Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe
-
Size
848KB
-
MD5
af1dba3233b6aa762b4d7d8fc56efb20
-
SHA1
fe10f6fb2bd1c7f1801c5508e00a58891ca90e87
-
SHA256
d268393ceb230c75510c3597b3dd01c49b483e3cec514929ba5f8e72ef2234f2
-
SHA512
e4b3e908d3f2bfc39dc40ae552278ac052eea19a60046845a2124f42e530cdf09606207918f9207cdb3f97aa82b7937b4f2ef466b7fff73dfe3a102a574ec577
-
SSDEEP
24576:nv6zjBHPZilsTOFLcMoYakjKnIHRHdM0fCX5:v6zFPolsTioZYInIHdMh5
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1620 af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000c020308453061ad1c2c56d880369cf49852323155c9ed622516dac782260580d000000000e80000000020000200000005dd564db21386b6df7e3edc960b1f3840e6420cb54b1901b8e55e5098044e6e5200000007ac67f5a24f75f76743b628748ecd9c74ff9eeab976a1670c0044233db83f4ba400000003ee9567fc93de6d742c5b9592840479b8132496147094faaa21cb8c9c360836c9f2b030f66982fb348855fd4eed439e2916f2fad5ea8eecbc49797a9161ec586 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430316759" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000095f7e39d3f8389f67404ab14a85c79f377c2a8e8906c55c0148faa8867622ad000000000e8000000002000020000000b6cc0964ead0e55dc5831d5825144b6dcc756a5762a3682669cf4794ae9c240f90000000fa1c90b08f8524454fbe0df32619e82fa32e907f9cf84105ea6bff2146152bf4a9edd50924029edf5931fb934ad21d636736c1d0db637eb2e4b22f8fe6256958cc9e927e8d89c3f8d54151e198e2cdc6e85d12753bc687eaf6a3d35ab825eb41b82e40d222d67700316164270cc38b149fddca1b8b6dbf19a9f648d873def8511578dcbd4178981475c20b515b7c2b4b40000000486a6e8fabbf27d4f88b867fc3a318a4a2e169629a839634d9f51504be04584f9315ec7da0fdb0b243233d7fc8f5f1008433d842196ab1d458ca8526dc400677 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{018779E1-5EEB-11EF-ACB8-4605CC5911A3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f3f1eaf7f2da01 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1620 af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1620 af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe 2720 iexplore.exe 2720 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2720 1620 af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2720 1620 af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2720 1620 af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2720 1620 af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2716 2720 iexplore.exe 31 PID 2720 wrote to memory of 2716 2720 iexplore.exe 31 PID 2720 wrote to memory of 2716 2720 iexplore.exe 31 PID 2720 wrote to memory of 2716 2720 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\af1dba3233b6aa762b4d7d8fc56efb20_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.wretch.cc/blog/st9660502⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ddbc0f2634fb7eb1ea85559d0e803877
SHA1bdd2817c998f683b5fe1b728de5c1b6c1a1e140e
SHA256fa913e6f85228859facb3d10a5dc1ce6e6c30e2782ad3ac7c0a0f49a42ed4e7b
SHA51273ec3b389c824d96eddcdcf1143f88496fd0c0e3a3c03c27cda861a64e51a6c0df65ee909e92c054a24cf3a617321c0928f5d1cf4de98f581c12e0e3196b4e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5464b3cb184cb41aef285bdfe0782c5b3
SHA1f22bb7aad5252cd34bd425617f267bf22b777f88
SHA256fcb339b62813cc920f06682205746eea690311bc954e409dd639da29b2dfd99b
SHA51203d5b4d189a45a47bda2527ad5e3046cdc41d21f5976456d9be52c607b8fb95d038dcebce3f69d167565cc9b9c75805d7338f5f204a2288f90895281f302875c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fd7b83cf5b7ab5e72000fe3f15ccd33a
SHA1a087d62c4b4aef57b95b50d1fffe3fba4b554485
SHA25622fcd56f3f4e97385d02f8fbe58a8d2b7f51aa8984877acb671506b8658d26d8
SHA51292fe532c639c575240117637bf1bba0f4d7bf3f0888ee806ef047fbc86b5cad4624663305c3962a7ffcc3bf4da87fed7d2ca1d39c5914a5fdf528b4f0f865647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5275ea1f4de1d399198e370a14ad789a5
SHA1a97f3b4a19b664697ed9cd0ad0d974b1039ee0a8
SHA256eb710a1756643d71d90c372eddb502a7ba4e445e12569e7baa89f9fa3a41f966
SHA5127a7951028941ba3d5154eeff5995ef2271fa4d6a9fac1cc061714cb3098560367a5723a4598739df8e53924638d4e559fc875e558ee7671023ff4070accec9bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c0b4dc39256ae063e5a81bc9de1c9725
SHA1da74ee86078ac323d1f35c9fd5c8ea48e4a7a6c6
SHA256e7926011f2f193d226e596129b76c8b6f4b2ac2cd709d2e8b6c30e3d86fc6e92
SHA512a05466d8bc603129331cd38f0f10a8aee7e7160cb7457b341c1bd207c42d6806a295f8ee76c83e3b8e1e208f622124bf6d553480191bfef2b6c4388091fd7cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53ad8bad8ef8231873d5d02763492b16d
