Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
2a51f24dfb392c231ac10e81841cd88e_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a51f24dfb392c231ac10e81841cd88e_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2a51f24dfb392c231ac10e81841cd88e_JaffaCakes118.dll
-
Size
260KB
-
MD5
2a51f24dfb392c231ac10e81841cd88e
-
SHA1
4651ee8e43f80b92b38eb2535ae54be0458334f0
-
SHA256
de00b3740ab3d3820225c01b410ef52607ae81c19b4ab9dfb8408b6823ce1f80
-
SHA512
08158754cfe2d257808f40b6c4a42c4df24eb3f4453d5bc5b860012bc8cbc67817c9580322bc981720e8edc550502293e003e49fb66ea911c387f41e628cffd0
-
SSDEEP
3072:HibTTp78CcCBPAG4vQFsqI07yMpo/GnYCrJ1kNfC/eb0oqG:oT14KPYvVMpAsWfC2b0oqG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2308 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2156 rundll32.exe 2156 rundll32.exe -
resource yara_rule behavioral1/files/0x000e00000001270c-4.dat upx behavioral1/memory/2308-10-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/2308-12-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/2308-14-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/2308-16-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/2308-19-0x0000000000400000-0x0000000000478000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1664 2156 WerFault.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426573868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68931041-3CE0-11EF-880F-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{689A3461-3CE0-11EF-880F-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2308 rundll32mgr.exe 2308 rundll32mgr.exe 2308 rundll32mgr.exe 2308 rundll32mgr.exe 2308 rundll32mgr.exe 2308 rundll32mgr.exe 2308 rundll32mgr.exe 2308 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2308 rundll32mgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2804 iexplore.exe 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2804 iexplore.exe 2804 iexplore.exe 2360 iexplore.exe 2360 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2156 1292 rundll32.exe 30 PID 1292 wrote to memory of 2156 1292 rundll32.exe 30 PID 1292 wrote to memory of 2156 1292 rundll32.exe 30 PID 1292 wrote to memory of 2156 1292 rundll32.exe 30 PID 1292 wrote to memory of 2156 1292 rundll32.exe 30 PID 1292 wrote to memory of 2156 1292 rundll32.exe 30 PID 1292 wrote to memory of 2156 1292 rundll32.exe 30 PID 2156 wrote to memory of 2308 2156 rundll32.exe 31 PID 2156 wrote to memory of 2308 2156 rundll32.exe 31 PID 2156 wrote to memory of 2308 2156 rundll32.exe 31 PID 2156 wrote to memory of 2308 2156 rundll32.exe 31 PID 2156 wrote to memory of 1664 2156 rundll32.exe 32 PID 2156 wrote to memory of 1664 2156 rundll32.exe 32 PID 2156 wrote to memory of 1664 2156 rundll32.exe 32 PID 2156 wrote to memory of 1664 2156 rundll32.exe 32 PID 2308 wrote to memory of 2360 2308 rundll32mgr.exe 33 PID 2308 wrote to memory of 2360 2308 rundll32mgr.exe 33 PID 2308 wrote to memory of 2360 2308 rundll32mgr.exe 33 PID 2308 wrote to memory of 2360 2308 rundll32mgr.exe 33 PID 2308 wrote to memory of 2804 2308 rundll32mgr.exe 34 PID 2308 wrote to memory of 2804 2308 rundll32mgr.exe 34 PID 2308 wrote to memory of 2804 2308 rundll32mgr.exe 34 PID 2308 wrote to memory of 2804 2308 rundll32mgr.exe 34 PID 2804 wrote to memory of 2656 2804 iexplore.exe 35 PID 2804 wrote to memory of 2656 2804 iexplore.exe 35 PID 2804 wrote to memory of 2656 2804 iexplore.exe 35 PID 2804 wrote to memory of 2656 2804 iexplore.exe 35 PID 2360 wrote to memory of 1640 2360 iexplore.exe 36 PID 2360 wrote to memory of 1640 2360 iexplore.exe 36 PID 2360 wrote to memory of 1640 2360 iexplore.exe 36 PID 2360 wrote to memory of 1640 2360 iexplore.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a51f24dfb392c231ac10e81841cd88e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a51f24dfb392c231ac10e81841cd88e_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 2283⤵
