Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
298835b7fb008835313c9ef7cc6d25c4_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
298835b7fb008835313c9ef7cc6d25c4_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
298835b7fb008835313c9ef7cc6d25c4_JaffaCakes118.exe
-
Size
457KB
-
MD5
298835b7fb008835313c9ef7cc6d25c4
-
SHA1
41598bdfd03313d0b8e4cfcb73e13809fcfd99f2
-
SHA256
bd5c97375f8cfa059f5a74eda5b24fec37d4b41cf2003e57c3ac8ccd6b1e2cba
-
SHA512
55200ee73c32704fd88d038965eed48751e5943af0d5fefb9bce31706cea73802beb7d635b9dd262c41bd122f6228a930ebd705bc627e4e2db112ce4191862f3
-
SSDEEP
6144:iWlMpTJ/WkvNTCxtD98YbZZwtVNWgWlMpTJQ7yyzd7v:FM//lxa5bbZZwtVsM/Ehz1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2172 zam zam net.exe -
Loads dropped DLL 3 IoCs
pid Process 1940 298835b7fb008835313c9ef7cc6d25c4_JaffaCakes118.exe 1940 298835b7fb008835313c9ef7cc6d25c4_JaffaCakes118.exe 2172 zam zam net.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: zam zam net.exe File opened (read-only) \??\N: zam zam net.exe File opened (read-only) \??\P: zam zam net.exe File opened (read-only) \??\M: zam zam net.exe File opened (read-only) \??\T: zam zam net.exe File opened (read-only) \??\U: zam zam net.exe File opened (read-only) \??\X: zam zam net.exe File opened (read-only) \??\Y: zam zam net.exe File opened (read-only) \??\I: zam zam net.exe File opened (read-only) \??\L: zam zam net.exe File opened (read-only) \??\J: zam zam net.exe File opened (read-only) \??\O: zam zam net.exe File opened (read-only) \??\Z: zam zam net.exe File opened (read-only) \??\B: zam zam net.exe File opened (read-only) \??\E: zam zam net.exe File opened (read-only) \??\H: zam zam net.exe File opened (read-only) \??\K: zam zam net.exe File opened (read-only) \??\Q: zam zam net.exe File opened (read-only) \??\R: zam zam net.exe File opened (read-only) \??\S: zam zam net.exe File opened (read-only) \??\W: zam zam net.exe File opened (read-only) \??\A: zam zam net.exe File opened (read-only) \??\G: zam zam net.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\facebook.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\facebook.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C0D8381-3C15-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06e573122d0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000010eb7b9e93d4494284f725b5400c95e30000000002000000000010660000000100002000000052c6eb35f95b6f42848d0ea7c0a7f51f6578697b6d06353101b7f7151723861d000000000e800000000200002000000006d12c4faa1c48d3fe676ea61ed1fc752006d6a2a64f1f65eece4317f5e761d2200000007e8bcf3ee404085f137b221081f0ab898460e2e99f123d71b00af74065c54e264000000060ff7be6eade3ac51124feadc7ba41364db98607efedfae6da8d3d835ff04d3c68630a0e18f4d877547734899a8dd02ea8ee06f90c8d8c9689e40e9e058e4bf9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000010eb7b9e93d4494284f725b5400c95e30000000002000000000010660000000100002000000087ec82c873bd14934e21d8b147f1dd84d5b609f308d555d1a14c5980e192e29b000000000e800000000200002000000070ae976b2f1a6452004ad01d73cc8d073465e69f8930