Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
dd04f4a0d79b56104e8228f8482c7fe6
-
SHA1
6eb932e74d7ca0c34d9b259791e685b9b76660ad
-
SHA256
4ad151e6d7aefcc1ecf94c371c6fefe509e022def728e15b3bad38c8eaa27977
-
SHA512
add0ac6fd8283b5fc4c30b2c01941383e6788643051e5b207c7167881e5288e543c36a113f2d9dbfe732325ac6034414c58c66063a355ecb923331dcb45cb25c
-
SSDEEP
12288:XsM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQic:8V4W8hqBYgnBLfVqx1Wjkvc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2400 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2400 cmd.exe 884 PING.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\{79C6BD03-847C-4C79-AFFB-DB2D4735949D} dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\{79C6BD03-847C-4C79-AFFB-DB2D4735949D}\URL = "http://search.searchtmp.com/s?source=Bing-bb8&uid=8b50d4bf-3c59-4b74-a851-d9810e755c40&uc=20180122&ap=appfocus29&i_id=packages__1.30&query={searchTerms}" dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\{79C6BD03-847C-4C79-AFFB-DB2D4735949D}\DisplayName = "Search" dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchtmp.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432335802" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F43937F1-7147-11EF-80EF-5A85C185DB3E} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DOMStorage\searchtmp.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\{79C6BD03-847C-4C79-AFFB-DB2D4735949D}\SuggestionsURL = "https://ie.search.yahoo.com/os?appid=ie8&command={searchTerms}" dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b84cbcdc5b451adb897b02693c719f50bd1d2bcbd20f9e7f008330104e525c5b000000000e800000000200002000000016dc16a379adf888f1bc72cc6ad9ca6e43e872adaf6fb87a6e57e9ea6d03de4a20000000a96fbe13513653c26d2c04f457134295e1b855e786fdeb3a87b7a824530f31f440000000f710644fabc9c9923a83c60bfcc144ce0a8363bb0e113077cce22ad6b6478354c952f0d9b8270d33aa03c91f5404eb4c3e62827fdb3c2ee66c409e763725cefa IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a06dcc5405db01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.searchtmp.com/?source=Bing-bb8&uid=8b50d4bf-3c59-4b74-a851-d9810e755c40&uc=20180122&ap=appfocus29&i_id=packages__1.30" dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 884 PING.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2172 2424 dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2172 2424 dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2172 2424 dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2172 2424 dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe 30 PID 2172 wrote to memory of 3056 2172 IEXPLORE.EXE 31 PID 2172 wrote to memory of 3056 2172 IEXPLORE.EXE 31 PID 2172 wrote to memory of 3056 2172 IEXPLORE.EXE 31 PID 2172 wrote to memory of 3056 2172 IEXPLORE.EXE 31 PID 2424 wrote to memory of 2400 2424 dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe 33 PID 2424 wrote to memory of 2400 2424 dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe 33 PID 2424 wrote to memory of 2400 2424 dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe 