc9c121df
SHA256dd34689445d6ad599442e81edecef9095893072ec1c674e2ee142db65039b1d9
SHA512347670d3567448c0917a1313b042c71acb3b30d2c946204011f14ae11020ab87a9b0e2a41d6a0cb076403a2f4f2284c5400ca47e9ac576ff0c533a86a6c46e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize2KB
MD5d9d6d40ee0f643f7d59edd2bfb3fd5c9
SHA18f2acdae296dbf5800471a9789cd13b8e8ecd3c7
SHA256ab751fd180df188827e678d85fbc3ace9bd270bfaa853b8304015ceb2c47b5da
SHA512f5c9ed34c4e8abadc60e54bcaf66b273ef08904c957d324cd2d5443ac00781e645db0bafd4e5d724399c1366070294f9aefadb3b9f046f6a965bba037b013cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5cfd03abc4f5c125dc354cb0333237382
SHA1dbf7d2f6ff62ed6c5d179006444af38c9f524778
SHA25687686a1c6a4f982c3fe19e3f833708ff9bbca7d5d5d895a0823f9ca1d68de096
SHA51209b4d98cad66506d2d1224d647bbc8c69d78153e82a36dd5e478d7146eb2f3189b7e624820ef344c38e091106f0349bbc9302f5c66daf592ddf7700259c5a204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5cf5fde0e0f8c56d3cd4e774f86e613c6
SHA15692690eb7ce15ebfaad49e7ceef18f5c60b7720
SHA256386d5de12402106c2df135efa81c4858546d696f27f62632de9f9883cc4a3432
SHA5126b6e8d2eebd77059fb253f2331d4ceccaaf1833fe2b6d093bf65a18df74d45a97808a519ba54ea70bd7ccfe52cc97c1246eb557799c590e7948c477285f8dd4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a3e7ea7fd9aaad97b7f4eccfc990993
SHA1beef65ca0091bd52e85b3b7831bc61a2df045719
SHA25690aa917309db20f62a4b176ae73cd340dea35dabdc5ecef4a4eef82749ba9fe0
SHA5124308ccf4de34c5eb666e7096e8fa8534fd4f7b1983ec0bfd380bf39870f66d6357bddb3353dfd85ad24fa7b9d3054ddd38b3048bdbef153e5dd42fd2f951e847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5750245ce05070d57ffc36c2525c7d056
SHA139c06d45e4de22055bf0446f33a4f137f0fcde3e
SHA256ad8d70ad9f2993df86e9f6117d3ff5207070d154a728db41d36757821a427a26
SHA512babcdf02b6e839ea1c7029563366c84a9934f96881e8b6d79b19717935f4a3f415a17fc558ebd6f260424fdac0e5a5ac282d3001343cf58383bacb576da6cfc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5342f620466655e1d27f889c2a8cc36e4
SHA11ea9bc03b0d06e84a4e5d0a80a0c673856f73aa6
SHA2560c0389a1d1bfe4756343c4ca4914702e5ee32b232d7118293b0c9210105a1c3a
SHA51278d5debb59e9ef3c595ed0b5d6028f767d5a6ff55ba7f9cb92efb113dd2279a8e1474d245751de6dd15f849fa619a467a431fc0597f6c3417ce3e53145858813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579765b35c27dd5b50326e28f0481bca8
SHA19256c15209db0a62959b193c61632bcce7679df3
SHA2560cfb3f613229e7c421162aa900dfad95b28b7d574e5bc58d88b69466afb7db68
SHA512fd48eec433532d7384a8b08e63f9755790c1e04b2039f257723af3d66efdf8eb45f54f7898fc9d91a074cd82059635d19a21e0fe2641860d731c4eb2bd5af704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5395f39c539cb6133b9ae857a7cc435fd
SHA14054371f31b098706de96da7a41a97e6e5151a18
SHA25602c63646c0631e6902832362d9f29cc38149e1b56595d4a0b2a93069712221be
SHA5127dda06c699837f39f5af0a1e9ff2571a405a68562f9fb4b0819131aba804f14fa9686a8bae24cf16c1d741dd152a3a4d76522939bda1b47bd7b128bc84fb12d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d95c191bac5d8f5bea0a69bd307e85c
SHA1a541112f9e55bece1cc85649f1cf68ad6dc9b53e
SHA25629c224c3ff3160d573b3db02fb7bf4a9a3bf3f46858d8964157aca19d8aaf05a
SHA512d9cdf08177bcb3da567866eaf861884b36159690bdd3b4f3b993e97fe8bc100e5eb4da55940f9d89fa43ecd9d86384c29c6cd7bd04b00577f4b1cafe90b81e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57454dc109dd60cd04953e488f6eac7fd