eca28ff6b953f487123c90000000faf228c44b24f3f56795aa629e6cd76ebd6b562af9031355243e66d19409669c25abbd44272eb7cb22e250cf2e03e66b77d3643b1125eaca91c30c08469e31258395a3258fdb8eef9b7be544df35781469e35295d819517dcd547be29e6a585488d2f509729c446739fbcbb90d90a72a49e2a1bf1638cd35f43b5a4307e52bba4852af97b0638aa7a785d3ef778d8365400000005ac502471d2928b8c7b1ddd579001adf85c67e23e706938459ef260e867d896b7688a88b07af425834777d7711db53c1d0d65b395a4d53587dac2c0588e9076e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426486658" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C0FE4E1-3C15-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2168 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2864 iexplore.exe 2596 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2172 zam zam net.exe 2172 zam zam net.exe 2864 iexplore.exe 2864 iexplore.exe 2596 iexplore.exe 2596 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2172 1940 298835b7fb008835313c9ef7cc6d25c4_JaffaCakes118.exe 28 PID 1940 wrote to memory of 2172 1940 298835b7fb008835313c9ef7cc6d25c4_JaffaCakes118.exe 28 PID 1940 wrote to memory of 2172 1940 298835b7fb008835313c9ef7cc6d25c4_JaffaCakes118.exe 28 PID 1940 wrote to memory of 2172 1940 298835b7fb008835313c9ef7cc6d25c4_JaffaCakes118.exe 28 PID 2172 wrote to memory of 2864 2172 zam zam net.exe 29 PID 2172 wrote to memory of 2864 2172 zam zam net.exe 29 PID 2172 wrote to memory of 2864 2172 zam zam net.exe 29 PID 2172 wrote to memory of 2864 2172 zam zam net.exe 29 PID 2172 wrote to memory of 2596 2172 zam zam net.exe 30 PID 2172 wrote to memory of 2596 2172 zam zam net.exe 30 PID 2172 wrote to memory of 2596 2172 zam zam net.exe 30 PID 2172 wrote to memory of 2596 2172 zam zam net.exe 30 PID 2864 wrote to memory of 2748 2864 iexplore.exe 31 PID 2864 wrote to memory of 2748 2864 iexplore.exe 31 PID 2864 wrote to memory of 2748 2864 iexplore.exe 31 PID 2864 wrote to memory of 2748 2864 iexplore.exe 31 PID 2596 wrote to memory of 2168 2596 iexplore.exe 32 PID 2596 wrote to memory of 2168 2596 iexplore.exe 32 PID 2596 wrote to memory of 2168 2596 iexplore.exe 32 PID 2596 wrote to memory of 2168 2596 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\298835b7fb008835313c9ef7cc6d25c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\298835b7fb008835313c9ef7cc6d25c4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\~sfx006C997E5B\zam zam net.exe"C:\Users\Admin\AppData\Local\Temp\~sfx006C997E5B\zam zam net.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://zamzamcyber.blogspot.com/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.facebook.com/pages/ZAM-ZAM-Cyber/1184962082829273⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD58d1040b12a663ca4ec7277cfc1ce44f0
SHA1b27fd6bbde79ebdaee158211a71493e21838756b
SHA2563086094d4198a5bbd12938b0d2d5f696c4dfc77e1eae820added346a59aa8727
SHA512610c72970856ef7a316152253f7025ac11635078f1aea7b84641715813792374d2447b1002f1967d62b24073ee291b3e4f3da777b71216a30488a5d7b6103ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5c43f384d8d6d005905702161280c6c1d
