Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
cddba6df650c4a62f37e899118639505_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cddba6df650c4a62f37e899118639505_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cddba6df650c4a62f37e899118639505_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
cddba6df650c4a62f37e899118639505
-
SHA1
717144bf73eb99c7bc640571696d6669c9854778
-
SHA256
553b775a4c5535e7027cb113d94dec5bb9cf435eb2945135c8a0f0137a5e6d69
-
SHA512
67b76fa24e270c5da323dea1aeddb3e582f4f906b42b9fc21fc23a29c1da2f73029bd201d535fa0a43f14f49f4471243735a57272a6b757cd995392d8a885645
-
SSDEEP
12288:HsM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQy:MV4W8hqBYgnBLfVqx1Wjkf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1296 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cddba6df650c4a62f37e899118639505_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1296 cmd.exe 2488 PING.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6079ebae03fcda01 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6561C31-67F6-11EF-BDC5-D61F2295B977} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000b6e8540095d26a666e8d662d69e6e36101106200651300ef28b7c7fa204b3095000000000e80000000020000200000003fbfbd2a6baf444283a2a58f382d55f24d868c8ee770e03ea89cec3771d4bd6620000000d985b73f646c852b360d88c840d1af302dea0be4f3c196777ca2045041ca136240000000c20678ed41cce731efbb22693001239b5b2895e898ee75eb8964f9c9e019538e5163d497e54073d763c3a2116c9b255bf4f831399e9780e32278968dfe1865fa IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ cddba6df650c4a62f37e899118639505_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DOMStorage\yourpackagesnow.com IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\{D90B0B0F-67F9-475D-A600-7EB45F5E76A9}\DisplayName = "Search" cddba6df650c4a62f37e899118639505_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\{D90B0B0F-67F9-475D-A600-7EB45F5E76A9}\URL = "http://search.yourpackagesnow.com/s?source=-bb8&uid=d40b88df-0daa-4a9b-8ed4-7fa5ec0c32b5&uc=20180109&ap=appfocus84&i_id=packages__1.30&query={searchTerms}" cddba6df650c4a62f37e899118639505_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DOMStorage\yourpackagesnow.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\{D90B0B0F-67F9-475D-A600-7EB45F5E76A9} cddba6df650c4a62f37e899118639505_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431311401" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\{D90B0B0F-67F9-475D-A600-7EB45F5E76A9}\SuggestionsURL = "https://ie.search.yahoo.com/os?appid=ie8&command={searchTerms}" cddba6df650c4a62f37e899118639505_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.yourpackagesnow.com/?source=-bb8&uid=d40b88df-0daa-4a9b-8ed4-7fa5ec0c32b5&uc=20180109&ap=appfocus84&i_id=packages__1.30" cddba6df650c4a62f37e899118639505_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2488 PING.