Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe
-
Size
387KB
-
MD5
2f14313cc1168fbd3190d5210cbd1613
-
SHA1
13e79128713c7db6edb0ba790321732577dea847
-
SHA256
21bee3c19aad66bc7ea0cf78f372bc6303d897fd3fefc86f4c51cc9655faf6f5
-
SHA512
d5b2351698d618d4b8a31f94346c142be6913cc3ab5e4b1c0c7f37cbac921e29ca22cb6ef38897251a31e913d3b7d3b48700854fc35d3663bf124d4ac63fe90c
-
SSDEEP
6144:U11EBXkoNiKZKYBtHT3MuNRIs/fiE3rBRvZW5EzqsUK27M11AYWW1Xdq84xBb3b:U12WoiKZRh7MCRJzl9S+Pjnlq84
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\Hosts 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2348 www3.exe 2180 1.exe -
Loads dropped DLL 11 IoCs
pid Process 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 2348 www3.exe 2348 www3.exe 2348 www3.exe 2348 www3.exe 2348 www3.exe 2180 1.exe 2180 1.exe 2180 1.exe 2576 regsvr32.exe 2688 regsvr32.exe -
resource yara_rule behavioral1/files/0x0008000000016c4e-8.dat upx behavioral1/memory/2368-10-0x00000000006D0000-0x00000000006F4000-memory.dmp upx behavioral1/memory/2348-14-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2348-35-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 7 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{F1FABE79-25FC-46de-8C5A-2C6DB9D64333} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{F1FABE79-25FC-46de-8C5A-2C6DB9D64333}\ = "AlxTB BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F1FABE79-25FC-46de-8C5A-2C6DB9D64333} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{F1FABE79-25FC-46de-8C5A-2C6DB9D64333}\ = "AlxTB BHO" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F1FABE79-25FC-46de-8C5A-2C6DB9D64333} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{F1FABE79-25FC-46de-8C5A-2C6DB9D64333}\ = "AlxTB BHO" regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{F1FABE79-25FC-46de-8C5A-2C6DB9D64333} regsvr32.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\AlxRes.dll www3.exe File opened for modification C:\Windows\SysWOW64\1.exe www3.exe File created C:\Windows\SysWOW64\AlxRes.dll www3.exe File created C:\Windows\SysWOW64\AlxTB1.dll www3.exe File opened for modification C:\Windows\SysWOW64\AlxTB1.dll www3.exe File created C:\Windows\SysWOW64\reg.bat www3.exe File opened for modification C:\Windows\SysWOW64\reg.bat www3.exe File created C:\Windows\SysWOW64\a.reg 1.exe File created C:\Windows\SysWOW64\1.exe www3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1016" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar regedit.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\baidu.com\Total = "11368" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "75" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\baidu.com\Total = "405" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.baidu.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.baidu.com\ = "75" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{c95fe080-8f5d-11d2-a20b-00aa003c157a}\CLSID = "{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{c95fe080-8f5d-11d2-a20b-00aa003c157a}\HotIcon = ",4" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\baidu.com\Total = "8" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.baidu.com\ = "97" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b000000000200000000001066000000010000200000000dd352d47f89a4538827252613b4c9490b0e8645398e7095ee2886e7e43ff650000000000e8000000002000020000000c8ea5e9a53e3d223171a8d308f36549276e66a2e02081fc70a93dfa754b2b53720000000489680599cfeee22fc8db6ce17584f036926946bd97e8290571b5879abf49a2040000000a7a7b8a7a0126a9ec466724cc746dafb9a4a3695508d1a0d27f538dad291b08a2f45b0aaf6a872521831c629f455eee78886aa12345411cf34823db7c774ab7d IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar\ regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "8" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "35" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.baidu.com\ = "405" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.baidu.