Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 04:54
Static task
static1
Behavioral task
behavioral1
Sample
ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe
-
Size
25KB
-
MD5
ea9f981ad92649e3bebcb81ec10f5bc8
-
SHA1
925d61a3359dd23b5f3b0baba3467be411820417
-
SHA256
04b5545842b9f59d10163e09057f9f76b0b623a49d0baa4307b924c80e96f46d
-
SHA512
fd9809227e614da63c4323744c84f2c65622e322eaea4afcaf289a78c73a1d6ff62e936c4dc20879294ea4d1da0e10fa77f51bcd0a7112b3746be2c47ad47b6e
-
SSDEEP
768:46FvP6pdwqLkUJ2sp7u7IyIhL95mYKLDpT:BvPk+qIh4u7Iy29BKLDpT
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\setup.ad ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gugprd.dll ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe File created C:\Windows\SysWOW64\setup.ad ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\nTimes = "66" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000682ef1adb6c1b741b9a6296375b8eefb000000000200000000001066000000010000200000002cefd184472c84bfc7b5143f6c304582baebe758eaf93366fb7c5f7553969256000000000e800000000200002000000065ef6f3097b5cbb0f8dcab6926a572ecaa042055f5c83b0b671ca34935593c3820000000137c62c5aaa59ba854b7e45415e40c3ec1abab70761401ec062a1b60187cdb59400000007fb5250e001eb0622db84f4b49411d673fb6bd76dc7b2247f951f7f89a48d9dd017c62ecce40725b5cbe3389020f9c0d535435deac7eefe78bfb7482d4becbb6 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\godaddy.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "451702503" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.godaddy.com\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\godaddy.com\Total = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.godaddy.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DOMStorage\godaddy.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.godaddy.com\ = "42" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.godaddy.com\ = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "448577846" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000682ef1adb6c1b741b9a6296375b8eefb00000000020000000000106600000001000020000000f0c4d941215980f52982073ebae7abcb4bf3bef0f2fe67836c601a70c117df80000000000e8000000002000020000000be182fb6ecb79a410edbf8f56c551a1fd76ad9f10d3896f1717f154307bf76f52000000009e5cbc8891425876193c7c849f07a11940df5c07764584127d6e4d4f5cd227040000000c260dcdb3af6889d4a5fe74cbd5ca4846bbb2554d0c1e06fb9e59ceed7577a630b6347913604c74ed47558962b259d1293b6b986a76121000a42e21540c80104 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DOMStorage\godaddy.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000682ef1adb6c1b741b9a6296375b8eefb00000000020000000000106600000001000020000000e6ddc055f0baac09d94d78a9689ac25d83c1856653caadac0097b0e5e7bfd809000000000e8000000002000020000000267096c033c8e57537871f79fe796d7d54b5f618ad981ebb9d01293ae93da00320000000edfd3400c6ddfd9622ef6e62507f9eebb482bdb9a72a19a1171dea7611dd780640000000e164396a51fe1cc27e1bc2f2ac26537998b87c66dbb361e2aff0b6e47027227e9104f908beeb0ef3eff10cc861ec0174cca648818072c2d2f82d27416f3bfe58 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "457014101" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.godaddy.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c2ac09500adb01 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\godaddy.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.godaddy.