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2736 2564 cddba6df650c4a62f37e899118639505_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2736 2564 cddba6df650c4a62f37e899118639505_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2736 2564 cddba6df650c4a62f37e899118639505_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2736 2564 cddba6df650c4a62f37e899118639505_JaffaCakes118.exe 31 PID 2736 wrote to memory of 2700 2736 IEXPLORE.EXE 32 PID 2736 wrote to memory of 2700 2736 IEXPLORE.EXE 32 PID 2736 wrote to memory of 2700 2736 IEXPLORE.EXE 32 PID 2736 wrote to memory of 2700 2736 IEXPLORE.EXE 32 PID 2564 wrote to memory of 1296 2564 cddba6df650c4a62f37e899118639505_JaffaCakes118.exe 34 PID 2564 wrote to memory of 1296 2564 cddba6df650c4a62f37e899118639505_JaffaCakes118.exe 34 PID 2564 wrote to memory of 1296 2564 cddba6df650c4a62f37e899118639505_JaffaCakes118.exe 34 PID 2564 wrote to memory of 1296 2564 cddba6df650c4a62f37e899118639505_JaffaCakes118.exe 34 PID 1296 wrote to memory of 2488 1296 cmd.exe 36 PID 1296 wrote to memory of 2488 1296 cmd.exe 36 PID 1296 wrote to memory of 2488 1296 cmd.exe 36 PID 1296 wrote to memory of 2488 1296 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\cddba6df650c4a62f37e899118639505_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cddba6df650c4a62f37e899118639505_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.yourpackagesnow.com/?source=-bb8&uid=d40b88df-0daa-4a9b-8ed4-7fa5ec0c32b5&uc=20180109&ap=appfocus84&i_id=packages__1.302⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\cddba6df650c4a62f37e899118639505_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\cddba6df650c4a62f37e899118639505_JaffaCakes118.exe" EXIT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\PING.EXEPING 1.1.1.1 -n 1 -w 10003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize2KB
MD5bc5cbbad23c619ee7cc6d2ebd6209291
SHA1c1d219acf5e90dd42c1e9d250f0adeed12f80850
SHA256820287bf6ad82d4aee58e8a0220399e1034a9e09723e33751b9029c0e1cc48c8
SHA512fc5a56503678cf47c3efb8f4dc7d59be5c054df752e86b75a963e76b441992fed1ebc32aec2566921ed44c8664763e39fc388598dfdfd95c518c65f8b671bd7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
Filesize1KB
MD5917115453d65a12f9c87aef4b08976cf
SHA1644bd915d3ade69344e03b2ce82bb8e16ab4be07
SHA2565a20a2e815446ef4813a7d10dd5cab3d2a827edc31f10d286223b60bbe0c8471
SHA512621f06321fb26fc4d1f961c51ecc4d04167c484bcdb9f09049866eca92cc503535da8d8fb7160c01331f3f530b55248f44b9d607178a6d9643c5c6bc7b70af6e
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD585fb3b13bb8dd20415629a3c42064f1f
SHA1e8db4b57c231e41c9579a3d869ef396e61859972
SHA25683ab1ee08377ef4ce0b205abd07ee76949b35ff0855d61aac1b6e2368eda0f47
SHA51284dac8ea320018b76b19a61e7082711a848d4851f1e1f7b66c32790596f17396c054781d5fcdd03fa9554b9647d55a5829d3d0d58b404de7fca857299c82b90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e51ccf09a91f0997088474a54f758f89
SHA103bc0f8c05811e2fb130e6676248c5bbe6b73383
SHA25663cffe231fe6874f7cc4bcf0442a55719d215dc1c55148d637cbfdb9d216fede
SHA512ed57ab5e3b0b2118cdb1a20f2603ac76013bd7fec053f6d4f7e4405782a9b14b531c4d7d73dd96a1a410ba9943677de643c39502ed8920fedd98bf2cdcce7440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5de3592aebaa9067a4d907a46d36fc003
SHA1a323c8d7623dc4b450523195ff867efac2b29fd1
SHA2562f15874af1f98c3b61c7dab9399380acfe2a39fe48c2e08fb5e987bd1572f0a4
SHA51200557cd5e24976851d63431af3693418589321233b7bcc068317fa72b3d71a0e3708f7aaeaf5717ec653706957f7310b2839e93032ac729ce65466691a5e6102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a0f343d795ccec094d25482406d2eac2