SHA1a192e90e3feb55713ac35e36531f0569fc3a18d4
SHA256cf8e9d2290490e34acc2a99e44a363f1f2a15fccc1aec4ba41d60ad13359c0f2
SHA5128050193793151d56b426ae83d10c673d114da14e02fa2e67efba43cf5c218ef166aea76df76554bf5beadc74d53195b0e88e1aec4e954b0a969b0465e627a5df
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5b122daa00d017968ceb9467338a46f28
SHA132aeee78fb4cedda7d4b4f9493996a9aaa55e767
SHA25690f064ff6c99911f6ab6f35e852cb4a7430db4a2b0ecd66487e9909e7adb7518
SHA5124505bf35559dd7c25fca1b45ba8ea271e4b4e4e77e498c98115d6a3ff6c0081054f04b8d826f9773dcde0e1294d65eb3b791b38de2ec320b30a10ea5508aaa45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD59ac2644290a070d00830f3076170b829
SHA106511c7d89dad0fea612ba9e8356055a153a978d
SHA2562f9f507b8f65f07a7509e477ce6d8b395369755c4cb3e0ce999a37b20fd23af2
SHA5127552c29c640fe69948d9e4cc75d28dea0f568217a07bcb9fb0df1c4fd9e8a471fb787e91d62851a9b4a6b87d3150ea2814d800f736be4232dcc2c6b11966b17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD580430b24739fb139e7569bfeea8cd152
SHA10e02b01000f2419988e6fac724d282b6d4fe9d73
SHA25666363f044fecd4ea1f9c265cb15aac8ee5fa6ce2c1cfb67f0e92bf23721bfbe8
SHA51231211305687ba9e4c4c9089c0d9bf0ce933a0b131e922c9b7fc9e32fec4cefe4c75d1a1ced8ae6ece80fe3f68ad68e53c3fe6c36f29b3362c126448f47231de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5925f44c1057fb5d0df666264e343a18e
SHA1b5bd6a5837afa11215ed80c2741b74f920324864
SHA2565e25cf63b5838ffbfa493beccfca8bc29a6acf966d70300683a272151190381b
SHA51249619879fdf99c7a8041c269427bc3d820f47408aaa4dc0724ef6caec4e608c766dfe28c4cd3d5b6b9faacd6599a29b3873924aa75440e68062ed8da74aa2685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_FFF72355A275D807A915CB4B42724776
Filesize398B
MD54620dd864fbcffc52b2fa89e060a8067
SHA1efc3ddbff0c8853817b3ac978fbc463f91c9f359
SHA256ec62ce11d7148434f897395de1215c9323e2bded4b0a83b0b0c3f8fccadb754d
SHA512f61a03e09132d12cc7ce45712a6a47165512e86fcdd7c66a4f2b3db9fde97d4f00be9cb64a8a290d2bc237fe118e407f7a5dc64254760dcde88d0e9c648d8b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561de7ab8abb971d4fc3eee408065a99b
SHA13369e59f6e1d2dec1c856e166159623ae0e23397
SHA256a31f19b2e62ddd05ee214b7d1738509dac1bfc0305d75513c39ce53d862079af
SHA512be7b7cc5e8bdc626c52bcb7a130f2a5debae21df50478452c1d2ff5aaa5bc927f5fd0357c6a308709add7dc006ca808a534497ba58d82287e61ecf44e4de4137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a5373b9b4851e4705c3841e18c4790
SHA15af170e3aec58c77ae7a0855ceb0c06e96c33c4c
SHA256feecce7e453230e78076d3d30f3b84a225d1ce468d71e64bae9c992762414a71
SHA5127c30d3a216ed535b0061483b69e25a71101f00c5750bad2ce729f41bab6724dfed4c82872296e402ce006178e2457197b5f1e978d97ec37515e5e22c1bc1537c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6f4aa4e8e24a552c6c774b1aa016c3
SHA1ee67a9add39159abbe9c44cda61aa0c9813d76ec
SHA256154245f9003acdcf05d61b3973cb3d6c7f8e0b8957846a3d0a465e39e516ce2b
SHA5128735d62ea2219b619e29a04cbcefeb9ecf1b8c97a63cd6fa37b64d64bbc22cac17527dab481fabdb4d122dfccc9005c12c0b38d2778637995b8c202d8869fe19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5878729ed83f6f7e0731981668c79616f