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132240" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\godaddy.com\Total = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\godaddy.com\Total = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\godaddy.com\Total = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "448577846" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000682ef1adb6c1b741b9a6296375b8eefb000000000200000000001066000000010000200000002d9d6c0ae9ccf5ee47b074cec99ddf9591445a46948bf729500c285e84bd54ce000000000e80000000020000200000002fd544bb7da7c6e00a27a7b1218816108289b02bb0b14af6ba450e5a053ebe49200000000ccbda4d2ed7596f544b4eacd4f10ca4c4c9b1267bf721abc95dae7fc0203132400000000ed4233466d6e8b0767203b765bd02ace4637ee996e29ef6a4fb384bd310a001ea3b05de20a36e7e8d060b57656de90f59e706792a24e6cbef04e403db804b2c IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d048360b500adb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000682ef1adb6c1b741b9a6296375b8eefb00000000020000000000106600000001000020000000dbfacf6f683be476a7f296b3ccb49844f8fa0eae53e1b4772efa4015cf251973000000000e80000000020000200000009c7acad2ef7dc4f7a0c0290cd6fe9c5af5c0bfa9099bd3f13d01199fd1568d9020000000dcff074f25600db1c0d0457370e81a4563b698ae00ec3b6aa4654357119f87da40000000f1298fdc36416196498bf20ec2f3acee2a9ebeca63e330358eed8ce0846c937e4cf66460d0a214c4d5aeecadefd4c89dfb6e1e7cb895f0b0cf1998660c494386 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\godaddy.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132240" IEXPLORE.EXE -
Modifies registry class 49 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\VERSION ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\VERSION\ = "1.0" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\{FCO94F32-9210-4A7D-AAE8-BB0320CB1D10} ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9B3FD067-74E7-4809-B908-DF358CF1A511}\1.0\FLAGS ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9B3FD067-74E7-4809-B908-DF358CF1A511}\1.0\FLAGS\ = "0" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9B3FD067-74E7-4809-B908-DF358CF1A511}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\gugprd.dll" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9B3FD067-74E7-4809-B908-DF358CF1A511}\1.0\ = "IContextMenu Shell Extension.." ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\TypeLib\Version = "1.0" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\Implemented Categories ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\TypeLib ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\ProxyStubClsid32 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\InprocServer32 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\pIContextMenu.ShellExt\Clsid ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\ = "_ShellExt" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\InprocServer32\ = "C:\\Windows\\SysWow64\\gugprd.dll" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\TypeLib\ = "{9B3FD067-74E7-4809-B908-DF358CF1A511}" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\ProgID ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9B3FD067-74E7-4809-B908-DF358CF1A511}\1.0\HELPDIR ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\ProgID\ = "pIContextMenu.ShellExt" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\pIContextMenu.ShellExt ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\pIContextMenu.ShellExt\ = "pIContextMenu.ShellExt" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\InprocServer32\ThreadingModel = "Apartment" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\ = "pIContextMenu.ShellExt" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23} ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9B3FD067-74E7-4809-B908-DF358CF1A511}\1.0\0\win32 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\ProxyStubClsid ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\background\shellex\ContextMenuHandlers\{FCO94F32-9210-4A7D-AAE8-BB0320CB1D10}\ = "{6DCB487C-0DFA-48C2-ABDC-296BBD892262}" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\Programmable ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9B3FD067-74E7-4809-B908-DF358CF1A511}\1.0\HELPDIR\ = "C:\\Windows\\system32" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9B3FD067-74E7-4809-B908-DF358CF1A511}\1.0 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23} ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\TypeLib ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\TypeLib\ = "{9B3FD067-74E7-4809-B908-DF358CF1A511}" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\pIContextMenu.ShellExt\Clsid\ = "{6DCB487C-0DFA-48C2-ABDC-296BBD892262}" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\ = "_ShellExt" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\ProxyStubClsid32 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\TypeLib\ = "{9B3FD067-74E7-4809-B908-DF358CF1A511}" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\{FCO94F32-9210-4A7D-AAE8-BB0320CB1D10}\ = "{6DCB487C-0DFA-48C2-ABDC-296BBD892262}" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9B3FD067-74E7-4809-B908-DF358CF1A511}\1.0\0 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\TypeLib ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\ = "ShellExt" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9B3FD067-74E7-4809-B908-DF358CF1A511} ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\TypeLib\Version = "1.0" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers\{FCO94F32-9210-4A7D-AAE8-BB0320CB1D10} ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{96B27E0F-E2B6-4CC4-8F14-D2E408DDEE23}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6DCB487C-0DFA-48C2-ABDC-296BBD892262} ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE 3748 IEXPLORE.EXE 3748 IEXPLORE.EXE 3148 IEXPLORE.EXE 3148 IEXPLORE.EXE 3148 IEXPLORE.EXE 3148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 724 wrote to memory of 892 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 82 PID 724 wrote to memory of 892 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 82 PID 724 wrote to memory of 892 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 82 PID 892 wrote to memory of 1752 892 iexplore.exe 83 PID 892 wrote to memory of 1752 892 iexplore.exe 83 PID 1752 wrote to memory of 1524 1752 IEXPLORE.EXE 84 PID 1752 wrote to memory of 1524 1752 IEXPLORE.EXE 84 PID 1752 wrote to memory of 1524 1752 IEXPLORE.EXE 84 PID 724 wrote to memory of 2672 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 85 PID 724 wrote to memory of 2672 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 85 PID 724 wrote to memory of 2672 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 85 PID 2672 wrote to memory of 4048 2672 iexplore.exe 86 PID 2672 wrote to memory of 4048 2672 iexplore.exe 86 PID 724 wrote to memory of 3100 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 87 PID 724 wrote to memory of 3100 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 87 