33 PID 2424 wrote to memory of 2400 2424 dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe 33 PID 2400 wrote to memory of 884 2400 cmd.exe 35 PID 2400 wrote to memory of 884 2400 cmd.exe 35 PID 2400 wrote to memory of 884 2400 cmd.exe 35 PID 2400 wrote to memory of 884 2400 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.searchtmp.com/?source=Bing-bb8&uid=8b50d4bf-3c59-4b74-a851-d9810e755c40&uc=20180122&ap=appfocus29&i_id=packages__1.302⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\dd04f4a0d79b56104e8228f8482c7fe6_JaffaCakes118.exe" EXIT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\PING.EXEPING 1.1.1.1 -n 1 -w 10003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize2KB
MD5e1ab32543e0f3f38cf9d9b5afd131a04
SHA1d332d3c4e9620eb6131979bdf6b9a29429b36e2a
SHA256b3e2a0027f3184f75d59944aa9231f8ca68b50a8fc1a4c98ad28496f619a30a5
SHA5122b480a5085fe2051d0931fcc520aa62eba97c51e7bd9ea8b053ec27b54711e8c77ec9a65bda6d96335233e9d08e2d8a1c12bbac2e7bb4c4bc406c0e8b1478a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
Filesize1KB
MD5247a123357a264aefe087606759d1dff
SHA1bbb6af283bc6d056c2d255748c0229df5b3a3c0b
SHA25617e9b0c2634f19f83f34f2b9d64116851840ee74cfb5c35a9986021aa6c6dd31
SHA512df92ebf61facdc07055220c85c408d7a4f00d370d40f330a0b33d7c76625d8aa76ac14530b70db5fc011a8da6f6d7d42d9e8bb651b8b6e02c65c869039302ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD54b25fec9a523123a64a033065493d3a8
SHA1c917bc856bd2c5a8dd577b7c6364b82d752ae272
SHA256436f58222fed9eff3a5b4300596a7b60cdd5c87fe450fe6be6a4c0866b09256b
SHA512e390ee745d8c11d4aefb3a965cdccc132dd62e44fddb128e1e8aa83a1934edc8d66b6e2f9a219f928807a601b3456586064470a16096ff5551ed600477286075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8
Filesize438B
MD5cc2117d6356a5c4434f1734aed7e76f0
SHA1d90fc1c89b30507b16b2a45cb49265488de382b0
SHA2568f5e6dfa560cc863178190eb8f43e7e98ed40c34fde639949c872c21a858dca3
SHA512340d7d24b48ea07a126f057d38a82ff8399725e5e5dbd3bb2414df1c6c65e4049e5a1407bb31e5d928e4a518dac6a09efc80a953c1101b2307b228e378c14a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cea2881825dd7e218720b5bc787c849
SHA110a7e3f545f121062804d256231676fe82bf65ec
SHA256a47cf9d74f78c60cee2de1271524d1196987c5611bd24fcd36c85f3dcb8dcfbd
SHA512d085e343bdcd256f345b1227d397c16bca9d00f3862fd939401be86fabdabe0b6dfd544271c7912fe9fbfd8c9a2bede709965cdef91f3f67c2bfa8b24e72f380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed19293250da28c33a8bf9d14a95d427
SHA19ad2ad7c536a89fbdb0646d83f62a8e3593e5c3f
SHA256e6135cd21be999560140d92266f5b6702ef00f5eb64547b22e34a90825219719
SHA512992ee5a46a6d4d46b0cd9f6d08a98d51c23062a59b8892666d42b68b39f749216f947a4ae07b80e5a3b8637ef185b34ecf85418f52112bfbdb829b9373c7e7a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c95e67eca748ecb269e843ad2d512b0
SHA12856fc1dedf42f23e45cd5c69bb1fc2a96e8ade9
SHA256562083980e3fc178974201ded02c968aa043199a40acd99cdbc023077a8de188