SHA1499629c4384fdec4aa9fdeb4823cebd11e71bb86
SHA2565dfa7cc2abbed56602e6a70c3dcf4b54d5306afe2c4c88db8013ad30ab5f2d1f
SHA512b10c4dfe8bd5e479191556eb00b5a7d5ed7ebb328c5e8b501cd6da07c71a631799efa1beac7ed47a4b011ca2f03ff6559b285c8e8824475d45a6763199382ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6d2fa37f8621481cace87ab7835279
SHA17027e88c5eeb2e109f7b31017bb9fa9ccf02810b
SHA25658cea608efd541f1ff26a2abce22d6fe35b130721f1ef1209a4149512a9c1856
SHA512cd3fe6b6dc932cb15170be7afd6a741453087fa225c7fb038a2e0f6c1f8cef894f4fe1ef1088ac54986ef5f24a5652ebcbe7b7ef3a5ec6731bf6f8619b3ffe6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f93ea34ed632f5b34ee9bb9be5d931b4
SHA1925a969b9ee8dd29e2aaf2728f83ad17ce9c8f48
SHA256451ee7b75bb155d303f93027ccdbce8b26816ded514a9b273335bc144320bdaf
SHA5127d24a45f5a7065f3b05795ec55f247d7bf6c811ca27d88a3c7733f952fe6af31be8c60b35c034729f2e9622c8be3a7d63612e110865df34b64ae8127e1e564ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2947d607abc946ef15fe158318c452d
SHA1cf8615b2071f08fcefd12c17b0438c53ac54a715
SHA256d82e9d257e9a432367235ea5d97f3a64276ca1a30830bb9d4c6dec0e70889d8c
SHA512bc3c2b9e664cabc9f5488b0c0bfd4f4b16c6550a47f51a240c02b216146c81177ecd2c5facba7d7d3916eaafe4b058a647aab1572e6f7ecdfe86ef2d50274d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa5de56d5b29d7f083d658d0a233b73
SHA1ca414b31ad819679e77f47380d3b23d57cf9b35e
SHA2565c81b42891a0c6ae61a6519be25c327fa44e12d9bf6c647987c4313fdb2ab7f6
SHA512eb05beaab9abb91ba5ab1f0ae7b1c56a0ab7f38db7b593c405caa93e1fc9bad586b354508c8b18ce7a2f416ac08e5fa734c6b700df59ddf9da97f73f73772125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cddf3cc5ebc4c5e5028ae36ca987eac1
SHA1451404c4e51b2398cfe335fb125c6810fbe3cc50
SHA256649f60f737873f6095cdc3e8137efb5d35d15f406c7d267bb5913b9508a2816f
SHA51258ebc88212367fcbff09fa855b475dcab6bcbcf9dab0c8a73632221d92fd87dd8f5ec848700c64d59f29b5ee6661789c2a1e36d87fc9ec1f769d24aa3277b56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52018eb1885d6254b96407ed37b9d2ce0
SHA1da54c7dc833fdedcc1ed3cd8552233f96022b725
SHA25625edc9bbfcd4ca9055fd350c920c704f63c7dfc21ef116413569cb422248e5e2
SHA5127a0c3ca688f2c717bb009650c1227c07483292c1c352daac91dfd31a0d654a8afb59ff56f2731fee2a2fcbd61b3f2023e01e637065a16346a0e8bdfa56702bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b303ebbe1573758321cd7dcd7ed1b8
SHA14991aca4ec405c46cf34a0b0b48a0e427541dd95
SHA256738836a809a4882bede83103fa93ffd7523bb35cd41be131d5692bc2e19df0c6
SHA512327be3f70ce9340d2f18982c4943495f68afa714ae47ccb3a52c11e3fc6c5331c55bc9148f7d48e8ec89cbf40fe02c6d932a273a39ba81e3d5db532aa6c2965f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf5d1305cd3edea27a609b22d9e7f3e
SHA104d8045517902e79bc1ed343f4995baa51897b8d
SHA256b780454ff0a5a40b295a9ca80b4d7b47b919a2e560f26998e317ba6b8b8de7fc
SHA512f4953c75e77f6de7c7bd1d4605199143ee3fd75d28f66eb016129425f8d6c50b2aae8851386a5705eebc6db59b50dff8b80d6f86abf9309430b5e4484535c0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5142010bcd07c1db9aa9069788eaae57b