PID 724 wrote to memory of 3100 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 87 PID 3100 wrote to memory of 2664 3100 iexplore.exe 88 PID 3100 wrote to memory of 2664 3100 iexplore.exe 88 PID 724 wrote to memory of 3304 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 89 PID 724 wrote to memory of 3304 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 89 PID 724 wrote to memory of 3304 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 89 PID 3304 wrote to memory of 2108 3304 iexplore.exe 90 PID 3304 wrote to memory of 2108 3304 iexplore.exe 90 PID 724 wrote to memory of 4652 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 91 PID 724 wrote to memory of 4652 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 91 PID 724 wrote to memory of 4652 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 91 PID 4652 wrote to memory of 908 4652 iexplore.exe 92 PID 4652 wrote to memory of 908 4652 iexplore.exe 92 PID 724 wrote to memory of 5032 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 93 PID 724 wrote to memory of 5032 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 93 PID 724 wrote to memory of 5032 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 93 PID 5032 wrote to memory of 2008 5032 iexplore.exe 94 PID 5032 wrote to memory of 2008 5032 iexplore.exe 94 PID 1752 wrote to memory of 3148 1752 IEXPLORE.EXE 95 PID 1752 wrote to memory of 3148 1752 IEXPLORE.EXE 95 PID 1752 wrote to memory of 3148 1752 IEXPLORE.EXE 95 PID 1752 wrote to memory of 3748 1752 IEXPLORE.EXE 96 PID 1752 wrote to memory of 3748 1752 IEXPLORE.EXE 96 PID 1752 wrote to memory of 3748 1752 IEXPLORE.EXE 96 PID 724 wrote to memory of 2132 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 97 PID 724 wrote to memory of 2132 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 97 PID 724 wrote to memory of 2132 724 ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea9f981ad92649e3bebcb81ec10f5bc8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628546.html2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628546.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:82950 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3148
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:148482 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3748
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628635.html2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628635.html3⤵
- Modifies Internet Explorer settings
PID:4048
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://86.826060.com/cj/direct/629073.html2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://86.826060.com/cj/direct/629073.html3⤵PID:2664
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://86.826060.com/cj/direct/629108.html2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://86.826060.com/cj/direct/629108.html3⤵
- Modifies Internet Explorer settings
PID:2108
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://g.100goo.com/VipUrl.aspx?P=61812⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://g.100goo.com/VipUrl.aspx?P=61813⤵PID:908
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://g.100goo.com/VipUrl.aspx?P=61812⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://g.100goo.com/VipUrl.aspx?P=61813⤵
- Modifies Internet Explorer settings
PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\_ze3j.bat2⤵
- System Location Discovery: System Language Discovery
