Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 11:15
Static task
static1
Behavioral task
behavioral1
Sample
a69123001595d5c2df2e3ce6d86a783f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a69123001595d5c2df2e3ce6d86a783f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a69123001595d5c2df2e3ce6d86a783f_JaffaCakes118.exe
-
Size
25KB
-
MD5
a69123001595d5c2df2e3ce6d86a783f
-
SHA1
a314a55436777d588b33abe292cc7362f5e82707
-
SHA256
603a0388f0eaeebc1a99a07741e797de842b1192eee07111d0feca727bdab807
-
SHA512
fd6d38fd07f2c9a6eb0cf29d1a3b57635e48f1442b1db5f50f36ab28cba020c8e8e84910a9e4f123a37027d0e9730fa0da943ffd7d8c0c58de03df8646634f3b
-
SSDEEP
768:eAHKmM0qauedFQFtxTXKXAx6ZQgZOgRT/7DqO:elmMyTcTXfxhgZzTSO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a69123001595d5c2df2e3ce6d86a783f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102c20f35ff1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C853781-5D53-11EF-AC2A-E6BAD4272658} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C8798E1-5D53-11EF-AC2A-E6BAD4272658} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000571e399a8e13be250f6a97c4fe5655abb38d4da2019b6e982844d39338bfa6f0000000000e8000000002000020000000938ed232611a6449d5971f6bfe4ee1cfb2213ddf81991f852ea8c2e6ba80d4ed20000000386cd67d9ca71634b0723b0b5c48e5d8b79509aed397a722f6b03aa37499cf0e4000000036d5a30c1061e267e3b9ef739c426f599c318dc13b50b8d8c2dcac1989f88d80ec3a268fd230b7a5b1d677c9d4e179761865fdde3bf8cf8fc936795adb425972 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000086289ecf2a158ca5cf36cf11bcd6d829bd97f1df8ec9fdffa88d38c45405e524000000000e80000000020000200000001124ddd61967eefa8f84a5476cf30253cf8e69793b1673e9b1139538b6602969900000003b8f7d3110531862c15dd04340cc3214c71b2f08ab591ec02e5d11bcc4891e448f350f11105ea37d9495b5f9f3e7248db24e36995e8f98112645c16ac0eafdc19a48bca3e7860a0c28d39794033940827721126648747bcb3ec2b733a7fc3fb3ea1671066147f7fe77625b70ff7d073b6f1b8335ebbc2bc7a56e113f5861f39d2e5a2bc0f1883d1433f578b3047bc4cc400000005ebfd6e2cb57fd2fefb2a6327498c058482a18007213faf51228548747b3f4b761230c5169ffd8b5437d5aa4f72100cc7c0805e6adf5d4cf6f82a5620308f517 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430141570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2452 iexplore.exe 2620 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2620 iexplore.exe 2620 iexplore.exe 2452 iexplore.exe 2452 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2376 2120 a69123001595d5c2df2e3ce6d86a783f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2376 2120 a69123001595d5c2df2e3ce6d86a783f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2376 2120 a69123001595d5c2df2e3ce6d86a783f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2376 2120 a69123001595d5c2df2e3ce6d86a783f_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2452 2376 cmd.exe 32 PID 2376 wrote to memory of 2452 2376 cmd.exe 32 PID 2376 wrote to memory of 2452 2376 cmd.exe 32 PID 2376 wrote to memory of 2452 2376 cmd.exe 32 PID 2376 wrote to memory of 2620 2376 cmd.exe 33 PID 2376 wrote to memory of 2620 2376 cmd.exe 33 PID 2376 wrote to memory of 2620 2376 cmd.exe 33 PID 2376 wrote to memory of 2620 2376 cmd.exe 33 PID 2620 wrote to memory of 2616 2620 iexplore.exe 34 PID 2620 wrote to memory of 2616 2620 iexplore.exe 34 PID 2620 wrote to memory of 2616 2620 iexplore.exe 34 PID 2620 wrote to memory of 2616 2620 iexplore.exe 34 PID 2452 wrote to memory of 2644 2452 iexplore.exe 35 PID 2452 wrote to memory of 2644 2452 iexplore.exe 35 PID 2452 wrote to memory of 2644 2452 iexplore.exe 35 PID 2452 wrote to memory of 2644 2452 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a69123001595d5c2df2e3ce6d86a783f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a69123001595d5c2df2e3ce6d86a783f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\8DFD.tmp\PaySafeCard.