SHA10d9b96c536cac0e4db4d17983cc3d43b3ff4c666
SHA256eb9b44169db8cb517dc47c1658a8b687db333b9fa0286b3b5960619524e485d8
SHA512d1c691cd6039b8a72d2e97210674b626afeeb3af8fcaed2f76846ba3e1d97e94e1e52273921ec8ac21cae7258d03ed07a80a82bb411a2da4cec4dbb1886c0255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5777702f224e84de68bf0f28bd5785311
SHA195ea66ec366e6816eb65a57f0b3e03fa2d29c6fe
SHA2567f26c9102cbd384e5b566493d82966cb556ee66a28ee3e944f08fd478522db99
SHA512cdd38d94ce29d22e35dcb514abfe8e9d501e70a898f8fd873bed301b569082c07db44b99ff20ca06fc14eba57a0519a4d902007cd6f2e0ee449ecdf745c68da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5949f9c58e60c3ec5b23eb0ba2f3a4635
SHA1d6e06eb96dca34daf110467855564cd57aa6c00a
SHA2563685b1cd337ff838ef6460ec419fe18be3ec597b9c1eaac7a8ffefb6fd0eb476
SHA512bad269038f85825ebc6267c05d069e767c96736ab9bed54be438c7615e42068854db687714d91d378e805810ba6e8155ac9b79fc62bdf8df7d288951a8b81bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53fd2d7db73b3a275b36f68af24a832fa
SHA1b1f6a89b895a5366276fbcb32558578d35d40a8b
SHA256d840dac7d013614514e73dfbf905878207cde2a856d7f234806ae24addd4e887
SHA5121484b72fdef88d6985a6c6bb84a2ca33ef0391e45bcff46ab494a3da527844a1868ba9e3b74cc0bcc8dd1a2d0327570c38f698baf4a067e0231c3d890c04698c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58365e58fa0f07fc39a2f985298d9f39f
SHA1235c9aedb149fd001cae25527b5fd533dfacfa98
SHA2567b5c678ace0f27dc41481d0be989d43b5724dc8853de2883522bb558e085c38b
SHA512c6032bb473410026d9c9b1b47a8d1c62dc3ef84bcf4b31cf2f8bab2aecffdf1cee3809f11f0aeed3ef900c91042d6cff0ae8d0689546387cb51fca92bf2f8985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5373670af7f6c00ae5d2d2560f08f7d12
SHA1091f558f5d65264e3d9275153c2a617c46103c44
SHA25623d165adfc947321c5d6f60ea4ba2ae04ea61c8ddea3dbf257c3e3151a8cab01
SHA5124d9e6bd6a8df2f7bf21b3fdabd120a2e501c9aa89e77bbb4e43c6adc79aae3e3bfc4e2f7bd6987ac5ee0c8eaf8b5a3234520e0f30b25e2abd22851d90690fa62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e38ee0c74130fbe57c66ff41131b9337
SHA1f5c874123b1e35d25638dbb9f7de48f51fa74916
SHA256a53b2200d967e31142012a057e3bfe9c3907ee786e470dfcd0b4ed73c301d45f
SHA512d782329964b617dd50b7d0d366a83fc5d7f22e80fec64a88ad131dd6b383610ffa9873eaeb85ec818e0e9b754313a2d73f5e8608dd6ca7b36c04e95a854c9bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD572ec9fe1724400d6f6e6dab28b046907
SHA112dcc443798c17604dffbe3c92bcdfab4f47d2dc
SHA2568a0b7731a4e1bab78ed12a1e32dea1ea658deabad9e412db4cce72553c95eaa4
SHA5127e6d728757fb3707765f29537dbbb964ae3955b09f003c64618d3b926e145f651f1382e723759e9d4fbc7150295d4335c7433b87d4fea18f406f0469a7f25f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597642b2a617c38c9ed4243d67a8c3409
SHA1649ae36f1aa49468a04f49d26fc26bbb68af6512
SHA2565220428a8bfb7666456d9373f52b3a0b7bd6393c11ac5c75c6b73734424d9025
SHA51213d31d0806296c0b21596cec7f1d6db8296ccec23fd9de83f4becab3d9943be9930ab3717399e140f047839294d3669716c0156832d23d214e3ae68b49700088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD559933ca7cb7f4b66195b726959164cae
SHA15c0858d515d79a310973913bcc5b9ef7ac3579a4
SHA256062c9ba910babcfd0ed7ac4fc8500b946c3bf58a728dbbf3ce3049f8950dd606
SHA512a0d7b898d7838272f05daf7e555fc42f1ff6651bde3e7fe3f74b4afae178ce11122fdb00fa4385cda16fb9beac1af5618a85971c36ceac882387806223591c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5645e52cfb0f8e3267311fcf62f74727b
SHA1a653f6f5f420a80d6bf245dc554fbdf57381c9ba
SHA256a7b34251f1d51fa02bc8e6ef8629d1ffe4e0c522fd4c4ae48ee4bd99d9b90719
SHA51221f6f2b39f38ff2c525ec999c38301d936968ed2538c22c35aa5c8044609beac93521e9c5826eab6b8e09d053cb30318028ff3379eb93afa3ab56b4c4af2ff08
-
Filesize
1KB
MD5058ab93f59a7e9b5938a30ba2b91ea7a
SHA13ef3ea23c2e77edb7cf6c3ee66f67894b9844fed
SHA256181e0f3909de084082a9349c0541a012225f9bbeb0a70f83487784b826e66f9f
SHA51204484f10f9b60332d44793ef125314716e215ac509c2ca71c5326653c0e1b5a36ebe5818e9dadc2179f14aba7187718b224f12ecd8b1ed5caf61d851b9f75618
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4UQ4J2DQ\yahoo[1].png
Filesize1KB
MD5b6814ae5582d7953821acbd76e977bb4
SHA175a33fc706c2c6ba233e76c17337e466949f403c
SHA2564a491acd00880c407a2b749619003716c87e9c25ac344e5934c13e8f9aa0e8b3
SHA512958268f22e72875b97c42d8927e6a1d6168c94fe2184de906029688a9d63038301df2e3de57e571a3d0ecc7ad41178401823e5c54576936d37c84c7a3ed8ef6b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b