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize2KB
MD59541342916b0c5b0ee2f6062398b867f
SHA146fc51b5aa29f366ef96946c16cbe9b7f67c9392
SHA256e6548a38d5a516be84c393b45ce4a1577e4bbd6bb40aad980237037fe0e5a740
SHA512d763f9f0676bb94f8211aae463896cf1c545531c1c43ee9d60272427c3a7ea56dc332e8e4a08c570a87bc26908de326ef0f196da8ad79051f6cad2dfcd0579aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27
Filesize471B
MD5994c9a9d6210baf5282ab309467eaffd
SHA18a5919957dd6333db2d13a9ffe2e49ce5372752b
SHA256861ae1477ccb8d6fa66920311b2aed6945fdfc656d494b820f1c2116feaccceb
SHA512aa968c8a3f1dcd8336eb669c62fa95ce5cf65482fa67be175cd77acfde07ffc19909b13956b68d1fb0d1e45d925fcc717acc93a367e652d335649d72cb9a841e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD533bac9325241193616461afd5a0deb0c
SHA1e78ed72996568bc9616f4d6b20403749252b4859
SHA256cb0b78d15b774b91ab6f6ef315a14f301b85b40122a72622818753212538f5b7
SHA5123054cbd1551e36a747fc4c7086d3cc484530ea13d44279b4f5f92d462d91d7e3322bb240edeedd517751c00949a6264b50322464e446290726fde18ac4eb2e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
Filesize2KB
MD5a11f9a62853e8e50674a020b88400c6c
SHA191b8babeed7abe622dda935bb076167e527f98de
SHA2564352fe6ff28f999c3af86d697baf7b25381225a858359747725591366c48c727
SHA51287b9fd8646e23a4aaf98eb313937797e6423659c9162260bf067abbcd8c50cf8be3f7f04e65dd51138debbc876813e2d30073d8245feda965cc719bf063c50ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
Filesize2KB
MD5e8d740ae2832d043211516a450723ffb
SHA1a351bd3ab677a6dff1a2351e8849cb2642572a95
SHA2562fe8b9410de391dd4cb8938fd5c63bd24d9342a60edc0bd2703a55b032a2dd95
SHA5120d1766fc34d5979ee918207de1c7f1277d77807a5f46c840d4c87aad8a5f48aa76d0e91d8df55e7f5febf7a85cfd62e2b7b3a866a7f95f6e60042a1f2c4620dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E573CDF4C6D731D56A665145182FD759_BE0ED57DDD8E253CBF04ED6C2532C0A3
Filesize471B
MD58500cfa7ab8617b9713c41fc9eb3a743
SHA178ed23cab6f17d2d83cee407500457c835c64313
SHA25609c6a4fde01e96529557f3f6eac13a1142f8af498bc8f9fffb5ddaa31e2ba37b
SHA5126358084870b7ae51e430773a5b1baf051a0b23ce4af3c01ec1190c548409f6a587ed7975036fa594cb77eee32c461ac3312343c1e64850f297399bb2a286fb7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize450B
MD544ab63c060c5c7ab341c5062c853ed89
SHA157335db156e847e68829cd89aafc4ef31f57a8d7
SHA256b230760e230c39d5214ab4db0be1ce111e30c9597ff8205a2577b42c66fc8f2d
SHA512218bc6fc166e29cf55c38315fb5e844253298f8f1b90a22a789bce8903204c67647f3384e5ec843b5a9ac259eed5aa460e9f3e065d9de6522e61b469bee0b0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize450B
MD55caef1de7dc7c1cd6ee4e9b3db243bca
SHA1171db1b44f7e3860d8405cfe44fcd5dcaac46f90
SHA2560264ef599ba9ecc5aebe0cbe06cf2a6234a81144c17a069cccb4ccaf087dc098
SHA51216d27507ff854b640eb1c257fc54e9ae935475cd18767ff2c61cecd335004145b6900af41fe59ae829ab3ccc1770ac7186d49fdceec19915d503d309e3230d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27
Filesize404B
MD5633e27193ad9d4939654fdb4228058a5
SHA1d9afd4bc161d2ee7fcd0c0eb9fb9981176ee8d69
SHA256e90248b237067773d17a2a43e102ea3580df99c64102e6fb021f66d360ce6034
SHA512c2d9c82a72c1becd263655f9764d8ad9d1d35923007708d18ff7c776cce074ea2cc76f49d58f0fe9f99d10fc3f3fbd4b7b008c3f48b2447133f001484d9d8a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD525465473ed1dfb1fbbdd224753d2b811
SHA12b3b8f705e94bfc8fcc0e7e6a7b07ac63e896ed3
SHA256c8ac8ca6ee525647bcdbad8760aba52c629a28525aca2a3632fca544f6562377