SHA512936832a4e9eda84095a3113febb58148a30930b8962f649bae24e2d8d6344982e2c3ea42519b38ca85e5949e023ea4a324618d6815fb118b967827a98b966679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccfd3b162fb7489af870bbfd8f011cf4
SHA1e5b8a775c43b0e96947f1b3c3a7fcc517bc558ca
SHA25675ecd2d18b3205f7f517fa8d965ce64e7fec262dde162ae12c6985e2e9c969a1
SHA5123c741b2095f25d13c131414b7caa72125fc03fa79c9f1300b4ce09d0b8cf607485e74659f85d57a4ec43eacfc7b83963b97e08bff49f80e38a2c56101137627b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ca1c9ba5b5f46dbc07bffd1fc0847d1
SHA1f62ff7e81de103c8d4f7fae8eefc12df4fadb591
SHA2563491437efcc4cfdeb3e72a523037d747be5d068f3d0b6563f71f633f5ab32ec1
SHA51234162e116cf58f89340582fbdd7d8f7d8cb62ec9764e6b97caf6664612168937d35c79913fa435b7d430660274fa0eeeedc52a86a5ac2bb162932e34d46b087d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54755684650304b931fa640190d63235f
SHA1ed95dd64b024fb825dc73bf7eccdaa1423c5ac5a
SHA256eb78f7a18fd9358afd3ec13bfdeb379419091595a9f3b0d69fc7369f713fbf09
SHA5126cabe74733c4dca8c6359e86342209d861f14758d226d7993ce4012b046b60666452a48c8d60665932f794a69c10f6495bc8e6d3643226c24dec577d0bdc8e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5627ef112165d9f957aa8acbe77b5734f
SHA17b328981853c37526f468daf7b382c4b8d1d53cd
SHA25683ab940dd1cc4155c4e391a82207ee8082fff85008c70b39caa32dd00784ef2f
SHA512904653cb15b8e7cd168bd953c4a30fcebb6905b2d5059db1828e10945585086eed92d581e51733409012d16ddddeaaeb1f74793047930ec97073d354bab5fe6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c598102b8f5ac2331f9a140a82cc6254
SHA15b2ea2633d2a9a04415f52bc2047d2cf7f6f30f3
SHA256eaa0b5750748bce46a422bc8553ab341dff3ee9ac657be9935207c0f2ec1863f
SHA5124057df79690abda0591ea395d0acd309138fa6f8522d217221ce97cf75be920dbd603c6cdfc3a39b992ff010b4d2df977b7828b022affdc7b43b707ad5345b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3f259eae33c983dfcc4bc9af5be65d
SHA1ed74efb1f1ae7f58f54016cfa1d0fb998b95dbc1
SHA25605c0116db91d79964a45dce6703ccafe9e06dbca9ad7cb4cd111cd7faa4ec305
SHA512b6e9086d862227d2af6a0088392c7fd8b9e51302bb21b3f2d55efa4bfa3d21a62e18c4319e110cf871e75a3c15d97aa45a34f8ae1873ce01f6c8aea9ee69750d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c6e9377f46368121ebeaeed597042c5
SHA1cd1eaa90cb7127fc38cd002372f2a86229bdca07
SHA256f463c032880a96a8149102cf8f39f970cab9fc389433b9bb0d3bcf292acf3c51
SHA51248200e56bc5129e07d77d90be78b8136fd0660a036c772b9c9a6ec68726147de4ad043034ac7da07567e74771f33e8748d366e6f2ed0be3d7f6c0b218ad47c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b127ec344263bd567cff29fdf62b961
SHA1311a6bc7d8fc9ad2853a77e761c80efa1b263416
SHA2569f156bcfaa0482671b9d27143427badb94e959662a12338f18ea826b21c11e10
SHA5129ebde636ab7bffc974db71cf78491adfcbc2ab6f671f22462570609adfe342df5dc8c2f83e86adc4cf8d0a4477a9b2794956c834b18e300af9f92dd01236883f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5421f6058d9c885967a793629948e6591
SHA11f1a7ace9efbb2d76237f3a8d77643863a832b8f
SHA2565e960554358fe1ccda6e92aff4a759201dadd2c9f4306ce312fed93666188409