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.baidu.com\ = "35" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\baidu.com\Total = "75" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "97" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.baidu.com\ = "416" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\baidu.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.baidu.com\ = "5" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "405" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.baidu.com\ = "89" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\baidu.com\Total = "89" IEXPLORE.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar\{3CEFF6CD-6F08-4e4d-BCCD-FF7415288C3B} = 00 regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\baidu.com\Total = "97" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.baidu.com\ = "11368" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{c95fe080-8f5d-11d2-a20b-00aa003c157a} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{c95fe080-8f5d-11d2-a20b-00aa003c157a}\MenuStatusBar = "@shdoclc.dll,-865" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{c95fe080-8f5d-11d2-a20b-00aa003c157a}\ToolTip = "Related" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\baidu.com\Total = "35" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\baidu.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.baidu.com\ = "1016" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\baidu.com\Total = "1016" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.baidu.com\ = "8" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "11368" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{c95fe080-8f5d-11d2-a20b-00aa003c157a}\MenuText = "@shdoclc.dll,-864" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{c95fe080-8f5d-11d2-a20b-00aa003c157a}\Icon = ",4" regedit.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9AF74448-EBD1-484C-8B06-35E597C0B54C}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{69A72A8A-84ED-4a75-8CE7-263DBEF3E5D3}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Popup.PopupKiller.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{547AB549-4DD8-4EA0-B070-F6EA062148FF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{ABF7C4D4-53EF-4C15-8951-D22F63C98E9F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E60160F-0ED6-4DCC-B6B6-850CDE4FD217}\ = "IPopMenu" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{69A72A8A-84ED-4a75-8CE7-263DBEF3E5D3}\MiscStatus\1\ = "131473" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{49160F0D-6BE2-4F5F-BCDB-9256DA3BB120}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0B32BCCD-4D64-48EB-8EC3-9BA0807D1349}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E60160F-0ED6-4DCC-B6B6-850CDE4FD217}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6912BEB3-E20C-4953-8C8E-E91B12B55BFC}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{69A72A8A-84ED-4a75-8CE7-263DBEF3E5D3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{69A72A8A-84ED-4a75-8CE7-263DBEF3E5D3}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Popup.PopupKiller\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{547AB549-4DD8-4EA0-B070-F6EA062148FF}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0BBB0424-E98E-4405-9A94-481854765C80}\ = "IBubbles" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DC21CEDE-3B81-43D7-B816-DAEFA7B4901F}\TypeLib\ = "{547AB549-4DD8-4EA0-B070-F6EA062148FF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27D784D7-9217-4227-B43B-E06E4781E0CB}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{69A72A8A-84ED-4a75-8CE7-263DBEF3E5D3}\InprocServer32\ = "C:\\Windows\\SysWOW64\\AlxTB1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Popup.PopupKiller\CLSID\ = "{7BF3A7DB-A516-4e24-B40A-F60B34699E26}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{49160F0D-6BE2-4F5F-BCDB-9256DA3BB120}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{04D79E9F-09A9-4AED-9FC2-6E63A3BCA51E}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B79D9232-A798-43DB-9E61-281D550460E4}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3CEFF6CD-6F08-4e4d-BCCD-FF7415288C3B}\InprocServer32\ = "C:\\Windows\\SysWow64\\SHDOCVW.DLL" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AlxTB.BHO regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B71C7D9A-DA43-4E8B-BB9B-1684AC2AF324}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27D784D7-9217-4227-B43B-E06E4781E0CB}\ = "Menu Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AlxTB.BHO\CLSID\ = "{F1FABE79-25FC-46de-8C5A-2C6DB9D64333}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AC2A5E17-05ED-4E62-86E5-84779E8F0BCA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3F41980D-B681-488E-9757-0C9744F9C3CE}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0BBB0424-E98E-4405-9A94-481854765C80}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B71C7D9A-DA43-4E8B-BB9B-1684AC2AF324}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9AF74448-EBD1-484C-8B06-35E597C0B54C}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{738CB0ED-54A7-4061-AE2E-40EFD9B1EEF6}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AC2A5E17-05ED-4E62-86E5-84779E8F0BCA}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PopMenu.Menu regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6A08CBD-6673-41B1-B997-3F83A25B45B0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7BF3A7DB-A516-4e24-B40A-F60B34699E26}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0F3332B5-BC98-48AF-9FAC-05FEC94EBE73}\ = "IBblWnd" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B32BCCD-4D64-48EB-8EC3-9BA0807D1349}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F1FABE79-25FC-46de-8C5A-2C6DB9D64333}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Popup.PopupKiller regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EA20F195-32DA-4bd6-B348-FD01FC7D3D5A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EA20F195-32DA-4bd6-B348-FD01FC7D3D5A}\VersionIndependentProgID\ = "Popup.HTMLEvent" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A69107CC-BEC8-4A34-B474-211B0F46A764}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3E60160F-0ED6-4DCC-B6B6-850CDE4FD217}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B71C7D9A-DA43-4E8B-BB9B-1684AC2AF324}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6912BEB3-E20C-4953-8C8E-E91B12B55BFC}\TypeLib\ = "{547AB549-4DD8-4EA0-B070-F6EA062148FF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6912BEB3-E20C-4953-8C8E-E91B12B55BFC}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Popup.PopupKiller.1\ = "PopupKiller Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{738CB0ED-54A7-4061-AE2E-40EFD9B1EEF6}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B32BCCD-4D64-48EB-8EC3-9BA0807D1349}\TypeLib\ = "{547AB549-4DD8-4EA0-B070-F6EA062148FF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B79D9232-A798-43DB-9E61-281D550460E4}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{ABF7C4D4-53EF-4C15-8951-D22F63C98E9F}\ = "IBblBrowserWnd" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B79D9232-A798-43DB-9E61-281D550460E4}\TypeLib\ = "{547AB549-4DD8-4EA0-B070-F6EA062148FF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6912BEB3-E20C-4953-8C8E-E91B12B55BFC}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{04D79E9F-09A9-4AED-9FC2-6E63A3BCA51E}\TypeLib\ = "{547AB549-4DD8-4EA0-B070-F6EA062148FF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27D784D7-9217-4227-B43B-E06E4781E0CB}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{69A72A8A-84ED-4a75-8CE7-263DBEF3E5D3}\Control regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3CEFF6CD-6F08-4e4d-BCCD-FF7415288C3B}\InprocServer32\ThreadingModel = "Apartment" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EACAA5CE-99B3-470E-9629-8F9EF4C4B637}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{69A72A8A-84ED-4a75-8CE7-263DBEF3E5D3}\MiscStatus\1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FA77AD79-09CF-41FB-B171-CC856F9E737F}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AC2A5E17-05ED-4E62-86E5-84779E8F0BCA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe -
Runs .reg file with regedit 2 IoCs
pid Process 2312 regedit.exe 2816 regedit.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 2180 1.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2312 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2312 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2312 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2312 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2348 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2348 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2348 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2348 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2348 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2348 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2348 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 32 PID 2348 wrote to memory of 2180 2348 www3.exe 33 PID 2348 wrote to memory of 2180 2348 www3.exe 33 PID 2348 wrote to memory of 2180 2348 www3.exe 33 PID 2348 wrote to memory of 2180 2348 www3.exe 33 PID 2348 wrote to memory of 2180 2348 www3.exe 33 PID 2348 wrote to memory of 2180 2348 www3.exe 33 PID 2348 wrote to memory of 2180 2348 www3.exe 33 PID 2180 wrote to memory of 2964 2180 1.exe 34 PID 2180 wrote to memory of 2964 2180 1.exe 34 PID 2180 wrote to memory of 2964 2180 1.exe 34 PID 2180 wrote to memory of 2964 2180 1.exe 34 PID 2180 wrote to memory of 2964 2180 1.exe 34 PID 2180 wrote to memory of 2964 2180 1.exe 34 PID 2180 wrote to memory of 2964 2180 1.exe 34 PID 2964 wrote to memory of 2576 2964 cmd.exe 36 PID 2964 wrote to memory of 2576 2964 cmd.exe 36 PID 2964 wrote to memory of 2576 2964 cmd.exe 36 PID 2964 wrote to memory of 2576 2964 cmd.exe 36 PID 2964 wrote to memory of 2576 2964 cmd.exe 36 PID 2964 wrote to memory of 2576 2964 cmd.exe 36 PID 2964 wrote to memory of 2576 2964 cmd.exe 36 PID 2964 wrote to memory of 2688 2964 cmd.exe 37 PID 2964 wrote to memory of 2688 2964 cmd.exe 37 PID 2964 wrote to memory of 2688 2964 cmd.exe 37 PID 2964 wrote to memory of 2688 2964 cmd.exe 37 PID 2964 wrote to memory of 2688 2964 cmd.exe 37 PID 2964 wrote to memory of 2688 2964 cmd.exe 37 PID 2964 wrote to memory of 2688 2964 cmd.exe 37 PID 2964 wrote to memory of 2816 2964 cmd.exe 38 PID 2964 wrote to memory of 2816 2964 cmd.exe 38 PID 2964 wrote to memory of 2816 2964 cmd.exe 38 PID 2964 wrote to memory of 2816 2964 cmd.exe 38 PID 2964 wrote to memory of 2816 2964 cmd.exe 38 PID 2964 wrote to memory of 2816 2964 cmd.exe 38 