Malware Analysis Report

2025-04-14 02:55

Sample ID 240613-d44b1awfpr
Target a3b03a3fade314dc182618e0659a395c_JaffaCakes118
SHA256 fd8355a1eb6c75f74fa71b6ed886ef5684b7dfc6b9e40465d1b38e5e7a84ad88
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

fd8355a1eb6c75f74fa71b6ed886ef5684b7dfc6b9e40465d1b38e5e7a84ad88

Threat Level: No (potentially) malicious behavior was detected

The file a3b03a3fade314dc182618e0659a395c_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 03:34

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 03:34

Reported

2024-06-13 03:37

Platform

win10v2004-20240226-en

Max time kernel

149s

Max time network

147s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a3b03a3fade314dc182618e0659a395c_JaffaCakes118.html

Signatures

N/A

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a3b03a3fade314dc182618e0659a395c_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=5680 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4492 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5432 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5724 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=3960 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5456 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=4512 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 www.pascalnet.net udp
US 8.8.8.8:53 76.234.34.23.in-addr.arpa udp
US 8.8.8.8:53 www.pascalnet.net udp
GB 172.165.61.93:443 nav-edge.smartscreen.microsoft.com tcp
US 13.107.6.158:443 business.bing.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 198.54.115.45:80 www.pascalnet.net tcp
US 198.54.115.45:80 www.pascalnet.net tcp
US 198.54.115.45:80 www.pascalnet.net tcp
US 198.54.115.45:80 www.pascalnet.net tcp
US 198.54.115.45:80 www.pascalnet.net tcp
GB 172.165.61.93:443 nav-edge.smartscreen.microsoft.com tcp
BE 23.55.97.181:443 www.microsoft.com tcp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
SE 184.31.15.40:443 bzib.nelreports.net tcp
US 8.8.8.8:53 pascalnet.net udp
US 8.8.8.8:53 pascalnet.net udp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 93.61.165.172.in-addr.arpa udp
US 8.8.8.8:53 226.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 45.115.54.198.in-addr.arpa udp
US 8.8.8.8:53 40.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 181.97.55.23.in-addr.arpa udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
GB 142.250.187.226:443 googleads.g.doubleclick.net udp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 226.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 14.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 8.8.8.8:53 c.s-microsoft.com udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 8.8.8.8:53 64.246.107.13.in-addr.arpa udp
US 8.8.8.8:53 226.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 tpc.googlesyndication.com udp
US 8.8.8.8:53 tpc.googlesyndication.com udp
GB 172.217.16.225:443 tpc.googlesyndication.com tcp
US 8.8.8.8:53 225.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
GB 96.16.110.114:80 tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 nw-umwatson.events.data.microsoft.com udp
US 20.42.73.29:443 nw-umwatson.events.data.microsoft.com tcp
US 8.8.8.8:53 29.73.42.20.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 13.107.246.64:443 wcpstatic.microsoft.com tcp
US 13.107.246.64:443 wcpstatic.microsoft.com tcp
US 13.107.253.64:443 tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 26.173.189.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 03:34