SHA5128030834dbb611dcd44da05f3aae069c3a8837320cec8beed292426ea2a7dbbec9996ca0054e0df220be8239faf5ba408f7adfbb8cd8f1b4648c39754429e5a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656ac94f3814f23d0ff776d54d570fae
SHA12f92d24dc647b5a3b27c34165b4777b4e972e9f7
SHA256ac86b6e50146fc134af66afa94ee23ad7c14e6f66623538f9c4ffd2d8688102f
SHA512b338cabdbb6e5595d7a0601acde98cc367b647d78cc77398dfff80a75d83624924ea6402fd56c376e6d03061444b5c4501eee3fa260f359ef11fe5b638d59e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad83f56e4b7a90ccf14dc790fc8c7a8
SHA1e3141cf1c45011484d7f24c424d2bca0a5cb2fc0
SHA256364191ae5eb7fe83706f73814db6a160d75c3b9d5221348b760dd52f823430fa
SHA5125b97b0dd74941cf85c80f7c152d2ef2f2672a7fdc1f9f3ec0835b542c932ebd0d04abfca2e8596f1088f0b93400b39b15a12f530be6b356366687ed1022f8dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fac202f9625b8f461418f6ceab61105b
SHA1ba490dd525e33c70c9299781b572c1abe7eb9134
SHA25617419a2b497ed9700b0de727f263aa9bfdce95db0b0ee7c28c97298e760b8e76
SHA512d1a5acf654344f139a4c0f7f4c9d726145297b77058a7f3278821634a6009329129eca6838d3583e42d89e465114f3a662bf50028157f951e2ea1e5cfa827382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065927432f0d7101977208eedbae58e5
SHA10637468634972f2995eb6a36111a9205e9cdae96
SHA256c13d04725faccf4676f457ef3b2baa34005d94cdbfb4c58bffd916dc6a8d8a0f
SHA512f9566f7c21c863b9299de8482c79867055d7ffbecff645e30ae5dad1c37b8a72dad02a5cd52ccbc80adaf41af27b3081207eae70e6af8b00604cc516f140eabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efff308978d86a7f27bc8d01410f01c5
SHA1a5641ca30e525ff67aca3c11220fd505da2b03e9
SHA256718989099d70e3f2c4a15b34a6849c5030e5a75068ca72523199e702bb20c53c
SHA5122b4f75b750f2eda793d3d77f75cb7540373653ef42becd7ff0f9fba6db3181ad49b6e2f450c21b7fa2579dbcd3605a2721eba7700eeea9298a91887d7e3adffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c24d4f1c82d25b1dce328f34eb867e35
SHA163335dd2269fb1829a700c78cecc7025875bd2bd
SHA256f77236482778fe02685a9d0bae676a3c447f4331dcad56bd0c52f1ea8b8eb64f
SHA5127c833d6a34e192b9bd04b4e1b8494182104fcf8ba565291d9baff232d7b74ac228f74c07dfc4d9b75febbfdc1c31f067dd5c01351240416a8e37c3f53dc033ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c098483c8c94a39ef2454a3f79ab49f8
SHA110c1b3ce9b293018d7fe6e1918018f64cb437f20
SHA2565f7c12132acca0a0bea96ebd0cc91ae29ea220508ac5d25144a0612cd5778db9
SHA5129a94799cdf58fc11d87dd7553321892b7644c40f124c4ad7a61dbaf5a7018cf48bb4bcea6313c2fca798823f1f31f2151b7bbd9152f7e74f13b8cdd17f21845c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d451f6cfce7714cbeffb36d7a6777a
SHA17ea6d8dc885a0922cc5836ab3ef08a631fe314db
SHA25634ae95ffba0b439b8a89827fc19328537f9e609c61c42e0c477fa2d0f2db31b6
SHA51208fc3b9fd893badaed86ab61c2649b2db364bf773e8aa423f913bba9d799ffa38c46f0e5fe60663dd0c90a9ceab7fdae24dc54fd3a8b7c62971a6f38ab440ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb40a6cd9a6cbc29328d55a61eededea
SHA182a5a558925845c395fbca5f5281751a1409d414
SHA2563239dcf42f7de0dfa3c26f5f870fe00b7c36768c9c7f727dbcaad00327587cf1
SHA512d4a1737fc2499ba3d6de8ae7e9762156da3e33e7d4afcf7470661131e19ce8b56cb4070977f27f8998f9b8a822277af37e6148e8b38f1b2338f24427c976154e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ec223ca95088361d147edc78d16f03