SHA1e1218889c9225b38bb41872ce36a31b179ffe001
SHA2560bdec5d66724a5625eaa817cdbd034d3bfab67b61ac392a25a4b03f946aebc5f
SHA512c86d2becd1055e2225d3b62bc8820bf34dfde9ff0dec85eb608469a2d17fc3244b78c60841775b8f184a6af79176b92ab50fac6f0bb985992a0cffa4b5562ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe3abc8094a1add4f231f2388927c028
SHA13ea42be00a1803ff6092c883d5396f2f4607e681
SHA256a732fdd8879159adeea3ab81930fcaff51907b2440395ff8866c9fb49ddc2f07
SHA5126229033d97bc5ea49b1eec84ba15ea62366147cb61a9dda7e55c8a08b908a14ae7d1542fd38b54e708822ba627ddf8389ee85c62f703a2d863d7eb4d39cc2142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55a0c20b4ef47fd1e717f248fefb54b16
SHA12bf3348fcda5b5e6e47c6955ae96c59f84d7dad5
SHA2567b5f706c2eadb69663b4e33af9bf989a9ca1e1eae751fc3eb8a50dd2b31f0cc2
SHA512e37d37540d0a41b4a0b4ce2c0db399c49d11797de83f73865aec58cc62ddbf0c4f4969c8f89613d6a2332552489f3b7bdfd76c27f6834ed0129a7afb36745f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD537d8a632e6400559601f64e15171fc9b
SHA1da163c19a13a48d763633b25d0d0fce3efa39aeb
SHA256604140a092c7041dacb243b90763a969446b0f3352a2c8ce482da839324d2857
SHA512c517d595d7d0f6815d5ae7767730a1e2abbae64d6af88a6d70e7f07f1ab3e97a39c9f528abff22e866e5daefa28894a81750be5996f16f672d55783228457546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fad076f449623b10e9f26ad9c8205dd2
SHA1e88e906e0e31e8cd90ecbe1c20d24343e3bc4f92
SHA2563e9b42be706c1ddd271b297011babf37f47d751a0cc6c7d7eec2dc6b657725ff
SHA512216f0b57ce0231c87b5ca90e0ef91d6f42b46eecd2089a5184c46d6617dfe1a8be2af7ac9a562bc786ec333feafea6913e8036e00a49180311a244783a74cee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57cd0f5085522f8ff7a72a589cd3cde99
SHA127f2f1b0a8b956695ad23c8aa74ac1be051fe53d
SHA256beef979dd3dede295d0955f2d8a4cf6f0202a468dbd5bd8644a935904d4fd705
SHA5124ef35e7b51fc150d42e579fa737f8de917f2828a6452edd5a527af881a13014525a41f471b7d7f06ac6de58da4a8ffa7c797cc3fc4639f76351decb4ba455ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ac3123abb33e33063a8a1df58dfa5edd
SHA1a39c5c783d0975cc57e06b3cf53a9dddef19c936
SHA256ebac5a779091760d4aa7ca07d91e76d7f447da95933c420da361bce55cd6e6d8
SHA5123b85a1b3b1a86af9a8ea971a1ded09e893c18d2801bb1a7809c156fa1f50d6fa81be93501ef7c5f5a2f38142cde7950fe3667af520ba8862e4c1bed3de42b4e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e4f7a04c4c299f5bb72464bf07231182
SHA1a33f91cbafb12a70d9cd522d8d56a128050b05e7
SHA2561b45224b475dccec8e363bc77c0e97995a97786502cd5b736ef48441cfe50fc2
SHA51241f9ec87f6320672ede1b80eeb552188789b0020a7e7d1e4d6a842afe2d5e2229932abf4d37f4195b9b1cb3697cf53f3a56b45cd54497976b578c74913e5a23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59582c1e11eb38de98411a4ae82a0dad8
SHA125c12fb1a15b9e234d51c228232791f674645232
SHA2561556071971cf965bcf4080a5cc06936aff4dcd6690a32d8de0492f4ecd13a992
SHA5128753456ffc6041a865e1a95cb1ac6f8a370c96f12febdb371a75737c1c7a8c1786d5ff3bcffcf7bfb856b821b87b6a48ab1a6dcdaf0967dc53f889cbf6608345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e1d619d92fad729d550854848bca2db1
SHA1ca725cb74b6537e3e20ec245afff04dc05943bd1
SHA256ceec9a6fa125dd31beca3eefd593593dfb7b96e550793d9dcec95f6d92902649