SHA512f2862988d0328e05214c2d1ae4e045ce497210b8cb8f0bc7f3639057397475c455316e2cda23074ceb51c0abd2deaec2fa1b5f05ebc257c3513b075649dbc020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
Filesize466B
MD56fdfd400e298e409a837d6ea92e392aa
SHA192491f193e3f51af20ee1eb71d887770ff0d1e71
SHA256a181ee9a4dc64cb7e5154e02e641eabc3308e2ce900a68386173ad4c82d7836b
SHA512696bd01e652cca59d9becaaad97abdd1e435d2e6702ea861f199084e744148087728dbd98764c656740e68f3b14ff3fe376b5631065d206654f261dc152b07cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
Filesize470B
MD5eec134b0b59db4baf64080df1dd1c98c
SHA12c6d0668ad68daf2e5c67a93dfec2ad1934b8db2
SHA256a7b5c96c06148a7c12bfeb6ca6a80686ec092d61dde588118f957306077b3186
SHA51245acd80a67e2ca28f1c1a27eef72b586d28d12f97cfd2bd0953bcf7f587339abe4fcc3596dcdb94f1ce1d644601414c166fa7eafa70dcae3b303375c13971b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E573CDF4C6D731D56A665145182FD759_BE0ED57DDD8E253CBF04ED6C2532C0A3
Filesize396B
MD52bafcbd316099b0e294f82e51e731260
SHA185998fc9859c24f9eb85607a91ea891be12d0ffe
SHA256f824717876592b7c295d0abb6b528c503e555390e6c70c713ebe5462fba34ee2
SHA51200bfd8daf562d3cd4753f01e95574dcd31576f649c088fe83eb1fcfce08100766c1092e97f7c451df460da389c166235b5e239cd7d257e879756cbb9bcd29890
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
3KB
MD5979651432fca59b71a15d938021afbd8
SHA1a07ddd55a004a3e524df3b48653e7695fc9b88df
SHA256ab146a980d13540fa79324ec7bbec86391e824269050a31d2d08b529904342e5
SHA5129d4d30f3699eadf7e50586afa94b4f70ee095efaf8f6b000c24710f025137212768a1fb2029ec761f405469afe57797de463f80382115a1700e1783add1c53f2
-
Filesize
506KB
MD5555dbbc4e5fa5e8cb425e97f075ed373
SHA1e9ce5174777fa5107cb0833090e104139a651a71
SHA25645284df016fd50181010a1909a257eecd946a8d7cc5c084562283f13d4b93b85
SHA512e2691ddc8c12c0f2d6840823e374138cbc8283df5c1e5a70931562b933b9cd6d1186e4423484ac8d181809ccdd62ad1688a3f365a504469dd635bec5f97dec8c
-
Filesize
2KB
MD58084da3c9e7258595971aefa1864cee1
SHA102f1e2f249863ae2f0f6296aed46dc96fa42ec16
SHA256b3f0a51197e77b186f31de4b16a5281246cc58f540f510b3329bc236508a531e
SHA51222a34e410fb834a01d58809afb43a00c563db961da8a8e0bf8799ddf0d6490f337fc118e9b0c00870b0e78a9096034ed49969739ba07105592a24c3123c7da6f
-
Filesize
49KB
MD51fa93850401aad854eeddb9b52d1be9c
SHA13aafe8a4b47a31a4c647fb9961150efb066464d0
SHA25685be7bfdd75b3b8830b41f5181ff8b306660210a9e64917af182b15ea96c8f2c
SHA5121d256a03cbd2be54260b23c1ab0dbb75a7441cf34d3bbbb2621ccabdbfdc6e27dcc0bfc721ae5ca9154b7a6a18c7a983062d2d04d55a7a6cff399d709cd930df
-
Filesize
178KB
MD59150c5add09786b7ea7abeecb7116a64
SHA10d6c17e064c73116987fda00ac335fbc2e389a0f
SHA2565eecb55127a5cb9a76ae5495a5492352a513594c2e2fc43314bf2f13633b092f
SHA512a2a4d860cb04503785b18d3962c3193fa47d06e546d782ff8654ab1f1beebe2a4048d60b12488eca3d6d4d86fbcc0ba843f250c143129b8802581565f6691fff
-
Filesize
17KB
MD533e561dabf4246431c0652060b0924b8
SHA119347014ae1015e3d8fa2344c9e353bb5949b26b
SHA256a7831541c136cfd686a8ba664c130a55e785a5b88401d2818118076864b61d26
SHA51262d97d270640edd4c216ac5011d742a7683a62c5966ae04f8eb533cd09fae1ff179b87f70f471ce894d2ec51e1c3e55b315771affa7f97e471041ebc5a5e5e72
-
Filesize
26KB
MD502e890ef0a40902a5bfca589d2b84625
SHA106cc70fabb38594a33b9ad9456df317e08cc93e1
SHA256b0761ebe9a41b12da2019d751314075ad6f230801e2658c380d75cfa168a58ec
SHA512319cdbb127f3f91fc23290b8502bbe3c040ca97733406a9b8e89e20140ee463cf4b9e5e211352909b37df10d89017c5b5202ef0b6d2c509b7006f75c62a1ab4f
-
Filesize
140KB
MD53e3ade9e360a2da158ddbbf276b9f1f1
SHA1eb8655fbe1ffeb8326a0c629806070be1f7bca5f