Reported

2024-06-13 03:37

Platform

win7-20240220-en

Max time kernel

136s

Max time network

148s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3b03a3fade314dc182618e0659a395c_JaffaCakes118.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424411547" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD44F481-2935-11EF-970D-EE42DE2196AB} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01914b742bdda01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f5a2850230f876418d5b936bf356003700000000020000000000106600000001000020000000f73de1adad0c7dc7d90a806bc3a0379185af1355209078e9b6e253b1a4a35a58000000000e800000000200002000000067cbc79b0794dcffe41d2197914d2852724b19523a9dedf8b37c877bb31f4fc6200000004c2d9e56988c79af2c61680d8d1a96b46a8a6843f1ae4f16179fea9a1ed7f70540000000035200b294d43aa44f8f30d3df5454e4da10003575ad1f8cfc5059e560de8df1f7d3f59c866513da25461bf46bfe142925da531495f4135289ec8caf52d2a26a C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3b03a3fade314dc182618e0659a395c_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.pascalnet.net udp
US 198.54.115.45:80 www.pascalnet.net tcp
GB 172.217.16.226:80 pagead2.googlesyndication.com tcp
US 198.54.115.45:80 www.pascalnet.net tcp
US 198.54.115.45:80 www.pascalnet.net tcp
US 198.54.115.45:80 www.pascalnet.net tcp
GB 172.217.16.226:80 pagead2.googlesyndication.com tcp
US 198.54.115.45:80 www.pascalnet.net tcp
US 198.54.115.45:80 www.pascalnet.net tcp
US 198.54.115.45:80 www.pascalnet.net tcp
US 198.54.115.45:80 www.pascalnet.net tcp
US 8.8.8.8:53 pascalnet.net udp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
GB 216.58.213.14:80 www.google-analytics.com tcp
GB 216.58.213.14:80 www.google-analytics.com tcp
US 198.54.115.45:80 pascalnet.net tcp
US 198.54.115.45:80 pascalnet.net tcp
US 8.8.8.8:53 tpc.googlesyndication.com udp
GB 172.217.16.225:443 tpc.googlesyndication.com tcp
GB 172.217.16.225:443 tpc.googlesyndication.com tcp
US 8.8.8.8:53 fe0.google.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cf46b4b3e3735acc735ec3697e5f28b7
SHA1 c039e3035e9022892b1248503d4f09ca17fe0567
SHA256 074255749bec088c4be78203b781c996e9115f6949639a3da5f09a58fd892a36
SHA512 d17d7a317519b12e7be5417242555b1cfa1312e7eadf00675e1dde5d28fe79c3445cdea8bf6d3bfdf6da8d96553f31d57e85f75f88d80dbba6f0a951b8ceb0b6

C:\Users\Admin\AppData\Local\Temp\Tar4204.tmp

MD5 9c0c641c06238516f27941aa1166d427
SHA1 64cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA256 4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512 936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

C:\Users\Admin\AppData\Local\Temp\Cab4201.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\Local\Temp\Cab42CF.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar42E4.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1610feffa43ceb6be2fcaaf37f8056e7
SHA1 11083ddaeee636dcc90bc8bc8f0584644759229f
SHA256 4d6b7e3cd67dfc16e306f3eab12aba97cc502b34214829b402d2d364205afd1d
SHA512 75c9e149f7b698bfc66e26b5947dc16d5b1f3e6983387321179262fc7e54ea42f4fa17d692a4e8e10492edf6e98519bd1ef8b3699d36497132208a4b77b10aa1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2e7c48b7937e503f4cc404d4f2959a05
SHA1 fc0d5674bc6caa330d8dcea94a33ae1359232355
SHA256 e840a85c6201ad6df2a7fa8de0e28e1ce9743969f045532562ee988d4e3a6384
SHA512 6e40f4bd36d1d98cb7bd358b092953ac81263830767185c35f1a5b90d01417c7a2ed963bb4b45c152e4ef59310e8674b0f49e00e8f395360324f1099f48d9eb6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bc1cd05a8fb816c98fe1a486056442f6
SHA1 6018d56761c9feda635ff4b7d16a1711cd4f3ded
SHA256 8dc569441499ca8d3c119f0a515cf49fdc3218e08c4dd49e5ea55c2713f3b12d
SHA512 8281adbd33c1e39f77797f566352586fb956efd5c65c17af8660611e00c8bbf57a8c56009af7b2d485bc823a8f7d9e76a02897680acb3eeb6181e2ce21b89626