SHA512273ceae23e09d53824067bb1e768834bd7fa15167115bff2cda851c5ffc84ba5f09cccb9d89f70b7fec5380dae1ef6cb5338378bc4401bc6af0dfc4dd22a73cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57907bcf52ad3b8205a9bdc9673c0dffd
SHA12fc0afc0ec7feffdee3d196f79613404cb56b4f8
SHA25673cb5e7aef3764b3434b0e683ee5b3be945a262e1d6d9d8a564602fd7a8946a5
SHA512d1f993a077ebb7f0d9672bec9bf6b7b6bb3efa3cf069edd42e5ac59e526d1c87e0a369e497febed8b7d1a3b922eedd876c4613a563a46d097df6f85b28d00826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53476894b54e36fcc7ee73812a940447f
SHA16b29d8c36f1e372b2da97e9c28ed28c06a10bb85
SHA256b5ff1b6bcd7a570bd720907deb64be76aa7d99d197be08375a624cf08ac89805
SHA5124f65bc70a8fcfc0cd2e2275bd60881a8629af645466d00a8315836e6a22be8d68184fc6976385170d70f67c5008bf780177e579c732518adb2a2c058845161ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed2dbdc841471bc42cc60ab53090bcbd
SHA1aede0aeed013fcb7c330142e93aa43ca13a88383
SHA25609109ce96d5a25857143caf51062334f9802f5518ffa0d4c4222d9b35f6c21fb
SHA512fd04e9ea7a45dc6979102b2860168bbc3682bdd8ad1ca29b98e2274d37192d54f3b455d74904d70dad2777a411ea6d8ec6a2716b4bebf187e62b8816404890ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d758143ce548a9d59a00496169c5ac8e
SHA15b3f2ea7a8c7fcb4dc2249816ca3ad23ee14b95e
SHA256057b233bf7cfaa91d85d5dec0a9476b2d2a551a266f4ce3eb89d68b3825f1a19
SHA51295338970fff2a01cebc23d9d5d8d5413d5a662cdce08bcda1978886391d3b73aaaeed01ab135620c7b164513d90f40ead4a09f6c102ca16e5ae85b633d931ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD541e68c46f34f7a3e72db2c500813619d
SHA1a5d10baa9f9d31806590e674388ab3643b68afa2
SHA2565c772f0351ae6adb32a60abcefae6ac662e904b905fa98a695ee1a5698a08569
SHA512ce5e632a092f7f129820463db195683bfa924c66d5e036060b56be41db1bcbb863ed4f724c7674cefe68ff1f7b06a4fde2f9d2e25ce13e29a6ec8e3bb6d9499d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a338ea97a23d3aa4879987cd0d616135
SHA18be5b1ec9dd23c923384922531cb250526039feb
SHA256809160401fc8a5dff089bb75751a9fc344bf56d095f5653cf8998da2a93fc0df
SHA512ff9f48f1bf5e3826813981bc6ca9ad4abc80c74e15bb9c5a44fd8252d53d3124ff1f6a7e22ebb81a3122e8f64d27061904d1adb6a9c32e37e121a31b29aceac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57d9121005ba733c2991e47674ebdeb99
SHA1b53514c320c74b6d4e8edbec3c11407331dff304
SHA2567ae9d800200bf218e3fce3ce5a37511b909dd16e6818e44f5bcdc0051d08f44e
SHA5127e8c6cd91ee0c15341fd5e5b0c35ab4439d4b8e5a6e19a92e03289fe865388a362af4bc7b6e60a23cfa7db1f1a1120fc54b05c6c929e12c59982039f24bb8800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5768aac0758abe755b06454ed3faf472e
SHA183e8dc15a882dae3b001b36cdd108e131b6f37cb
SHA256afe34e3fc83770f0e0c58fa7e05e616f828e7b984359e9fe4b38c7416170aac7
SHA512f1b2eae577c12320a4924f3b29fc8b8fc49d71c0a14018b53f3b7dc56d564205103829f099b290c183563fb386881cf2dd3be3061afe34280943df8c0c6efdd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d104c5d9ea5eaf7cdce73f36aa907d7c
SHA1975bf6bd3bc940201817c98a531dc12a26877f95
SHA25682ae0d55187d9f22add1230dba5f7dff0f02ed313f75ed084ea43b0da1571b8a
SHA51203c4b76d80dbbc41eb64740bca5f805890ded79df8838c24adee8300960e7346864a5a6024fec94f732e4ba81d8104c49b613ffb2fd75025a0c1b9ed40f974b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50266ab6fada0e0d0325683594344c5ea