SHA11f90afdb73f4bed25715b283bcca64032a1d31c7
SHA256af8dec9df72860b1c7dd7afd55c88e164d1440f5587991d200dd15c3ba6bec3c
SHA512b67fe0ec356c920ff1090d3de3f38c09b22e733a10a08ed59bb2242c142c493c87e5a5378d6681a0d837f5ca20f50d7828b2ed2750e95a67a7b96d85d897e5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5196fe012fd8dd70c3ebbd44a779a2071
SHA1cfbc02eeaaf8fc25855fd9bf91784317e7643624
SHA256863ba42b2cb93d162e99d6e4bb9aed76f391d52eb36bdb9d68df1f8d223e7844
SHA5124966282023dc4b1d49442e19dc996ca46170a480bdd91b58edb3435d8ff200ea2ece2483936d45789b7b45c93cfa942f7fdaa1c23843c63e3af9795524778f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c101a6f4a25e3682648937bcda62b11
SHA11f3166e00b52ed3e65641a38869e709a22d13379
SHA256dc5908197face090fd72b298565afe85260b4acd282473cc8a11975a8da39d52
SHA512f8afbd311592a0c391c02050b19dcdc342fd73ed550c8671fda9362149b1fd92233b3364557ea1b0eb8d7bfb7ee39424c9dd3ca8a1c8dd9cfa8a43e121ac1f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57750017106d838bb3b4f8b359f7d1089
SHA1e3003b93662cf1856f2993a0f33cab971bfd73a8
SHA25663fbe1344657a7290698e50cd017e4bcb1c22cb0dd174ffd58927d9b7cdae072
SHA512a73c0359330c1e030c60f3f0eb1551239568fb98779053458e74ee8e45a94a2a4b7e2ce2548f4be69adf7aa33aa9a7d36c07006d8449ccecbf2a60de42a4a441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88254e7700494eee7e50c74ee65058f
SHA11e4fc9d991ca1aa0d7aba79faa845e6a0ea1352c
SHA256eb1e5fa1292ec4ecddf9f1192b5f0db6832b267a58a2aa864248bed878470861
SHA512f0610a8c343851c6d937c677aeb42ec399a2d1b4db74e2a1913dd12218c2a0e62db6cd6efdd6dcfeaebde8278bb3e52cdb1529241d4bdfb2b3a6875872b15a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b08c35f4f50bb8224db3d0af3f4cd983
SHA1c1245241aafdac110acac3c8d70f78e696a3bf42
SHA256a8ba41b4f9cbb2f474a165fa46a5def7cc6839c0d715344d167d52bf99f49d13
SHA512edb1fc4eb5509dd0adebc0b0ef2c821030b999a1fb4dce59d5fe1331547e55026b455933195c381c2e3506ebe37265ce28ce1c6fb53b223f100b73993cf35994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1461a2a7988e2d637ab123064cdb7d
SHA137c7320bac1a3592478a170ff6c9522add0cde1f
SHA256a579ef7aa3da70665455da23dde7d5693a0ab59c6e3a7cf02cef8f38047ac3f8
SHA512bbf438714d2fe78a1d7c4d0e5795681eb139826dae59d6230eee21e2962b2dc8602d8546a6b2ec30de61d61a335d2e15df4568d2a9b2c1aca82cc7f18a473cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b0ab52625ad211f78a820df10b82b63
SHA14148dc71595f5b73da19845885f364c615e0ab34
SHA256610ba92f73733f43bcb49bac56d330839a48d9c3a83e8522dec78cd380de3a6b
SHA51272ea212ed22b1296cf2f929589bc707dc5062e942660f133802fa15c62c8aa4ba6f5026925ff82f9b77076d076426714c452c85876212260a9e598722e0bae78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553962b8f39e3477b986673f7f5bf5f95
SHA17cef10158550d9bb4956f693f5ef921d207275c0
SHA256845d6dc1d77c9799a8a7feb3a4be4b4f5cdb82cbdabebcfd7bbe01f2569c30e6
SHA512f8e7800bced641e3dab496de4170bc25c5b299ad07fae3f4ac576d1c9433e31d9ee67efb302d990008fd14248c0adda04e6760292b3049262014493e0a238bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5212f739707256029b40852e58f01591a