- Program crash
PID:1664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b526cb329af2294fe58715ac27102a
SHA15a595937a5a4e2655b4109e18892d4b327ca8f8f
SHA256f3c72b4249900ab003ced19c80ac49176e505b34d9e3ee29f558e4b2caf8ba1b
SHA512f28722599cdeec69b48dbae97362685884bb6feecb844c143ab1f7cf780e0d28ed6385923a6414616654e1554ddc0aa5d57d0a6e60ff83517a83bcfa9bf9994a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd54d61df661b8e97003758370acd7b
SHA13a98b80f74074ce80a8e55e65472aa8721c40961
SHA25631607f4b72bc790253df27af3bc67782086f689ee014f1ca6faea1dac02a90fe
SHA5121595cbc020b938082831d4fa957e3ecd7ca5d5b0481b1b9ac400c21f30234e8fe95649607be95e4b034f54575e40f61a30b9f3a4c41eb305779e62e6af4a00de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ee5faf110806d128c1b731580f0267
SHA17f8b5f61e759c2f9179f86b82419840844302381
SHA25635f9654b82b9879c16dd56acb07f5671731cae11da2be1f81a20fd8a3234ebf0
SHA512b0206a1326e1740b666c6eab91c2ac41fade101e5e8cbd3545cf9d50148597868b79bd715a48d08974f84c45c1df0876de0ac645a3c54655f4f012063e4ada9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9d319bfe88689b55409aa481e0863f
SHA16988b2d677f753e26ef75ee81a6dd2f5ac9a48e0
SHA25693474bc06ddb26f7827b55114a736820fa6a89eaacff24d0156d18803ee13e3d
SHA5125f7da8544cfc924c78ac2e48baa6a52e404d3a0237bde30d0f0cc3acfb205d5a2741b8e907750ef79a3f12ad60d1512522f81d871b19405bb155646d2c764402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b55bd5595021b7f966f323feb7f3b78b
SHA146972913797cccc37d8f015d595691d32cf99acd
SHA2566f1e11275f957ad0e8d6c96f69001f06227f0b9be14828393703b31e2f4647b9
SHA512794dbddb138a549b317fb4438f812f725e72f24a73cbb27edfd5dbf2a55ea90e208c2ffdc950e2e3c88eb0e304e2fbeac271f1efbeabecaa4c354bb164c2f540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa9cb7d75182d9c6f70a74926d58060
SHA1bb9c9d1ff44be8b40a849927f7a3e69a52b8a3bd
SHA2568f3738f3bcccac3d17ac67068076db7ccb0964a51d9969c06b50b14c76804451
SHA512ebc417312ab0f082384d056802a768a836e493c1b8eee1a23666714bbb61c31e30938c5c07536d62cdabc3a213bd85c0a48080d17e7a9f2bd9475afa1927d3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83505174f469381fac7ef5348b65fa1
SHA1a5448bc838ac3890e43d63f0ed48bb23136556b8
SHA256804b93e63b91aab720d6467dd89c01e38b7b47b1825ff822e61f806758e738bd
SHA5121bd0959ea520bd7eb327fd3158c0de1878bc89097bced55f71243dd2d89bf8eda37f96077c564413ea888ecf6ae8a43543f75a1f783f8a97d36b3f0302c5ad38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d8304d7cada174bf6f452d32e795f6
SHA1229b941d1ec59e5b2853d6c797a476f262656da2
SHA25626de059701077b6cbad4118ec93d12a4a3bd95312a806fceb8a7f3d44f07cb86
SHA51285276e04c79a4d34aa4407fca141b1219149f249b49dc6d904b177245a8602012ef5deb53fca726466eb7a5da876b4e5f428b0212165072e03f112df5919f082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3a43c62f7d6942d9d8ad5a522a4e2a
SHA12a325d97a1bd7fe9d012b7d875e7b7631a3fbeb7
SHA256cb2c0f6c97d8af96f03dbf32ebd8da3b042e2eab2e314fde38c462c0d00f4a43
SHA5129956bad346d7f0d527c8f6274a13bf4ec60aa7759dbb73d05c5599ddca8a3e526c8c5df190ec331ea0164dcdddf393500e98aee47f1ff48b198f88c6a04678f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd7456ae6e0f2b5bc05480ce3c32fcea
SHA13ccc02cbb6c66ce8065ace7c5793663207e061a0
SHA2564ff89a001f61755edd338ae307c9068650c64cddc14f8f0b88370db16cf60814
SHA5121797f47ad1b4f6b2f859b9c25460a4ca5401d3d8089223694d436aab44416b9fe5eef34d11e92325a429d99ee2b49d7357ed6435ec1e354fedee95d42c2f46a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bafc369e7b6f11234aa11e7c7a8c902
SHA1439bc934d0d87b40bb57936c17793e32034da3ee