PID 2964 wrote to memory of 2816 2964 cmd.exe 38 PID 2368 wrote to memory of 2824 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 39 PID 2368 wrote to memory of 2824 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 39 PID 2368 wrote to memory of 2824 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 39 PID 2368 wrote to memory of 2824 2368 2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe 39 PID 2824 wrote to memory of 2744 2824 IEXPLORE.EXE 40 PID 2824 wrote to memory of 2744 2824 IEXPLORE.EXE 40 PID 2824 wrote to memory of 2744 2824 IEXPLORE.EXE 40 PID 2824 wrote to memory of 2744 2824 IEXPLORE.EXE 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f14313cc1168fbd3190d5210cbd1613_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp/tmp.reg /s2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Runs .reg file with regedit
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\www3.exeC:\Users\Admin\AppData\Local\Temp\www3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\1.exe"C:\Windows\system32\1.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\SysWOW64/reg.bat4⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\regsvr32.exeRegSvr32.exe /s AlxRes.dll5⤵
- Loads dropped DLL
- Modifies registry class
PID:2576
-
-
C:\Windows\SysWOW64\regsvr32.exeRegSvr32.exe /s AlxTB1.dll5⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2688
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s a.reg5⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
- Runs .reg file with regedit
PID:2816
-
-
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.baidu.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize1KB
MD509c4720fdcd2b6d00b0c01329c57a0f8
SHA160c2a5705cc4cc4d6440733eb8989d0b5af35c5f
SHA2565308918a8382f09166e912fffbd34e388babefe6b7e980c7f7a741fe45ec6b7e
SHA51251ad96794230db171b7c94329c4173b7916b8cc0cd0ec7a333aa65871ef422302056a5bb7ec20a982c02eb169d7d1c69090a5bdffcd72cafa3eca5813c27a436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173
Filesize1KB
MD51b4fcb46f2190f13b3c0774e5224fb59
SHA1ba1c8d93442f4513e833464e0ca46e7f90ff9af3
SHA2567467791d0a633d2d7a531c0dba3f657d5e7256b7f7465f27a1dfce4d1d833072
SHA5121df12395d8628d400e28629d88c9761f22ae852856cd7baab120cac8af0ad9a82da16fff597ca6c042e0f7e0f197ee3b5d447f7225b6bdbf6ee9c26db1bea62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
Filesize1KB
MD51cb4f7d40edad605faeb1d290b7ab369
SHA1179c33882299fb5142be348ef0b0b7bc2f0887c3
SHA256d8770a81c83ad28778d458dbfbd9e1cc152e8331a51f5309a2e077b59ed03854
SHA512057b64cb8178823001b708678dfc797b3d5aa83750c7fc8a16e9c5f639774d0016eabfb9e7af501a5b7e02acbd53853d2d90717a5a189ba30110d111575b2e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize508B
MD53f02436c8bc85969e9ded7c4be7ab188
SHA1985b22a89eed138d0b76d78f68a92bfe4995029f
SHA256604b22df92ff91332cf346f3767633055b11a2d89ac3c0d71a529c8423184541
SHA512dff039110cf700cbc6454d83e5304beebe3e1790936730b5655361334c7584839f96c05e9c371839bfce203e11bb36958ecbf3d2c7807831b25c2754518c953f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize508B
MD50783cdc5f8c844602a9fb4ff411d70f8
SHA145a42a5c11e403623eed5608d5a480a8f9b22edc
SHA256b923dc0c53cb389478193cd0b22b1a85030483c856b463cfe147ffafcf70580d
SHA512927c4d15f03c4840bb72b079110cd95236090b68ee38e7ac0c82b53eb7b5b93130890e6a2dec5c66e2074f78c866ddc332ef0ff46c891abffb015a347474be11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173
Filesize540B
MD556d4c86731107626d10ddbe2862c4d08
SHA107699fd56ba7305b681642ba7a144be4713a7a77
SHA25656bd50f924f9bb56f4cdc55d95eef71b9688bfab0db08b2027321a666b12595a