SHA142a2854cb2eee940dd322c21ffb3457717ec5bca
SHA25634ded611c54796030c10159aeb8c6fd55b731d8f197739be2c2389c3bb9a1fed
SHA51281dcbb31bc59f67882b258c880bd651005807c788e159185f76e4c1409dbad01479e39e53eaf0f6b2ed594cdae0afc2c83322d3dcc25b8cd9957ede60baebce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f333866445c3d5ccbcc0e366d4d920
SHA1b1b7d7ea8247e6802cdc985ef1f822feafb63bbb
SHA25647b83e560368a1811c53c8fa8e065bf1ad713701639d43349279a74818a693ea
SHA512fc242dc1e4aa8ccebd53a61946e2b5b4a6ff475a43acd8ea722e98313e845d6dd665981a48f30f521c647629a89dd83580bd30bab306f4da981c0ab2e547ee13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece9be5ddb2004a77362ea070d1103a2
SHA1f243425e7079bd16ed9bd4dbfd16ed19709c3c58
SHA25663d3fe31d99a5f00cd39de30386a97e49f29af21de5773459ca35f9c9f95f653
SHA51238292cb051850a00dd666ce2c1c853ba6defcebc5e8a4d2551793ea1f062b2eda99face7d62e1ecca56967a82639cfaddede122f3e3fcb38a8a1aba5e36f4e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c7759af7be69cd08b7ac4bc6a475f63
SHA1417691f044f95fa181ddaf19e7501d366b14868a
SHA256d69c016fc8a204f804f2a5729eb65a8955a82bc85f8fc248f56d997e35591fc0
SHA5124caa321bb23754f36b051afecef41957770289117a380889dc4429d3eb1c7cad01d9b4248f7656e8faf3472fce62532594505f8636c05c7a6cccf4d0a881fda6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abc6e2679c50f71755d9d6e6793b947
SHA1dc8478ee9599219005c3ece19cb8e390a6d2b2d0
SHA256f7c8e34dee4d15f0de95eb3e7eecaa4c5fa80c3575a6b780450166e40a569358
SHA512e02b75a554adc3095e3c63a6ceedcceae38f7046ca618aad89fdf1a516376ab5c68c76f86757b9ecb5202de4f2ddee2c5f31ffbb1fbe287b43634abb3a3c6f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize458B
MD5cf1846c9dbd52afd8b5572d43bc013f5
SHA18385efae0b20715178a93f89e9636251291026a2
SHA2569d181bd321dd24ae0c6324be3e14674aff26a25bd21677613e4019ade2bf8a8f
SHA5122abcea509b50bb4e0b7418a0da25f80df502bb1306cf83bab55c0847260d09c5c578fb0358f4fa29af9e66e4fec77a270d3ac7865ab1beace830aed004f09ef2
-
Filesize
110KB
MD5430db6b3505a456d24fc6ed246d6284c
SHA1165eaa45b76debe44e90d999d1b64fa14000eddd
SHA256acc3b99be537a30d30f09aab22f1c49a5f1405baf687fb10b48190f75dffc7b6
SHA512fa4c6d68aa99427dd01f55a1b50d7265018c858a9b3311f33c7463e0433563997c55a168ee4f1f8acfef83a7afb2704676342d5ee825b1d63e15cf31c4a4a8f4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\favicon[1].ico
Filesize109KB
MD5504432c83a7a355782213f5aa620b13f
SHA1faba34469d9f116310c066caf098ecf9441147f1
SHA256df4276e18285a076a1a8060047fbb08e1066db2b9180863ec14a055a0c8e33f1
SHA512314bb976aea202324fcb2769fdd12711501423170d4c19cd9e45a1d12ccb20e5d288bb19e2d9e8fd876916e799839d0bd51df9955d40a0ca07a2b47c2dbefa9c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
107B
MD5f548be63fb65eae682b4509116eefaf3
SHA1e23efe2206841d1fc3b1322173460fbd7f831070
SHA256a09ff5c0b981820256cd6d5978390054b8e08854d45c268ad8b913ae6bcb22dc
SHA512bbbc707dd65c4f5c665baf8f6cc88af85a91291865116f697c449cdba7adc2071a28d248cd0251a7b48fb6ef2a3c946c8ad772f096266959c53175b1acfaa348