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 abacb2bd9d4825fec25c76e889153fbd
SHA1 47cb9b83c57a907b21ac4174b7960a1a94793eec
SHA256 1ca27795a079d2358b9ecbcbcdd362c1737e2d3f6bb88f0dedc32a7bff73fa2c
SHA512 7d39c50e41f7069b24def5f003f257e24cbce2cd0572abdd1780180db9f97443576829d27b71f0861f724d543f4036a9a8b0b863406cf07f42e4cec7f3b8708e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2b4d57d0c42d6d7c46bcfe74181e6ddc
SHA1 eb1cec03272e4cb693c052d4b1f24a8d9cea18ce
SHA256 9cbf562513dc8c0e73d6a223208f8700abc111602fdfcc2b0b4b60f1d37289f5
SHA512 1fd511b85f9c8b79093d9c7eea6f6b31bf9a64c5f671ff7ef085ba31927e4c4ff81a15c97c492cfa714d56dc257b7964cf02cbb71655ef8e09e7124f55b684c0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 718b2c4fb076f9e28a1d168d66fb4a1d
SHA1 d516d1cf1a9d976a75940f306d4b2c40dc4d530b
SHA256 cb51958798b088379628e7644a3503a059fa75f60d192f11fd7a6deda7aaba99
SHA512 5d9354222acc93960c7b7767f059e3850ab775fb9c2748c9d0447073ed813c0bbc5fdb9739ba61cf98eb9a2858a423fb2352b5499c0f2fb9082e38c07e53c383

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8111074ae53275de1ec1184aba0901c6
SHA1 09bc1f446e240baacd7be3d9bb9e168f31c81ab6
SHA256 5f88371cfde91e4de47c058855994be90fc682498610808f320cdc3fb68bcaf5
SHA512 24f3af963725bec09db47916270b5baa7b87af704154a7756a242ab22dfb75f5c5b1fe615683b3b277ede57fab79615d0f368b24006186fb398ed7f535136f78

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 32be9269282a3031583443b8aee0663c
SHA1 9129a72c3ba0cba903d750fcb5de4d3b6c4b951e
SHA256 490c4af4d277878c3bffd48e7aad35480834fd74a3b9ed8d40c00245df4e6158
SHA512 2721ebd0622cfd085c6fbcf4281ffea93673f32167d111fd5ff42d97c4dbfd5f41862516db185d7789da68b18034d54ade597851bb31e41e2fbc694ef3f14065

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f93c28d67f9386fb464e750c1d3005b1
SHA1 7ca87e1d98c7516fbd89b7c44d79f5cd62fbc8d1
SHA256 27fb47a8f7e9755da76117c406f2a7a0ae578eac1a24ab1afa389e21002a3a86
SHA512 b02b58c8a3072d5b64b469b7259e3c099e58da4a50f3279b3ca41219cfa416fb3d3e625e65fbeff38c49fe4370bbc110472a1e667621f069e98fcbb069df7177

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 735d5a1986190f0cd31b71d9c983b461
SHA1 69667e5a9c619c1ca02e8888dd48542c9d8ccaea
SHA256 588b833295d87541ede5b3e05a2106a7d532549b764d9d867b64a6ad174cd1c6
SHA512 7d5170df171ea54aa066e34c797a9944b43194b0500f57088fdf2623fbd218287f8264018b8641fed446f4201fd2eb49942325fd937d4ef57af8f1e5b7073dd2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 95e6c6f23c371f90af16433fe9101e87
SHA1 4ffb84d3254d0d1bc67709067dd353f372090f8a
SHA256 12e0e683e4ff791873c6cc4f1e9c4f9666b2e3cda45b71ec71a461adb7099768
SHA512 16379c164f6dd6c1da5126ff0910361d92f24c4b080c22fc34271035af1cba2a0836b021b69652c3ace80491787ee6b1173bc623cf66971d1d70b77c0ad40d75

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9cca101017cfc4772b3664e4df7e962c
SHA1 e2f7889889adf280e424c6d18b6b92d5a7572305
SHA256 4bd0324723483bba27f4687e1f5da7ea2a8ee8be968b19f417ab807dd77530a5
SHA512 f78dd9d7be05fab9ce0503664aaf2279393c7bb09e71720fe3c09128986c1d576eeb5fb5ca386ad5f5e86c866816bb1b7b4e941bf92c6a473ff35189990d7c8c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1c3010c3f838b08a88e14df779e2da79
SHA1 f1e1ecf66685d9a219ef78a2f96929a565233120
SHA256 1ecb25a5afd438f4304aafbd2fd39c1f46432a7aafa2806d49694ee6b8f7c022
SHA512 0a4cea6a0e63b459afc4a5d023b571648c645a88788a898724b501aa24b79f16443ef9e285c3f878556c5bbf9b61c591e732b8e4a3d74c8c00953cc4862e7710