SHA512e48536f500b76636d4aa1fbf26d16dfa5a53ae0ab620018b78d907c3fe94e6076d7349cf6a11c826c8cd6140f4e67b2bf8bea630f44b5e143a24e6f886305f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173
Filesize540B
MD5b0b21127aaf8fafb6842b2e40ceddb35
SHA17d96de91112844ea6e040b5453f1d98e547f8f80
SHA256b664e622a061c57e8db6f6927a5156f7ef758e42a0c56f29a0f8fe54b5a8bd28
SHA5125eacb705e0f3fbb74fda715ba636b27a5d0242993ead1ad52c997770a2b0f70457f497a4d7db31342c473e02d298622b8d6999a023a43e93271c2d7e362fb064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f27ea2beea36f084d61cf41c283aba
SHA15e5e8f5dd260c9ae606d8c0d5712546abd550ae5
SHA256542358cf146ad42ea9cbecffbc553444431a1ebc34a0d38f5ab69ed9d056aefe
SHA5120598db8a0029786e2d13e0f1f4220d2c4a6e5ca7dde0a610a5cb6e90831f9100e458a46ee0fbdad376ff44b996f7f2d222bfe993726b2fcb009629192bd15fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e112afb2efaef071c75d10662801ee
SHA1acc8d693bfa144f9cd098beb182068e0dca7c13d
SHA25690d0739b6933ba3ae71b34bbeffd2289567df9d29a65b73e2b8683676f3cf257
SHA512ec631eae59d309b77d53e2a1b72b97cb3924f6e89bb619f23a1b25bd8e14ec43455d4739d6b608d0bc1b6afe65e24fe11a701a5b33d4ff35119f9780b97cc24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd112ad3838ae47e4419bcd09580add2
SHA107927208dd97fc92b881f2ca8226fb10bc837542
SHA25675f8ef34b9d62133e643749dd1ce736827ecafceb1e1156921a8654c60dd189a
SHA512992c2c700a0766f52fdd0dce464e3d495a5a2bc68347683001be8fdda97485079a0971515a81aeed444f9576b8d70ec4c7c63f0f445e1de134fd91c9d2583720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514eee47f5130d0775016e13d03581157
SHA1424f14e2f7934e37f6688808a6119ead6dba2cbc
SHA2568a259a08a537ff51249b8190fb3eb56bb5738f8c56f8876850b574d4d63628e3
SHA5128c9ce7a40732d1c5b025fb5aab7a8ae8a853cc0c9a1c3dd39dc912b95aac0de1432fad1da5138baa173b9b8f5113c6a47d7b1406cfedf58ae320855142529701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56793f99565462a4c3ec698279b7641af
SHA1cbe9e9d28e81d150700df9812e19460105fb8dbd
SHA25641f5ae6510f315a6491d01e877d9649c2e2f82183b6012b7eab11e08e7ef9d58
SHA512edbcc359e538c8e561f98e4df298e4e2cb317ea1f72cbc44dda1d8321af53663478c3941c08a399ee2f0e0422105d281065616742be11d806259281319723811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86f948077bee40cac3446cd81443e01
SHA12f9adc7d1dc771497f41eb62e0db5509bda7e34e
SHA256cf298afcc12fdfa88d8c62b3b3c45fe7f4ae918bd29411224fbf7df0003057d8
SHA51257f3d29a3b5349e2d5d9f91527a60f00ceaebc0f14f05fa3f53247573f10fdacdab021a6d869b498c2597e30faaa2d43c91df0f64e0de406797424ecaf1fd031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ffc8c35281333dc9b0bceabd19cb367
SHA14d80b8eb5813c64d6a51a8e63f510488c4abdde8
SHA256db86bb9ce5be0970d4a3b3ad5b2fc4b02af02ec5e861ccc24b342aa1ec1abc68
SHA512ce4225eded8021d6598e7954a47a164827bca8cfea919e3ad2e226f5630815745fbcccc6a7c4ac93f79c58f275d8f8f868878c7b4f4862c99e972c8b521bb379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855b4d22cc9c7a575bb43aabe907d439
SHA154cfda2d322e36cf887dfe4c68cbfa5813b315e3
SHA2567f3e2fbb0a2a294aabe274607cffe05e42058c78b480bf16ab5207ffafefc8b2
SHA51216ee3793e9f03178621a3c4b73a5c41d6e0d15c710784848d90a553c25560cf3862fa628b2c79814f3f8bd98be9afe456427cb00dc7f19502a695203da0e22d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a09bbd6d5c247d19d19d9d08370c9bd
SHA137c5d789452c7e2d2c914ad5f1c3de1524ead36c
SHA256ba36394f04e200aff60256319401bfd6890d20ba92a096599a875cef8c31c467
SHA51284299a188950741bc4efe72427b9759521cde21820e00542f41d8aca4a02e48f64837c038ecc4c94544933fa5b5ce43a7ec98cad46789f2da7cf5db0bb91fc90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b8303811dac9bf91fa5f5ae7dc5a8a
SHA1cd48dfa50c6dfbd0b3ca0451b6b198d28c125b24
SHA256fd0f669eab162ba3928ac3f1db1d3df5302497a4bf5c501bcc69154426b5c315