SHA147d0c82ebc75583f77770b3786068d8d46059bfe
SHA25610e3e86dc9616c49604d24c62b71c17703dc12698f458a8fe171c2808f103621
SHA5124a267777ee6b656f89248725d61f0bafc685f568b842b2a5b585e2b1d6393a27261c608a06a6f21f38af8a3bee6edf371c74f1dd04ec9fb959c25aeae51e9788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5215b57f59e4219228c6ab229e07f5350
SHA150359f1cd3c5e1256a924ada5773ae12099aa332
SHA2560b4ecca23a43fc25d47496dc2e1b5c5c188e33595030197955b49d59433ef65b
SHA512c34f51a585749ba7180fede05d728525335dff02c333cca1561e45da64e9c7dc37e87843726602ca81dc454d615cebb4128a577f4a1a8ab5ea47a2025ce8faae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b072396a696be09920d7117a0c4a0cae
SHA17b5adef421b022faf9ccb0a4924e5906a561b2ba
SHA256adbdae82f698177547175d2960ac593921ed6b0f4ab0e100db623d27848ba0d3
SHA5123a1f8a295a1c3a9f14c9fd0c727409084f14a5d7336db71cb6c33ad17a43c8edb78e503e0fe21826ed3471efed0cb140c758917ff87e2b3437ec90a46d710ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e491e807d7f86632d9af5390a1105d01
SHA1f360db0aa022be4799c7580561b5730ad5a065b0
SHA25698b9097e29e624b50beb6e2464a36a3decb26b4ae4a3e12510afa37b620fffd2
SHA512c5f4d2216fc55c3a3fe3311c75695e15369edef464dd5053146081ee335471401621560401fae4635b7956128a7d9536d5ddbaaafa6c6d4c505fa94f0c4def6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b0edf0f5d3a0e8a7fe31dbb8817f80c0
SHA103ef22a5023eee4ba07ee29014a99d4378d9e94f
SHA2569ae528bdcdd1e7d3fa4465dfef7539693ae93233f6601e2f8250d90d74c69ee9
SHA512e065cc4755ca3801479f549cc96d8199635e0cec8f8b0dc90ca7e6ca6f044ed3fc477e82ca397b0741b0288907631f5a36b273c853ed2bb8b3a877130bb93f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586094e2ea74bab556a093c0c2270fdf4
SHA17d1addc6d53ca385b9ae292eea28c3cb08b9f2ec
SHA256a398b6cdf593178332d6560c8145d6dd6fdd9c391d968d8246a70c20aa6b18d3
SHA512408e072c1c61be7cad1fc3e197f11314ddc5f89117fa9df1f138b7cf57eec56a471cee5a0eae8b5010b74973cf9421bfc650d05a827124fd558269c5fb1749fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD526a42bdbd57eef213148926dc0e58dac
SHA16907d14f793626f4461887020dd31f404b5b1510
SHA2568b1fa93886049dfbaa25148d9fc504801e71bf93404ab463036437262d5d333a
SHA512502a82143f6225e7af843e07b7e4a0734ae24a830d26910c1bfcf83ba04cc8fb04e00dbe7dbb6d1a3f100526338a51e954f42582ae6c7ccf6ecca802382bfb07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5913fcb1f18e6392d0363da2f06cd271b
SHA1e4a85a4dde336ba980e4032075d04e93f59fb228
SHA256052f6b94f6e334a72f6ddd0866518fd74af7a3682c0aacafd7267f42232d5c5b
SHA512cb30e6ed9fbe5ca3234f187d45b4290fc79c34f775ac614f407ea726f06adbfb869ccd38281520a04b6de08233ed1db9a781580541f285cd3d94d1e3a2672131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f535cc9bf5fefdeb8b93cfdb5daac5a3
SHA13c400da7f6613f880d105493902a68a671850993
SHA256883e6e71c95a20f39fe5c0cf7ef38975f4dfe788bd1f0648b1dfd9c22fed32af
SHA512354aab499c59dd8b7e8343bd63d03a9919d88a54f078f7501e9746295ae6102721c99018c0889c68148b1bb52dc25fc8ef8a2304a25d223c4699bb031509fcac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d5ba7507ff7a6c5bcd02cd199a11760d
SHA13adbc440f7bff7603120b68843eb9bd93f5b6049
SHA2569e41d0660540aeae46a3d0c3ea4012b47abf02417f293c13d08347f2832009a8