SHA2563b6dcc8d54b886029f5d86528beb1900d26ce36d833444621c53223808538d4e
SHA512df1c6e0b8bac6adfed3bc944aa7b013ad85e1107cbd3a06ad57d9586b8d4d0d855e5113516d5243a422ed3a5cdd084d12513849c96fd68fd8d3876695379ae7a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\N27JXEQ0\[domain]-b3fad89f6347dbf9[1].js
Filesize2KB
MD540977a19deb40cb8cf66489c69636d52
SHA1eb82b52d3d3fa53a7956156e73745b35464fb510
SHA256a6bb6a659ae78a19e915ea73ea37f787ce0a1e22cb7cf572808830a4bda3674b
SHA5121c90cddbd2fa90a6c108985af01f0b3225ba62b9313b972d8ef6081a05ff070db569c6bb73f2589c514db37fb7cea21cac06753bbd366b46a55c9d88a1aa32a1
-
Filesize
723B
MD51b36e356c3709c0011823a1d3f5a3470
SHA1e987a037ea4196e83038c04318c9fe09616d542f
SHA256953e69f24f873ee3bbedb07b9057e22ab160646eaaf7d89410335f604cc9b2eb
SHA512688e5fafcf6c030df8f683a023318bba5837d4dbb4c969ac8758993d1e3427a0bd146de7671b6dccc7433d6671a2cda23c570b13dd3d36d8a0fea4c024d6ae51
-
Filesize
19KB
MD5a24cd15d40c383f22805996c86e532d2
SHA195e17ebe9598703effd8938ea345a7711ad21a94
SHA2569d6e1a37649fb5b47599a971baad5c1a14eaad65245c115309dc244a113b6b87
SHA5128b6a10f43102ec9df129241dae3f3265adce348d195b15eea583e4a197fa36ba116af3084d0ff73b156bf52ff16dc546a98fadc4812a68e476a7a23dd2052a2a
-
Filesize
55KB
MD5bc2b1067fd85dc05d2e2449f2ce6d05a
SHA17c843609898ac862b28028596153696eb25db25d
SHA25694456cf069c9fc56705b87cce584ba2b566f629bf5d48ae113869d8ee62939df
SHA51264de4c7384bf02064d2dddaf63b4b2ce466f57586efac0f0ba817507df47a9de89782b1a979e280b459b7646f764c140d16652ca28b69dcdb309d5660d7a0b30
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\N27JXEQ0\framework-dbea89470bd6302a[1].js
Filesize1KB
MD5a189660cc775928fcf39158d327fb64e
SHA100b1e6b224fab1e1b0e2539d7bf76024c8a4e579
SHA256e832204e17dc4d5433d53732a244b8f40849d36271419d4beea86c51a7a3ab93
SHA512b944f372c6e07bb0e8724e847db4a3270308b4a4444d17e4d2bdf6fe4f8f370d2a0f0ac60b804d8a50511d4245746aca4dbd1abe3c61b53110134173d30952ec
-
Filesize
2KB
MD55a3c09ada3e8754d1f83b97656867399
SHA131c610db58624819032c4ad91ef0ff3d34c19d4d
SHA2561ca9683d05e88a0ac1d3f3d5830aedee5c3c5303cdca381d687f2fd3687fc4d7
SHA51235d9fb0b80fcf76b9307327e205fe574ef661cfbedf0e829f373950acb4cfe305d8b4bfcde35a8d1e5c7772f5830cf0fff0c5adae3fe3f16e296948e78156cc5
-
Filesize
106KB
MD5ccf69a43c2acc9f1f6ed101599e2a840
SHA1b49d39e11b0135daadd3c555c986f6a1657098e4
SHA25685ad9e0bb2b92225ba0b36090f0e6053f1076eeba3f07aabaacc040e4bc0518c
SHA5120e32bd2522d9e43eaab9be853993acad16801cecf8ee67d957ec4c3d3e4981b6a6b71fc8ce78225ac6a9925a216d9aea3b5219014766377081b5987a8e3c1ce5
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
64KB
MD585f4c7149155c75c7c20e70c9e3a5895
SHA138ed6419e02ebfe686a6b90b984ff497464f2c68
SHA25699dbd8e8d61c4328269962dfadfa1fa016f6184292b4c1bec8d1c3733acb6256
SHA512afd3bbde4a1c6db5cf6957fab6845c7353022923a4c410b2908cce3faf2e6dcbf15c247340059adb5e84b13c259888fff5e2a47fc66de4df1f01ac5385bdb88e
-
Filesize
3KB
MD5a5b8996ac986902cbc86b4ff4c43bc76
SHA148b79d4a89fbd1dd40075bd5b99f419525376987
SHA256258f54f2269f10a5e21db4a6f34c47ed5d0cd12c22224a186091c49c6e7b830a
SHA5123866b6f35ca78e81e6017534bccf1c5a13d22e1496473cdb5e1d86898ddd5aab44505b0579e71a2f03bd15fa3f6ab265f98e40adba6696ec7def2f0f935f9b9d
-
Filesize
77B
MD5b6652df95db52feb4daf4eca35380933
SHA165451d110137761b318c82d9071c042db80c4036
SHA2566f5b4aa00d2f8d6aed9935b471806bf7acef464d0c1d390260e5fe27f800c67e
SHA5123390c5663ef9081885df8cdbc719f6c2f1597a4e25168529598097e9472608a4a62ec7f7e0bc400d22aac81bf6ea926532886e4dc6e4e272d3b588490a090473