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://q.gs/962182/free-5k-paysafecard3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://q.gs/962182/nx-25k-code3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2620 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50f82d780fd4f481b5adac0fff51f7442
SHA1d7d0b02f84c8014b8f81b39b8732cf72ef5af235
SHA256c4008ab36d2e4a1ad8051d10d09d9b7db5fefba3ec3f4e3bf24e8a7db9839a43
SHA5127b975865ed4caf8c2b78bad307edd7047b2eebf9614a6bfaf82fc1b01a92f85e03d9c7c7e50b691f301ec7482c55e7f658310b7358ca665023a2e696cafb2cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD56b9b84bbd6fe49130120034efab28ba8
SHA15c08a56bd744453f69aeef20adccfbfbe2cfce82
SHA2567fed5fdf0f4b394bda91ac1e3238e886f56d164561c43e51ab338e5fd7b0ada5
SHA512e43f37b4306368fa5c2ff0e416ebbb67e02d831a041af73cdd54d3120575d7a7fc488ce995107fcb90ff59de05bcf6fe8852c965dad5fd016ca2281a6eba118d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f68f59e848c70949e67d71efd8539b1
SHA16ead1bfd1ca503a8eb13bd420928faf5ae5f8272
SHA2566d38fbe299710c03f628cb564e4f753efc1a1229a25a0dbec47837e961d28263
SHA51228b2cdba730c5167362856026374a59a8adde23dc920a4155843d30d71d6d7ad62e4d395cb224a70b050bd9b7bf0fc12981659d0d73f6d1dc3d410f0458778b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf1cf8f5916c7ba0d38affaf4e89ba2
SHA199504757bedc5d05f68070f8d85ed154b4db965b
SHA256a0746e7f538b4c7f0dd1514350d5d5cce7fc6103588c11cb4253fae6f6b15fa7
SHA5120f241e753892128bf91a8e4d92d05751b7913d925eb89e397e0aece50d6ce21beaa57258d93a1921cf901af66102167d522dbd18f84426eec457ea17596e8a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1dbd900c0458d874e145cf109cf43a9
SHA13c376e1e3cfc4001a7fe4813c595c189303ce2e7
SHA256daae722de2c1aebc1d6bf848ce7fffe63de9cfccf3e66117c18efb921d596bb7
SHA512907c4c2028582b8cf8fdcb626ef072b6ba56d830011bf1960b1963f9b1bebcbb3fbea3b8d4374b1843603a04633145641f5cf9d712ce53e8d48083c1cf1878ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50394b3378ce8d19b3da3fefb37cb1442
SHA101f31cf85f0153e9eb6ef4a8d6152138cdc059f4
SHA25689be3f87cd0ec245ec87507850aa8dfe77b1011cafdd6a94eefa55989037db8f
SHA512cf1217540842299252b42b03255286a99b5652d65968b79f9f38ed1feb30d7d203c0a83fbb0472621ab17b4590d1bc7b99b57c81445f122a27338537e203f3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5174a5fc3b7b096fe327f8aa9d38b873b
SHA1b311dafc9fa7534b649fbf8415d6962bae4ede16
SHA25689903da6ea703aa435472e157720598a11dd0c5dc034817618090a2885c25895
SHA512982934a5fc0809fb177cc9588ce328f18720d28f498094829ee3dd287be6e78b9702011bbf0c82aaf967d033e0fc5d6f33d29b797df82f8cac8c3b62d931a151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eeacb509f9ceeb2eb1c6bdf9ce7ec6d
SHA10666d1134a6de4640ae15b4ca2afd6bfd7133e8c
SHA256883e0e1286cdee9b42d3c325fe8a675fa913fe687146f31bb7e2d9ad799ffdd6
SHA51205584ede017644d5ef8ad5677eb85628cfd1763d18b6b94027127dcc28779cca99a6837bc5732f6a3ec57ea9990b7d589d1033978db2cde3352a8730f844ef96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee58347aad74d14a0b6b335c0c4b4030
SHA1e8a7fc825773db117b32bb744a0e1dcd25252b5a
SHA256575391957868d1ec20c2b107c90109b4c0c71923312edb50c468801bac8ab8b8
SHA512d2f47b67f496d5220e520b291ad4bbf177ce5cea9ac93c3d2b474610f6d3097d2c7136ea26dd6c87c704fd7de640bb4c12e8ddcb46e975e506c5a09cfa181a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55944893d83eecb462c090e164c509aa7