SHA18db538869b28da2a678dd3a719ddd53a744e7eb9
SHA256e7744ae9e92fb6ebe246f8ec77d966f01f8253de065d9cdf0e1fdcf1752a5917
SHA512b3e5455030e585c7e0eda5a523e023cdee1584614b0dbe7a6b5b5077ad0823df0bac7868f521a5e4818c46c1a5354cac7386376c27c8302c5a96a7eb93b6372f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b4bcc85e4a9f7b1304ade61ed1af88b
SHA15d9cf7d8b2903704c9f1e7f2ed11f74872dbd25e
SHA2567c0ffc5755fb591889710d6527d3a3f91abeb4c0217416ae44b20eef23157903
SHA512d88d994c39a1f4e3d8afe28e747fe9436656eace28293778e590fa3ca60dd75f92fc04e8ff28cebd2d6dd578b8c9b4a960ad51b263547068ee3e2f590d545fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5296e7c2cda4aa9706a5159239aaa1bf7
SHA14539f8848ed6bf17ab7f1b356b96a7fa280af17b
SHA25643c6ccfcf6f4f255300f52dd6ef826b3399b552d16e51ab88cd97bfd78f0d7d7
SHA512a44807f8cd79aa761702d7abfe9eec992605dc4fac230b05705e25926bd5da8033115076c3f8302ace10c52e2d578628afb27386ffbb98d1666eb4f266765060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7e7f47e980a06594bbe6716064209a9
SHA1061c89f4b8ed242a60c80ec0d59c61664195f9dd
SHA25621fe66d2ccf6f0ef9670363e7e16c987f11d03a59a78414ce9e6184e78846daa
SHA512d47a1b5e4c800469b3590d5e6fd996ddbd2b4316580ab2d93dbcd6c06bc3c78fb0146e05dfbb1d862d585b2393d0bf1349a35a1a467bc7ca865b4a8a3fbbac54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526bc964656b890620633bb91b0478e33
SHA1ee559411c7152e8ce10e18090048b9de633dff2a
SHA256c0ac2ae6f92a3361872562c9b030abd7e8d6868ab10c5b3ba9c100d08a741a19
SHA512f0b4184284d806845b75920654476a81ae75920eec1a7c1857b5e656b8cdbe33cb97d16dc40f3a65755c945747bc38acd2eaf2965cb558882aa11d595b111455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb3672974fa6d3953252dbc965801d28
SHA1dfe2a686ef20e1ae1b739807dab7bf278f5e02f7
SHA2562fb1574652f35db8cffd542460a011721d788662cc2769013ab749ec68adef73
SHA512ca2ac952bb5946d54cf6da9931b79289db460aab22a9dbe45b37056ac400af94dc16525f8d6221ccbe436c867f19d25ee5b0e022efc57a71858f82b41be7b508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f240aba2d8164c390971b5ea289a66a
SHA14653afaa921e47a37587cbb35063b906df979782
SHA2564f7ca16a85135d2c730732baa6a2165f674febfaa32901b7bd550e5bbe7bb3f8
SHA51245ad24ec182985fadad6b28d7b187ca2abae47d617261d56270b6bb04ee92cea60d838573f0df196d733de813e2c1e5b00819ac64c827bd21fe87a6b6efca1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580161306bb49e4a64e228866faca03cd
SHA1874c584c707948dcb10815b2a612083d74caa2d6
SHA2569d28f8d642da84c46be3b1395d73fed39df6184311590f937357a747812ad758
SHA5126733861713a9c9d254ec88c2672262a7273f39e34ead7b0cdc8813704ccb94d665fd38ba661c4bfccfa479b2f1eb323ac5816ccdd8b482bb5aba26c376f1b793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5982c313e3855824dc7e698c98d9612c6
SHA121da2d03399b285ef0b011890d4112807d4b6b36
SHA256e3924e3ce5efb8493a4db7599961d647fbcbffe91f09f0edc84b1f1a005fe883
SHA51294db99adf982c64ffd4a00c1fac574b160dee8f1436177b46b4d14e99a8118c165fe7dd5a304ad6c3316364beb0cec527f95cc7f249ffe2489635b2c9ac7a408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549b839171579ad873ac45b7b3a24fda3
SHA132ac0b889e07bdefd38335624e1357701ba6200f
SHA2561b124097bfb088479683e9aaee2ab6f62959bb7a0d8c2f8d0c609764f300d5ea