SHA51235c173fcde6c1d4739756cddfc4c8145f819647177a733308aabd0989faba6124a2718de639b3cc5a790ec7a0b14d323b097dcec100adcbb4e6d3aa57e91f8c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e91411a9e42da57f642a1fcd17fdfea
SHA148b09becbe063569155fe1ac6349f0a221e8a513
SHA256c50be113ffd08e5e4ee842a8005d2ef5bc2bb0294c2522b92a59f20b116f23fa
SHA5127dd039c12b448a647047938a6db91a47094494bffe3571120c199c93fc81fcb8599a2fe963162f7d4705dce6f5ee6a7467930847017d214913d7824ae934630f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518934927df8dbf7ff4a8007c45846161
SHA1af3864cb2efe51b0db6eadaf56401190c87596ef
SHA25691155e234abe216bde935a9be0864656c0d37dc36875b33e588fb18baae18202
SHA512c4e94b33179fe6c2c312cc3cda2fea9a5d0b5b3b6b26c2707fe64efc08bd7b73c15549e2cf1e63a07e3679db51da54c80f5fc29c4e189e0a96746983c244f41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b90d4f8de4ef92d17b10543acf69e1
SHA1b47cf871e838e1600a7f209e8b383d503cd02a0a
SHA256d0734199f384a3f6c8059613d1b3debef725a52097ed7207179b8d4dd4cc6549
SHA5127c561b895441d35d9ac7d60bbf78c39b1cb4eef507c3850c8dbe81f6beb01bcd44d33ce4ca52e650255200e0fb42d39261d34b580fd5ad66a8fc14b5054a2b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de5bfa66a3c64ce72b4528221586a192
SHA1f1cdaaa279a4a0bf3255170f34e02d4798ee1d00
SHA256899e15cc115b0c18b20ffbdd58bb30a6bccb00ecba98a46a392587da4a97409a
SHA512024b4be0a53ee3b0c6dc581523ad03a76c134a5f546685e28e40c0aa9a2970bd68aae48141d07c5bd174f2b71e4abc8bfa857159623dc032cf59a65a9d791dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e92cd6a2563c90d0a97e628a402497bb
SHA1af759259af87d042f23882e846da7abfa18ee9b1
SHA2564e4a2132ecd93839f1153024bcb80768371dadc002a7b54c82bd7fb94574963b
SHA5122212417574a65ce130964f8ed143e2527ffafe1ce0aca190ef6f40144e78535a56c934b136c65fdda9ad7feae06c623fa98f46a17bcfd5317c08069847aee4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5796b7ff70f4d1b44672cd878f73ca604
SHA1e6f49ab3191166ba867b810acc4ad3b8f96bc64c
SHA256c2843c585a7bf54b8b8e0374c72968d1e39a107076288fcab65ca0ba205706c9
SHA5128dfcaa2da4ee1f40444a826f9d542d8bf68563a822ecf71cc186faa7b0754bc54e915e803656122cc9474c7e511b116ecd62da281821e8181b8db612ee5025d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507eaf8d4df1639dd9e46f0eea026f535
SHA13d93919e7ae99b387b54b035a92d3222740efcf2
SHA256967ca40dc13c381668dc00b3f060237bc3e34fc124d28faf5a7ac732aae38ba7
SHA512c16abd95d84d16ea85aa5e0fe2234e325510508721db59695ada703ffb071d55c10dfba706c3cede6c0a7d6a7ea47e40e6e1b803d3ead86146c5626b97dcf279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660da6ed9570df4e79be85b73de6c4fe
SHA16eb5083e2bb296f1878e302de83be7f2ecc7ff1a
SHA2562027bc0c9d78386467f4cfdfe82134e11742f9e8d532b73d9e90e1f1dd2182c3
SHA5121afaadfe859609dc86f41aa7150f6f397fe6c73367af7b2060ab66d52fe88e477bad6eaa22407f5b469f3a93158257af004bb37f01f4bd3a0257aa8e9ad21a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5630c4f948180ea2f94923b0a7ec6d434
SHA1e0b0d0f8282ef4ea0e813fe8cf133836efc907f6
SHA256dcfddc646d91c2f0d5d315ccaabc3cc6e3feda1716ad762544ff6a6ee58042c1
SHA51291cdd96328e8e3d193fe386ba19bfc53622dad39b78888313e3765e80c6f688d34bab4dc3063c7f4828bd780647f319e0089cc78b818b11cc9f9e4a72c355419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
Filesize506B
MD526b96f5e8c546419c01ebc5c2a4e5310
SHA10fd408d7bf1f05dd8561e9a068fa391f41f2b8b6
SHA256871a6fd3bdb8a762909107c2ac596f51ad11a2686c582ee346f133d0ce90362e
SHA512f0c2787eeb5a7eae2f6923090ae04de543a7adf15c3a9c9eb7429e91fe10b855aa5ac956837ee4c3264eea3e81a16cab6a71104c2bb2f4c5f59dbdcd202adb7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
Filesize506B
MD5519da45aeae43a3191235cf19e77d05a
SHA11a39b22e392b9d318b25b40ed1b89b530181e793
SHA256df34f7931d2cde4a977b2fe39344bb788a9bf09d2158d3027b5bf22ea0f4ac42