SHA150d0960380e5129a0e8aab81ebc0927457458622
SHA25657f995226576f54f455e3e362eb75f9b1a20f3e43afa6725004361adfba4a5ca
SHA512664f3bb30f93c0a373436bcd1468c9d33e50d484879cdf11236cd1995942c7d477f216ac0e2a5a89d045ca5acdefb367be9becaa8aeb189e2337adc78462cd2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd27adecbe2b4576bf658ae934f1797
SHA1a9bb25f70d354445a8ea2a6b9b0039a68f405552
SHA2565769a0c3238aba1daf77208c3e5219d5fb7be0d448421940c57a080ddb67dc5e
SHA5124dc8c5a0ba078cc9c37839802d98d674973d11f49050e537d570d55ee5468ac579f004bea110c62fc8350e283ae72ae8e64e932c77a1133e15e4e57fcc5e6bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597dfe777f127c87e792d20c8a0df814d
SHA1794c491b71a470d99cecd556adb3ca9777c4950e
SHA256be5834fb19f4de242442a6796605d2b2bbe6457c0be80bd67f89e94b662523d8
SHA512a2c7ef1bb99ccab647d4c6da299d942c254b9cdf3c72e7809b6debfbd3f6da9dc66ced32045be554f4bd1c64d7cac68f352d1d167214b51b742b9230255d56e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa726088f8d7f4f7a32c0672c1bca04
SHA154042615383152559fcf14cc282a7bcad837b5be
SHA256fd8705836b3426d6bda19aff0973c697ecdb69aa496d195dc7ca55d91c19de46
SHA512d493fc37443329c27dddf5eed57737d6b8c5d30d470da93adff4b540cf730690fbe6cf0355c0d461fe92c276a167d57ecdeec00975eb663ae5191068aee8d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d51fa13427fee0f0d3b3365cc36e19e
SHA1e12a25b2d2256c43d0867ef10e25860964315d67
SHA25689ea323d83188b98d797617393ca1f8b2fefa8514ff1c1442df8bcdb96187d89
SHA512f210ee5437bd1d0fa5b26ba42b767ec9047a305fe4c1d29d61f6a01f7d35f2cc381449c3f39e74f7cc8c22992bc84eb13fad8abdefe8895bf5e870b1421885e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54b7bec3a7c8f1db9576e0bf27c9b6f
SHA1ffccfe961fd1b3a7dcd25b89bfa47d5ba952e031
SHA256837d8b373c282539fe1f07f8bea81a101082aa962cde8740c50badfa5ab722fd
SHA512adf9815184305a2084388fc23e47b733950e73b47a9edddf8d5d90eec02d90ea503f37d628a8096abbd0444b7e6da0c76fb792b266c989a1bb83eb9b704c37b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300dad27ca12496f02e4fa48b40e4ac9
SHA11e96cb252b0e7fffa55320dcf20e27117b21176e
SHA2568d8cceb87feeea808788c62f785ce449dfd275e082532ab4b2d550127b32f81b
SHA5125813a2e844d8ba9a71a7397a11920c6a7691e6ef0d89be32d3e66654b51849865b28a0781b9166ad2da06aff0e20da98de0f302d6651291bfeb93d688d11c0d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e718a1942ab34444f6df6f73df896fc
SHA1cd3f01fa82cd93f12c4db37573145c03bf225639
SHA25617124ba009bed2bcc4e5c265030611c0af365a87c675c12d98531dcab06ac002
SHA512c8a76d28aebb3249873895c60307e67db1df1e2bbd4da2bdddd6299edf9011d6ec7aa7ddeb94dd68039dfdf37a4315cd7cdd0bb858041c7b4a002c982ec29410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3debdca6f92566ef024c68afa98e918
SHA14c91a13e20067e86ca6b9da64bf986fca5195a19
SHA256709134a4ae384cd01b3991d15ff1792c89fbcaa225145484fe3de1de1f0a2aee
SHA51289ed53d5f9cc8b074620fcf0bc0886a0a3bd4a6a351d8f6eb53b7f5a1739632e548a1eec1603d69d9ee43ccbd9221d3d916395adc6afe03e9b8f88f018194b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b243aaf23a291418a309acfd0cd7c12
SHA19d83004a6e636e7c9b6a13d9d3ca1519939b185a
SHA2562adb3611650432620f56952300932b31da026201590a66de1dabb490f4b4db90
SHA5129eb4f4783cde6eeb9e16ef4247f01d6384a1a60ad0e7ca1cd4f5289c81cb8e3ee4e9c48e8dc299a57d0977fb7861c9cf9cebadf3a327ff9f777cfc66eba2a5af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD525c4749699f8222fb393d44643eb8416
SHA106da77ec457b73ed2818c23fc963f76f29c1f6a7
SHA256f44c585de5199836d99f6e4dfea413fd61ef318a66c1d27b6010a7804b31459d