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 55c795732ec5c18b35ee17cd5369e468
SHA1 03c15f5635bbc5b553df68d1abd4be5fce1cef15
SHA256 021e7c954e516f797046832a21b49f7694c6c93d6b2d883120705b9308b69f22
SHA512 e2210d9aa052ba7b09486b3db190b49d3d6559e792f1f782429af97c5f941e622f60765616e386f9b5bd8b8632baa898138a34a937c99b6382f9b9f4a5837142

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fd0d1a5215046e5fbd3f6911a2b12ece
SHA1 7efd51a3109407bdabf6edb7ec8e52117a926179
SHA256 18a2d7e7973af8c281318ff66bbc89d905cf61f08bef7f1e0a020d8bbb28f175
SHA512 2ff905bf400470f3df2226b09a01c17097368901c88433020f523c2cd7d4a927682a2cdbf2e23e5babe74ac648c093b57ceedca72b1d3a0ed2556a9413b9c009

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 20625ad7dc45e204f6854b86b36b8006
SHA1 338ee23f6cb459f686e973b22197a08ac13e7ea0
SHA256 892f558eef074abd72867946f80f61f1b25ed15d0e35da1f6ec513c983b04da5
SHA512 e5d4e6b4d012edf1e5ca1a012eebf0492da5e97bafa99a415e68a4f2129c87af9852f7a7447374565961b316833154a00aac7075406b9ec146dd3b4ee3136409

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 2e8da074bbdb1ead69a4ec915a574a7a
SHA1 a5414c2de2cc8f62499ed4a596ac0539e9651c9b
SHA256 3cf09fcbc4acb00671e25e757c4a9534d4ddda1d057bcbb9c195a132c4beebe9
SHA512 c284b90ac3f2b9388b839774bf8094eb5d2739eab88c4296aef027675873336c0af28d5f19c883b2940b35fcbfa1c109bfef9527e5e6db64554889988d7d7123

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3c180eab01282cad644fa1766e911e8d
SHA1 ba64d9b4d1fdf33e0a27123c73c2fde41e3b8998
SHA256 3b78ed5d9f48c5659bbbc1828e5ca025b4ef892dce6844317f48967a17c86a2e
SHA512 4a324e45e533859ec26e7638a1d4a068040870be5c8f5da1048b82079b1d2e16500232b2b681c409bff3ae38a5643ac9a9fe178e4a693da115f26cdacf3063e0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 84056f93418e12b584b439b54eb9104d
SHA1 63211936fd7fae7209ff2c492fc508267b33e336
SHA256 e4b061ed43cf95038b240e6942b83ac4353a2d5f1619f46ac3877b0c240b4c76
SHA512 b40302229c82f3c526ae89c668d4af4dde2ebc781312bbe1d51ccfe6d69c04eb171b9abe55b6d8d3612a02402cee3e1f3c88aa545a89e54d8a395cdbd5381f9b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 267bfd18e91c13ce10c2461570f6f54d
SHA1 ad2535c735bfef9c9c60274b811d567c74cea9cf
SHA256 aa8468c6574ce720bda7706773d65750f9034d182328096e6b8510b666b25b0d
SHA512 91430163752e942c5d9b83b43e2a3e5f5b3c8c2b4d01d8bcee903a7547d34a71132e43c4ff87373925b99b26208ab71a477395a74f296c1679367495fdb97926

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d5fef7723ababb06ba55932cc653822d
SHA1 8798820c22ad18ff810cb726e2ce67e11aa1aa16
SHA256 122819db4bf49246f2bd7e0da5214ba607b427cbfe34335f38b29d2758194866
SHA512 aebc72c7b4b2b6b2036011b4b13797e0058f5f2bacaa96e1ca46c2a25187d6d4fe0d8ec9423af7e1b597e1fc487aed3147d2fa4d7ea8273b51354fac5b01ee4a