SHA5125d05363efd535f857f05807f6cfbfdbf8e77daead31ed333c979c6cd24cf4955553b0b2ed76ff0472d0b24dfa21bd4452f7cffa452e8d9aa65f3ce3c83494548
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
268B
MD5da9b631e078623734e105837bcc1cec1
SHA174be28d4c4b3aec4567e9565aae2a9b79c839f07
SHA2565bfdeb86729d47285fa7ecd78db9882a8c0de582fddb774be9b6248c102cea90
SHA512fe1d5c6d40edad5908464c34417ea76a58174784f51e21e068b39f6ecdafe705e1f63be485c74b4287698aae29af385891c1c91e6df7dfca34e347dbd12c9d8b
-
Filesize
342B
MD5886b2a8ab101e770da5b222bcc994e9a
SHA190d364347a5ba8ed836834d6465ddcaa2a59ecda
SHA256bd83713d896866b74c2e4a13f0f62a4c69d4e6544ce992d41b0a3c1482113c4e
SHA5128abe299fac4a2de4a1967e152ebc46534275910f7a1e36123fcdcb385b07644b910509229b439f999351bf461bd6f8dbf0aad04b1fb0561cd8a1c0782f050844
-
Filesize
16KB
MD598247c14d8a6b51887b4b19ffbf17718
SHA11930ddc68af6ec833da561b38596459d28025782
SHA256c2fbb37eb7f091888882a40b33d48af0fda9e0e076658309a4814723ba6db46b
SHA512695694bce3f91bfe51cd204477d60ca9067502ad192a84181b0902e1a7947e537855e379230b470215b41951c2482f29c68d3ed6bcb78f58aa57a2ce2c236a16
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NIUC9X25\favicon[1].ico
Filesize16KB
MD5717b138033a41361b32b60fc5062ab2a
SHA1af9841b6f0923f890f41feec52c94a0cd68f01d8
SHA256c70088079fe9441a726c66ce0e73ae38315ec80051d3dd542c41b82fa0a1993a
SHA5121985bf59c3ee8289bbe55fbe572371d1f401949e6a0179b35ca89e292173780956161feb257303fe9ff5fd2898ca7fd6105eb1796841ade0e1124eeb89aa70ac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
680B
MD57737c96c7e726c95258c21490884174d
SHA17a9a8976fd683c773c898659a4abd9ec5145ed15
SHA256f2e710be1c326b8c83c2174d4702931ec3e8d3d10e1093163ebf46a42ac09701
SHA5128747a153c7d85f8687215a78d9efaeac812787b1094ac7604707a65f64f879565a1591a6f0b651dee1f43231c91cba3a3eb969c33481a50e62d81d675210a768
-
Filesize
332KB
MD56c3ca744145effece919fba3755cf209
SHA1180b1a0bdd9362b2c64355d3af2e3f0da04f48d4
SHA256181d7b416877d93995e4c9d06cf86e441e5ee70bbe14ce674111ee4d180e7c81
SHA5129afe246f417dbaa96eee7ed2e620e6cea2038b3ca24c087ce39584a41c800a9b2209f3183777918e8d0cbce2e5cd22d033ca1612a7b7988f4c657641deb53b66
-
Filesize
508KB
MD55434903cbf712973f82963537ddf8973
SHA143b0e29ad978434084034ca01978870605dc8748
SHA256e6b8333c896974e1897a25b73547b3effc5f97e2342e8a2960c3b3408a015f44
SHA51206714d000d3ee9dc285a550cc81cc805936cfb10549dd1796cf0651e6dfaa47c6a792519314cce51d33472927f079b486df6617e1612a0adba0f2254be7c52c4
-
Filesize
2KB
MD5e0f6dbe2cb342fee42b1cc651cb7b02f
SHA1182bb600a4d7c33acc8b71ff5bea11d58d9bfece
SHA256f89cf27ea0302efd741e607647789b0643f01e1653e15115c73e3c7220b66135
SHA512dd91dda7ef2a7040bbcdcc43637bd1549b37478ada375054c9fe1197dfa5c7380ca31cedd9ebb0da9dffaea9ec772da814afb9575a2f0825c1cb84ada2c8aaa0
-
Filesize
89B
MD59fbee86be246d465ab3c80cc6540100f
SHA1486a26d2c927dd8e926792dd648f024af0cc3ad1
SHA256c360432771f7226f128a8d78a3386cd9da5464653b1b87296dc68403a786e9f6
SHA512aadd610d8bd6b413c6bf01944b0204fef3d4d741d7f39f29730ad22c336dafc101559d32f3761ca658b0319a1d8e0c303438f1c99d3477f3c14d497977dd8033
-
Filesize
365KB
MD5e0649f561c73c4b964cc16428fe8ccb9
SHA1e2ecb1ac6f28e6539ed70775bb0079f6a4dc1cc3
SHA25600a0f879cfffc90ffa428373400df2b187b2996156951e422811175fc530b9df
SHA512c46a7fa1a609b016a57bdfee0c0376ce6c0e25596a9c255ea89d0399bfa27b2fcded31c93becd9829e6af00fed64ec4e71ad8e7e63203a3c98c18e0e9b6e8f49
-
Filesize
10KB
MD594dfbde47509a777eb0cb9d51d64f7f2
SHA15ca5ecb55003e3511983e5cb9d7e148a00d06869
SHA256544d5380153d18116014a7161b00ce84e321c6ca7f733464ac806540f0924d62
SHA5121b99597857edf81081a6653dadbe4436305a27a12f7412b9553dda8b8fc2d1d9659a4df5bdc389b458cc58843048e37ef74261f3a81b90c1b28f27f2097f2cd1