SHA5127dd51c8d1ff11fd3263b3e209691d8d063fdfefbc804b4ee6209d82f4096408c6e96a18bc27f44226e6513294763b1fa79366a0b4dfade865201e420d76883ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD54aaa19519c511ac1cb541883cdb89ed6
SHA1442dff524f7f347eaadcab2397680bb34bf5d26b
SHA256d1d14d736da8773d8b2779a613085f310e7ef6a927e03eab4e0e610a9ffaf7f6
SHA51255010c7db77bd20c30ef01f97b1c7a24eab8fb063afaa44dc10919149a1d333c87ccc6080bafbea3eb2319fabbc8f9cc780609bb86c78492fe2d1ac05f0a1149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD574970fe4f39d64314b7ef065f1850271
SHA1f05cfa12abd281d0d4c33a5063132f73556e47ab
SHA2565a9c7f8ea482f0dc9a456c771f96e2a18dd777e1cdd92aeadf36093824968fd6
SHA512c3db973ccf12a36592e7e818b5d50ed4ac51b0f1e8a03cc5a7a561c79aa77cfaa8f56ccb1878ded11d6b60e37302d18bf260331d0c3b72c8d860b7ce5fcc995c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b0f3e018ee5681ddaa543599e03bba9d
SHA1294b864909a7c880cb40b4ddfc67e2a70c762034
SHA256ce112a6dabe45914ff4d91d1641ed8bd7aadc0076ff33d312231150f0db19de4
SHA5122f25e76a449ae6057938c26dcbcc336691d30ad86327cd5ec4e0a693c19e30065a6c715e1a9736c7c9879ee4e76f88dbc56dfc376084f020563bbd3268866d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5138bad053e57e99946f7f61eacec209a
SHA1bc5c81c12ad9ab208068a010384bc3b371b7b756
SHA25631f862368055baca31c5e5cea4d37d02fc8b55399e49b9e082cdb7bba536ef9f
SHA51290be128cfe50a1588c94d29bb67bc82ee1d83755d1732e99ff1dc9e5eb31613e604871a613ea10d52ac951eba7dbec879d3070232b94cebc06d7788790d4fe36
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1C853781-5D53-11EF-AC2A-E6BAD4272658}.dat
Filesize5KB
MD5bb99b5336aa86c41bb4ae67307027eee
SHA1552e44e33f4ba7280a35dd86198cf22c63626c0f
SHA2566f53e9bfa06edc353df6c600280d64ed9cd0bff98c2db2f845bdead135a714b8
SHA5121310027db3ae6490837c69a9f28c22c4a94c9ec5070da3b7499887b3a9f118855cdf3ee0b033925f9b27c9569a60118baf7d286d15e83c1764d8500bc4c57837
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1C8798E1-5D53-11EF-AC2A-E6BAD4272658}.dat
Filesize3KB
MD5e2421b45b7039dbca5cadfc04f39b82c
SHA1fdce088fa7875a527ae01b62e95009a151058b20
SHA2564b6880002c08d1174749d48857eb35bc74ea7ec7e4d7a0b873e4d62b518b9199
SHA512de40797a514c3296cab7b6a7eab0406d65ca70f304a177b9d17c21899b21a9070e857d35ea4c25dcf1aa27a253a6f256cdb19b7df54e2ed91c8ce91ad8bab198
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\cf.errors[1].css
Filesize23KB
MD55e8c69a459a691b5d1b9be442332c87d
SHA1f24dd1ad7c9080575d92a9a9a2c42620725ef836
SHA25684e3c77025ace5af143972b4a40fc834dcdfd4e449d4b36a57e62326f16b3091
SHA5126db74b262d717916de0b0b600eead2cc6a10e52a9e26d701fae761fcbc931f35f251553669a92be3b524f380f32e62ac6ad572bea23c78965228ce9efb92ed42
-
Filesize
177B
MD5fee03b64a6855a41d49785da6c0c2fe2
SHA107c6e6430cea45bd4552c3e1219d24a509d19338
SHA256c3524ef5a73582552bade2130d25dfba4b667c6d7a95e8fd545d9e9867e3bb19
SHA5124b2c32e0182c2ad4fb82e2dfad2b782e4c85937d27b2c4b57f4faa303e4a0a0331a8e002731576ba45fc4dbe1bb1ff022d158e0e3e1e79597de9c3b60d1b5c2e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
221B
MD52bbe13aded685b59ca5900efe33212ed
SHA15f64f1426dcd3dfa4118134bf606d06f5fefc009
SHA25667d6a4139cbd21acd082cb031abab2c1644a94e74ab0bcf7bfe7b2a030e501da
SHA512047c52c27c67272858f8e92f373ad0235f954c307a7078b62f8bc54a93454eaef0d0c997bf6a4ff89b1510894d12849f9c1bf52942073a8d231c79713f25fa9b
-
Filesize
221B
MD55652a7927450cb64a2c3e48f1c2c9547
SHA140f7825ced81452eefe83a2d3bf1b4292e5300cb
SHA2561b73634927470a4131bc51fce1b30adc6044cad2be0dd2ba36cea2f013dc2e27
SHA51298267163a060590bfea574c18f25202a661afbc19b59fde652125b1004efc6e7a0fa9fcbf946e05e7f8bac6eb64dafd6d0bbefa81332ce6deb32492296c97441