SHA5123841748dce262f58658534b06f49c008ef74a692e263ab7c8477e13c93937af8427d519b0741d47953f2397c75a006d2034042dcb8516157b8a63f41855d6933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a3483fc077253ca4328bcb0044b73b70
SHA12daf052b18a6e784e200e359260663cdea1ecf69
SHA256a0aa36e6aeb6973ee8cfacb52531fb278f442c96c85c48014197183d69893c75
SHA512bf3bbdd12f0ffc4b8c20e59dad7d34feec67ada175e0c08fb2e61514eaf276595432472044fff0ec5b504b9d710dcd60688b27756e2a72c91ec9b564e02ee9bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59ed5e587264ce224ca691adfb3656923
SHA1ad46b7b22c5a03cbebeeac48e9026ff0f8af5b50
SHA256e9e590e9a2f86eab3a9028a351f7cbc5ed10275bcaaa0cf2323b78fe1e8cd69b
SHA5126d8eb45fcb8133766efeb0dd909d98b3d3dd856ffdc3fc72e328fa2829d03524b9c5d0eec4cd76e39f141519bd0973e025a98ec02d0165b575e0db0868805461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_77E2956DD9098E2108A0AED4BDF2A9AF
Filesize406B
MD592b621cf5bb468458ceca61c0cc4c50b
SHA1b12e27864a997afcc14248c6d42564bb142567c3
SHA25625a550262ac104477240c24fc64accd2aacbcfaa203a1e79726d8b6b83f0228c
SHA51220948278f97eab9ff46bd0f9d5d607b3aacaa164f5d0ff7291aa5498e5e92ead8e5e806f9e908c44f4a8ca93d706053ab11402eb3e2f27370dac89cb10ca9b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize458B
MD50ea8260bea410a5c6f819ced9ea1e99d
SHA1d546b4f5c3527a65522714263f9cd24851da9875
SHA256218025a477b13fb99496a63cabb6c81c3fbd93217d1cc9075e4d68ca1d78a31f
SHA5126e85dc1c799c15d60f2e6a9eef614e658594760e3ba6667b0bf4fd9e863a0f6de6286925fd3eda4296d7ec2356ab2835fc9d459747c3e21abd823672f5ad747c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e93156b4f3178cea08b49400a5abb7f3
SHA14289e25323442eb22f04d7b4c9f3872a5e8176ef
SHA256ddebb61999b6ef6a8d3d2e7a62d0962ae53cfd0cb1fd4ab50476d2aff182aa7a
SHA512843f310449bc08488752bd394eb9893124ec86cf1246e5eac6a1ebf8839dba95fa66df4d732edfb9a64de4e0c864b105f60f093f28dff3c373f07006873af40b
-
Filesize
110KB
MD5581523ed2c81ce6cc76e0cef3050e8fb
SHA1f0819bf47bc5b5749982049d6d500133e433b637
SHA256bbc0671a3fc837efa4c3d7d6674e4144fc3d646cfc515ade2d93296aed1df9a3
SHA5120611ff68e8cf62c17c3aa80bb68093ae99389dd5b50fdbecfd50a890e7785ffa0713b94904fa2d10dc46ba83392d86573db160f5907c25b92ffa89d62b2817a8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\favicon[1].ico
Filesize109KB
MD5504432c83a7a355782213f5aa620b13f
SHA1faba34469d9f116310c066caf098ecf9441147f1
SHA256df4276e18285a076a1a8060047fbb08e1066db2b9180863ec14a055a0c8e33f1
SHA512314bb976aea202324fcb2769fdd12711501423170d4c19cd9e45a1d12ccb20e5d288bb19e2d9e8fd876916e799839d0bd51df9955d40a0ca07a2b47c2dbefa9c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\js[2].js
Filesize198KB
MD576fe86d404929d87cda6c941d9d57edd
SHA18a12a3dfbbc4546d4937becc6701cdb57963e488
SHA256283c511e6f8367a334b1c8f9f70c540b838508757700080c1b5c85563c792689
SHA512d27dad9d5bd5482928e7cf40660dd5354d252dae16c4a748ca99fca10f74c4b15d7c006448af3cbf016208130216d9fc5b5b07d01b7b9e567059a89402c4fe2b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
727B
MD5250c6a4744d9d195faddeca8b4161042
SHA1ad8cbf240f3638a698ff62e299d98a0245df758c
SHA2566bfe86ba434b12a82c1a8d49bccecbcc46d70c0fc64e00ef1106d5f20c747c12
SHA512530021f618b3fc49d8eff9d5200b63229a6b46c7da4adc47d86a23e79de9a83f5e2afc10c9b1c8b714a7908e35daaa252333fb20be9c740f3648c30903d81af4