SHA10587fc4407f8d403a7c28151fc75b40a36839d58
SHA256559b154925f40f72c3a2ffc4c479a4d2df0fef5766aad00f9db6e23dc1d373bf
SHA5123c0f3de1c3db7d05f743c0d95234ec5d402d1048537f1156ab4e56ecacfac4a414e4658e73f7d54280f0cc969361f9f329dcbdf1226b6748e228507171deb1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28fc297bd1f61dec3aa45e8a94a6d17
SHA1d5f350f2fb5a8d3beaf6a66ccfe89cf937f95f80
SHA256040034a6de7fcd3ba87250825a8ebaaee8399f79959aa5664b99a07843981ffe
SHA5123b4820a7cfa0b401c07371b28ff1ea63b1e61b9021dd9e7df8ce929752d2faac6018f3af7ce516bbc5bdac2c7c68ce5863112e6528c1680df15023720748c8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba90598fd4c0a0c34ee1f48286a8ab3
SHA16810342df8f41e49f79fcdc8484b590e2408cf53
SHA25626a7ce181f297370df73de52be76b09fa622f19471852ed6d8c6c267f5fd7bbd
SHA5127d54af0ba52f99c841c83c2e2b83b0d607d121e236cb8180386c73c1a67c5cbbad25fee09ed57043a08f1876f17f7cb37070a7c9410a1a52cece413ed28b5b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f8e5dda776d96e128630226ff52dd3
SHA1e7d28282af54f1a85b5cb38d1c39de3ecb86c84d
SHA2566a7339dad8680cb6efacd438f657381c36c54c1e7bb709a9c0f4a6776b0b3e56
SHA512d0e2ddfd7df807b28678b26d4a9a5303c537e8feb7c332d12053e8ce54f0a610eb3d5a76937c020d5ebdb68c6d694fbf25da982d61912000e9f0406f170ffb76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57d46f37e829e4f7c1381880e86b0b3
SHA1fcdd6316425f64553414171f68a016de729f3e53
SHA256d972ed696ca5974411a3656de220f9e8c8c9860f9ceb05333ae9a0a824a1ed4f
SHA512298cde86366010c5a97da4c59ba5b30985078606520edc674127db47e1976c370e3ff3d002c5337f49b3ac9998dd7ff27cf43d81ff6d7fa4947647f80e5421f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5798fd030d5d40bcd23386b484caab274
SHA1670091ae7f56689156d4387c1e51ac52c6cb99ce
SHA25677c6e7b404a8bfca01584eb150fd5c070092fad67f2fb1ef87868bcd27da392a
SHA512254c42d979b8ddb3b22eaa5411fafc8de8d8c2290344936bdfe5c3df65f1c58f1c29fe75e1526b8d8220321970d8977e5868f33af7e61dda7dc33edf5143ce89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace1c5017df5e1cfbaddea63d4743c90
SHA187bf8c7522988d6dd2bef3bd5fa2fa5790b49e6b
SHA2565cfd3323435b65741a215b54a1cd9f7a1b066a16afa7218e9ea5e1f13ab44c6d
SHA512c4da4f98e2dd05a27982b79d9e823130a854341c81da0c61289b8e453ceb9101b9ae43f96c59a483408a7d5db6737dc333cd805520e74d6c8e1ef7dddcc4172b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edbc109f872e437d0f9816d82cae8320
SHA1ba10f48c5eccacfe38ad81cf42e9015d52359558
SHA2563b208306d1cdee868ec4ce3b1e1702296ca6cadad3684c415c1268113a853ae7
SHA512dac1ca85e249f2dcd875c3848ca7dcef18081e1e7a05272bec06fd6cdb6ef36d1df5f9619ac1b08892a835f047de62bf3775d0c31edbbe66810fa134134611d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6476bf22a4474085d40594a4663aa4
SHA1f0220c5ddf05eb07dc4cc45ea86694e46f4e0807
SHA256ac7ab491525ffce7d2eb8cefdc77c675323eb109469567231a612c3950c0fe63
SHA5123d3a0448bd5f39a4c2ceaeb313f9b8e0858fd94d6a6c6e5da1154cf9a200e44d8326e7056d8078b8de6171f97b723d6d1ad55eb5d5067c1dd69a280064292522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f783689dc5e0ffa17d1a2069541d8b1
SHA1ee0815ba2d97a255737c71d0e296e90a6c5edd9e