-
Filesize
3KB
MD5fcf2e3f67a6d5f477a77363355ca6131
SHA1365e6dec6683632d742993a1bffd1a8826459774
SHA25675687db078ab91e868922b75c8152cd2e0633be4ef46e21e7b86450458766cc7
SHA5127be45ccc0e411f2578061c502c44b9f495e9abd0cebfa7fe9d4f4e400549f5ef980cf09a13804ed920137960a54073d1b44612b0ff04bd6eaf793c929c6512f3
-
Filesize
215KB
MD5ec7278250212d2ef6dbe2c859c577986
SHA12dfa8c1d5dc35101152c55c931e7b0b4ca5f1518
SHA25649788c74e8ceb2cabebb83b9d2f82c04ef8e954729e06ca45f9833a05f675fa4
SHA51282aecdbaa8eac90ceac177dadbac1de7f4bdcae011482e437d652c15232f09e8c50404c56d3855a69b090bd6100530cca7906debf67b1bd6a69d8e121f99fa97
-
Filesize
30KB
MD5e42df024fad660bbadf4d550bb33fe6d
SHA10c73cf3e830f5ffed5c9d070a95d98883db23454
SHA256ef4dcc4dab4d780f44939c455d4720cab662b2f5fabc36ebc33a21f4cdbecd4e
SHA512193ab01fb92fbfc0bff58d018d2f2ac64850a29d0eb47283370b0a872d71c1b00636fb2a8bc0f79f0cb906457061aa869bc291f69e3b6703ea08a04e922596ea
-
Filesize
203KB
MD5488326c60562e8f1b003c552f327ac0a
SHA15e0f666f2f0fea8f365b8937d2a1cba1b4e4ff91
SHA256dc5d7f8af8a74984ff2a88c59054e5b74bc189df1ed9e2dfa3d15e0c79d42ab6
SHA512d526cda93a4e751cd8762f6edc315388dcfbda8a829abd15d40b21e77ec2451e6137901e222fe38faa115ff19520e5d6a3f1fa86254b6ce57bffca3694c02dcc
-
Filesize
157KB
MD51529dcaa0b70510a3e3e3ffe5f52b8d4
SHA1f0646f11bf06738095c28a62e325cda5bb7a469e
SHA25677be2ead637a82ac72160144afb06265abe683d6f26bb53624aa412a61a49049
SHA5127c1166c59ecf528f6edb89639592cfb15dcf856a3134228631e209899dc487fb0fb99e86ae86beef3009aaa758fdeea9c0482fda97104ec725e64bd979c4d94f
-
Filesize
4KB
MD5b8501e8c8b4b53fdc76dcea06add8028
SHA127e09855995ed6e9f4550d8f6146abbc74621ea8
SHA2563d77e8f05d74e6380b3f12bed5eb9221105a363f7bbcb5e0478eb4019d649f77
SHA51248f35aca07cdd309f45d7afe917402ba313a384e2503db35c833a4e13f44bbb26951447f6b8a04c58071b316a194297f1e3001c3f9a3b0f22a4ba253e9a2c7d9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZK5NPJWQ\polyfills-c67a75d1b6f99dc8[1].js
Filesize89KB
MD5837c0df77fd5009c9e46d446188ecfd0
SHA181d34b3036ea28438bf8f3b111e69b3331f45e59
SHA2560225eb034d024a03bdc90ea6c79f56193662e7c3eee909696298820e517cbb83
SHA512dcf5f00351f86c1411191ccbb1a35094965c93e5f20e9b951a93589531c01c315c854db31f1cd8da2f5b6c2abbca8344d5d1465790820cc3b5c20a0aacac4b61
-
Filesize
155KB
MD5c2d364561606f668f2d971f560955b5e
SHA1dcd1d9c8160542a6c2efdc7927c883d10a396ecc
SHA256d86b9a4768d302688c6449be6e02cae8510b64b94799c341c3c292d6708d98e2
SHA5121e86b6bfd2984c490860b94dcc9545db1c23ef21f8b85ea8124d9d23519bd84b7e5acbaa5abe83320a2dc2ba20c9105be99a7b34619e5b9292121b4c481efb55
-
Filesize
286KB
MD5f73ac0e2e657bab52b1ea2f191a863d8
SHA174b41d4f2261dfc4be649b347ed9ab02c288927e
SHA256b283005ebad4788e4b6083e7e479d5036b9683f40a5be21d020a6d6f18ac4726
SHA51234eb5e40c3b58bad94b243156ff6eede6e8197daf6ee2e8926d6a7c10e579b6d86fcfb299d8943ff874bfcd240a9553ce3921ba1ea20840daf2334559e4e674d
-
Filesize
214B
MD5e6328005b7a81c807f9d4dca86188381
SHA1e700e6e31d22cfac92fbbf694549f76ff031377d
SHA2561c67591c7e6edc2b385549b23fdc32ae387837073b21b6315e973f3849ecdfa5
SHA5121850cfc6378e58a16b7830f62b3c804ed64c399478b97a50267856914d3e7a306f46c232d932a24fbe3f03a23e3457ecd473cfa827b23122448d28f09ab7eb71
-
Filesize
44KB
MD50c69d159df62600735fd54cb147cfc95
SHA1bce8576dfc028ca4843c90ecc411c332ab55305a
SHA25677beff06c3d9f0d6022e66931cb24ae91f1c4f959509ced1ce28e37b3c716e61
SHA5127d7bf157d06fac9ff70889220dfca1ff4efb8708abb7e594c7496abdce6b534a462d57d24fb381e21d3533e0c05739b567f0872379a54460fe71ed25ade100f2