SHA2560ca18db08a5f22348d2494da521fac20e011265f622b980544ca271f3a44c0cf
SHA512d095071fcdf890355a4e458b549dc552a807865ee2e7b5e5fb9c1128ccb076a8945f9c0d1190eb6450ae03717ae1a230baab1af9e2dbfa95949dddd3b4883387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edafcbe1256de98ccc96b1b7e288a40b
SHA1e4718dcc95dc370e78ab467ecba0e12d739448ec
SHA256cb91ea1431d59264282c14e79a19e0feaf968352e44f435c58dd4914065f32f4
SHA51223183b786dca9dcc7898142cf579733f6d68cfc67df12239b60d8119aac159854d9273fd7ed14af6726f31775124fab0331a0f6585064ac9e7527133c9873c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183bfe921f282573a92d81894e1cff8d
SHA100a108870faadbaea468b4de44742d35a41f009e
SHA256eaa67fb53836bc2c0e5bf6b78845789885cfadb8662f84e0775398d236bf3674
SHA512bfec88a3341924502a8a4984c53cf2d66f90ee1757cf6162540eea480a0835f0c3df3d03f4ff2fa6f9516c2373a5a53c90965fda44fc1c8da9fad7b08417419f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1b2e37627a6cc315e3b600cc8b6f69
SHA1c742cc4e83646e1065593281f1d731e023d503c1
SHA2564974aebf633dcff6902266ec3d019a8a6d13da7556d43c375b32d623f9d2e16d
SHA512b8beabf9e3dabe31a911d7f0dd77bceea39f31848637c26f65a24474be2404d3bb0cea0e3f1f59959fba8c3e29664ebfd6f4016f02f215e9e159e628b5f227f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d45682fa5fa994e333605f6c81075e5
SHA1fb7ad6e767dab9aa20b83cae8c24cb806e15226f
SHA256f570c71943a284b74466e1636459f5a0f8d545ffcbe398ba3e51e9478b357df4
SHA512ae9238ff9aabb19f4c11129a1b26a5544707b6f60c4127939d0c19b32340efcbb15bf40c0631636678bcb2c21ffac3ee23835cc0bf429e731ad5e922560c085f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112196f29a0488b40ec59487573b61e3
SHA1014a92e712b76ad2f2fd589f5195509fffa1264b
SHA25674faa29da41f90db3497e0b142410bafd36ded1ec006b6a7f412153f862ac9df
SHA5120c754d661d4c595601912533ae90be88b462ffb309402a7029251ec7282d50b63db0ac9e7fe1723f6dbf48d4b5da9748741ea01ff3568851808f1590774158d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592dea8fcc7619c1895c9c9a81c205d72
SHA17272365c9178b9d7418943de777fa4006a753955
SHA2565b33a37cda506458d29f551d17e503f6dab413e4d9d1c523150486b3f3c028ca
SHA51248800856cd54c8f58b3a7e9c0d6afd1d11672abd8b2a7f094f8ea4f607f783bf23ff13fc114446925d8fd29f8ccfa8f4d96e94417c39b30a720d7ab72d4b1759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03b088e2ea57b6639fd066827675ad0
SHA18532a16fa1c462d1d4e6e7ed0e86ff01c6571036
SHA256511baa857e69a1c1cf34d9e484bc0cf1c3018804731fb5e78aa916bc63e01c59
SHA5120500cbd9990320b7be692735213d742145b09ba8def4370e94a921828c13c538f6a9a9c2c7b047aff9df8ff8a205cc215e3ec0b2fda0421911ea1c491fefd28b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{68931041-3CE0-11EF-880F-D61F2295B977}.dat
Filesize4KB
MD512bc9f5c910ab398caf4fe06ecab41ee
SHA11bd72235ae76dc17123e05ea41f52154fd8319d8
SHA256e3e4da38e3910be763b6932d1ffe8478b503d0bd2f22ccca68f6e80598b1f62c
SHA51263eca811f645868047399950b058012c04b6a4d41c02fe8a9788cef38e410120dcadc81688d14ff682cef6d0399d3f6bb48b867d53606d4a0d2e6ba30f6e435e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{689A3461-3CE0-11EF-880F-D61F2295B977}.dat
Filesize5KB
MD5bc6d84a2b9c10db116b1f98e9bc0deac
SHA1b2af636abd13839941840f980cd6ae5d7cb78871
SHA256a2eedef88074a694e25c4a077b2ef6f8bbc65e5491a709ef4ef68f457d7958ee
SHA5126a3a0884929ab1eab5c9a707166f368a82efa025109a03519f2ad0eb053162d382e3e1f86600eb69597955104a46875c3aa4bf6eae8f7217b856a65a4205a644
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
221KB
MD5e70ecf2fa14973e7c61384fd7dc5c4e9
SHA1b284f9366cee9e961d9ee3be9148a87a5d2ed7f1
SHA256fd0f984f320a0422206c370fbc00c2e931bb9236d2ae36c4f9a968fc9241571a
SHA512563f7501121a16cd24a67443a919afdf4d011e930fea2719418919b9b1b1e30620d63d83954f8427899628a7023521a69cbae20597258f7654647c987c0a9aef