SHA2569b4c58a338eea03c03f1ede2606955a74de9aff00bed5e5304be5e2e76f22831
SHA51201dbb7cbcbb8f89e65c4f41b070f9165c82e235cca4ce9c5cf940e947ac4d274d8c69b9735425deb874d3ccedb7d097f7ba9099eaddb5f82bc102709bb6781d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5562cca88e5a0714d429b9be69ae74eaa
SHA1d805c0dac9295dedd265f31f1ee4d9628c9f7695
SHA256fed4ed8c2bdecfec4d882380ada00efd05439cfcd2919a6cc979acfedd81b7e6
SHA512c9832ad7b0b0fde05773a04100226fd32570efe90838076d5dcffab7a72237a7d440be80f043d9e6a7f6f9a0d91818af21fb6bb6b71463c78511ffb94cfd7f25
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5C0D8381-3C15-11EF-85B9-4A8427BA3DB8}.dat
Filesize5KB
MD5228789c2c8ab6335ba78c8125d48ddca
SHA163a52f1dd03e978cdc7c1cec4253dc8508cd7f32
SHA256695eeb95e44fe4b3b6cd1f8bce3bd7aed3b4819fa54c4ba24e05697ae797280d
SHA5127dd9f9aeb11a632625c875363cc3e20bd85c58637f5b1a10d55553c537785da25107ed36576324b3d719d43b506a5da6139a7ddf8acb36af10ae82f413e382f7
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5C0FE4E1-3C15-11EF-85B9-4A8427BA3DB8}.dat
Filesize4KB
MD594a729783a9e981e5711c827f0e0ee15
SHA11f3ebaf78f5704f582faa23c423d028722ff115e
SHA2560d0a80296d69b30fdfebe84239edeb5e37f40e293bd7c6eb55478f76bed06b59
SHA512412d215472fc1fbf9e5c3028e8b4faa41bdce83e025290ac9d0a71d8254c7093272b8bc701730f175a466012a6037c3f3ae5cd464854b746f0f7a2e139f52e40
-
Filesize
3KB
MD536b4b0cbbbf8b7f7915b2a48958924ce
SHA12079ccca6e217af337083efebd31ff25b9519ebb
SHA25625de4c4260d61538caf0af863c2a8d25ab1ea28b482e252a402b03452a59001a
SHA5123794c3ac597cbd0d850a6c37da824caf4d1bf8df8efbe9892f96ccb6328d087b9158583cd48c1ae3519eb2d30149dbd9aaa0ec28bd43e51c5a1c4f1a45b5ba56
-
Filesize
4KB
MD5ff170412f05ac6b3f6e96435a504f8e7
SHA1b3235c472e631fa3897cda96447b3c1a080e0cf6
SHA256d78945dd0affc3bc6ceb89e43b5511ba3f4801f6d67e24d8ed613a80825fb949
SHA512ca9c37e45dea66c03b11371225ab66f8e87811ca04166cc1b6c3b61159bbfe3587df81bc5c5cd4363b62967b807685dd8175b013d60a69372501a6a2d82382cf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CY2G78MW\4Kv5U5b1o3f[1].png
Filesize610B
MD5a81a5e7f71ae4153e6f888f1c92e5e11
SHA139c3945c30abff65b372a7d8c691178ae9d9eee0
SHA2562bc7a47889c56ad49f1b8b97385d5a4d212e79bb8a9b30df0665a165f58b273e
SHA5121df32349b33f6a6fcb1f8b6093abd737fa0638cdd6e3fd90a7e1852bd0e40bc2633cb4e13c4824fb948d1e012e5cb9eed0b038b121404865495d4e57e123db69
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\favicon[1].ico
Filesize3KB
MD559a0c7b6e4848ccdabcea0636efda02b
SHA130ef5c54b8bbc3487ea2b4c45cd11ea2932e4340
SHA256a1495da3cf3db37bf105a12658636ff628fee7b73975b9200049af7747e60b1f
SHA512bcfebb2ca5af53031c636d5485125a1405ca8414d0bc8a5d34dd3b3feb4c7425be02cf4848867d91cf6d021d08630294f47bdc69d6cd04a1051972735b0f04d4
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
176KB
MD5d42e6b2e0c3cb3d938afecbca7846a13
SHA128ed9eae707357b07b51c7ff9c391de28952272a
SHA25614501a9bdc2b1cf88a9255ac23258c93dfdf08bc0890d33c7ed7b6e5d3b71eeb
SHA5125053e9dde9761ad07afe1a6f4774011401473530b861fb5768313c83fd7578f4979428986db323ea28291bbaad17ec32ebbcbc7729765d3d452e3326a85105ba