SHA51256fd57acb8baad5424c2722b550dd4a9ade0c4873d7f075f9c052e3f01a1aad63681567002eaf7801429016da573b368461e94ea9a558639c5154c83a0ae50a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7ea3a92cce9fb56cd3d4831a7d1155a
SHA1f56099a0d0890ee0f525befd0397a8edf1bf278c
SHA2568d6ba83fd62ddd3f9d5e4afad011a6d5409880f014604314b3df2e92c8ef203e
SHA5126d55aba513c0fff5307b69b836d6e4539d73db677789fbd360903aa96d49d927e945d9db33ea0e998224bd17cd9b287dccedb6aa3cd6b8bc8520e1d7c6b52893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541253c03e90df3ea30ecb9bd6af12d9f
SHA14ebcf3522888433351132f101181a7bbb88d3b7b
SHA2568362e0399674e372a2a0036ccebef71695a80fbe12b0cc73422dbbb4916f27c9
SHA512864fe699f11272f1ce10ec5ea5a9337ade48e5a7123387f2264b2359739459f607cc3004004a65ab29bdf22dc95dd1d5718ab14859fb979efb7bd659a1cc3d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545e73f19f342464e21ddba47b5003382
SHA175f735bedfcca07dbd7915cc5a6eab5fd7e475d7
SHA2566c62056fb11e8656e0b6e7714f67e98c8fa94c3b40ce152925958b5dac7fc34f
SHA5128ecc3c76cd18f5f8fef2aa7ab9f86e5af7f9c3372c92a24cf60277ecf235f323e6c849dcb281c36de8a342db9508136bec0d4ae693416e26044625eb51a9abc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcafaecd5927ac4803fc83927259a685
SHA138baefc2dc4b78bd37697894b9778984bee4d5f7
SHA2562085572290379765f94cfd34657d222b63e50d1fb6c79fd88feb9204cec3233e
SHA512bf2fa625a590def6206fc0307e507d516d93defa9b88187dd92b4a82200cd9a10e28c40c2afaaa61c1c36634f6f5077b24019013c904b5048153030d2593115f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5046f40a4b4c2f1316d6cd454a6228194
SHA16ace4f809f9ebdf8c59144878123388ef9fbb4ab
SHA256bf4bfee7ca6ab89f5c2fdb606c18aa09890f77fa5e910f482b1a49b89290c8db
SHA51219dd295ad5a239eb23a03053ece99a225f8dcacd7b9589bafb6b15cf182237dd0eae34e0488efc7ff7561c16fc781cf74289ed3e8d7f543de521bfdb9f314c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef646cf58e157a13934d479feea2f471
SHA1d5f71e4449297513817feeabdd4c6b0ffc65a14c
SHA256a400467f352c415971d1b71534cc71c66b99699aa703243d506d95542008def4
SHA512d347caca1090c1571eb119f4b545bc02b4a844bfe419b76ead0875573637dc63e9de5fd4a425f2c7b1e0c6a88eff9c27fbbdf794af1067f18250c1cb6d0d8bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac2603c31611258f9cd9a94134aaf27a
SHA1af6ec76f5bcd48c1ea8acd1e4e6b7fc934171ccc
SHA2566ef995a2b68d16a6ae7e6d0d968a07a381123ed84dbbc145dcd79f2932691abd
SHA5126400d4e67348118c1c1a7b4530a1512b68fe2ad5688712fbec3309f65fc0e66802c5b1f8de78b199ce90a071c411613bbcaddaa7f341610e1a55354deeeaf0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591982dd36c2fcc87794fd0a569688cae
SHA18fccfb62eb1fa3a2bf28b80cb19c55464d171317
SHA2565d1ca10ab6877e69aa75194375c67dc4ceb47fb82308bc3f5546d6e30e534483
SHA512903db1a98c828e07c06846b7b24b556d41c03dd524bc2430fe99098f558ff36d4c01f3c93fc025ec90f63cdeccce8222c0cb4cb22003e5bf78c0cbbd1c244047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c07adc95e4a728585c98b6689cdb365d
SHA1c670f67a57804155923a7fa5b3a0ad82aca014db
SHA256fa62261b5aabf97459507633bbb000c12b8bcebb3128da500486cd2fd40cbc77
SHA512f2d18f9c9b6edc05e9dd9b95cffa0089e096891f0d506933a6bbf2cb4901f7bdf84cd0bc5470f8a757d943b91b4de855a7e4097119bc62def185ebd2b6d2a25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541ec347903f0a81a48af7869e3de7ebc
SHA1afeb09be3b1cb161fa16f109105faac75fe6e163
SHA2561f1406ceb4658523cba7eb9e3d8f48daf601d94763a1d1593543e9986b455d55
SHA5124d9f2ca68bb371bd7731be9a8a4201e0e19385b211f1e960c6808d0fb52de2a3a3b53cd1af8adcff7b14d2db3410b0743d406b38fe1cb558ff2bf70c726b1deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abd6e351c5d4fb6dd019eacffa754e57
SHA11eb65200c58feeceb7c7a0d8af8388e2edeb9be4
SHA256888353801425ac2d437645cb02f37d24f698309e40f20fc5f5247aa458426fea
SHA512ca66c93963e148f50fb5cb2f2e21410b86fbed6190f2f7105bb562dc5903aa70636b3895610a3dc232b5197c18c454bad6cf66346f8c2f324170fc7d6609ff3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53908f1b2759daaf43018745ea48b397d
SHA1d14679a375dd0c827cc5a51c88fe77c63ec1ce57
SHA25653ebc74facf4c26014f4344818f4c6a110ee8e97976744c013e26be66bae2bed
SHA512aa16c2a5a3f5e55aad85f7e023a9838fdae22a42ce6cb760beab13a13de7857a121b88cf47134e107215a3cd21e0edb53736ca71d9532048e9a96d79f7cb635f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a926cbbf07adaea61bc65fc890244a
SHA13cd1067ac8f2ef6f0b19a0b891f1075dcfbe3894
SHA25603e7a7394b83580d9d99e34a28c2c28511c3381ad2b76991a513cd47f47c90ba
SHA5129e605eb426f9a672533e69a520f5cfaa75cf0a5117279f4c9665ed2728f92447686c880df62d221256b568a9acbfa2a98a9345dca7b0aac59fe80b956f87af99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize408B
MD5f3acca0fc9de929ae91f468887de2bfd
SHA1d089c5bcfa595cdb96493c694f677bb13429ee61
SHA25633fd9d1ca32606ebcf3ef40175c46eadbf6dfec3050d1ba9aad065d1057520a9
SHA512df1fd835ae99e6045bcef02da1faf7f49a533f68a23397c7ad5e025ac38b75a83740dd72896fc140ef40b5a1e46da0e7fe90d27477f9e917ef1eefc84d9fdb90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize408B
MD5c57c831da0de363290bee6f6be48f18e
SHA17ba9e6ca1f97c2b6b7f4fee03961ea9e78f82241
SHA256392782c30922da2dada251277f7f738c552bb1049af58af7aadab75cafad825a
SHA51255a8e3b9c413d20cbfeea75b5a3b06ba8da8ca6f8ce7d84f61703e12a5c0d898c184f63a35ee8d86f6e979fe619494b2bab215387286c85f1c84b3d854b5ec83
-
Filesize
110KB
MD50a5496b6f3f079f1506f9d75faa4da18
SHA1b18d233d5f6ff2988d3f74233a5a501645ebfc87
SHA256801748a6faa7ef5ca5723bdf6a88afac8d65fbc9571e022fb1ef4f69bf458d41
SHA512842c4f3221f9b3f47f2e7037dd97b7f802a0d42fc6cfc8bc734a04c7a443dbda632beebbfcc92e23f51917002bceabbc25c30c0f1dccba84639b932b9c3279f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H09CVCL3\favicon[1].ico
Filesize109KB
MD5504432c83a7a355782213f5aa620b13f
SHA1faba34469d9f116310c066caf098ecf9441147f1
SHA256df4276e18285a076a1a8060047fbb08e1066db2b9180863ec14a055a0c8e33f1
SHA512314bb976aea202324fcb2769fdd12711501423170d4c19cd9e45a1d12ccb20e5d288bb19e2d9e8fd876916e799839d0bd51df9955d40a0ca07a2b47c2dbefa9c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NVDR4C1U\analytics[1].js
Filesize51KB
MD5575b5480531da4d14e7453e2016fe0bc
SHA1e5c5f3134fe29e60b591c87ea85951f0aea36ee1
SHA256de36e50194320a7d3ef1ace9bd34a875a8bd458b253c061979dd628e9bf49afd
SHA512174e48f4fb2a7e7a0be1e16564f9ed2d0bbcc8b4af18cb89ad49cf42b1c3894c8f8e29ce673bc5d9bc8552f88d1d47294ee0e216402566a3f446f04aca24857a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
673B
MD5cb24d702ee410bd117f66bf6d0d95c4d
SHA17f2f252a187921985376bc561abf2cff2c08776e
SHA2562eff934bde4454d7c6119f6bdcdc70418f65031a66613854e999b79e7e8075a8
SHA5120d85bc82de6b14b6a62e16e8c80059f736cc1430fe93473581c7074194c1dbb6c2b6ecf53a13b5e323bb8f89f93930c3c3e5313a9d2126fc58484d03048137c1