Analysis
-
max time kernel
129s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 08:56
Behavioral task
behavioral1
Sample
b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
b2d8da688ca7bbf678b81acaf8e51657
-
SHA1
8ff570363f384a53110f383e14527556abb15bbb
-
SHA256
ac1a329fad602593a3f052b4a60166758ec9d74c668304eb96d388297007415c
-
SHA512
a78da3777346e6aa91042219850893d1e10a8a28a9b84affcde2433a3851b8ed1f1254b53fc9a7f1d10c69e762ba3a7ee7c0bf37302bdae75be40c52ea250fca
-
SSDEEP
12288:XldxKbGlQuR92mnEU1OLPnSRriTAg6RtDlV4wqrY+wPd5CtB+fVQM41CVUnb9aFi:XhKqDsLPnSdiTAtNYY+wlOBsZVIb9aP
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000700000001927c-4.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1008-1-0x0000000000400000-0x000000000057B000-memory.dmp upx behavioral1/memory/1008-6-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/files/0x000700000001927c-4.dat upx behavioral1/memory/1008-10-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1008-9-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1008-18-0x0000000000400000-0x000000000057B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CDA9611-5F9B-11EF-A248-D2C9064578DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000089c4fc36c14ae2ab8be4a0d73ed8d24e912d42727842dafc974a9630da3d49c9000000000e8000000002000020000000cf0d9d1541c11ba6a7987ada1d942d73983a63d73f5a684d07e301ca5623156f20000000d7199554d4a962ef798c16e1a201a97410fd9990adb9b7748519eaf11d82699040000000055e27810b81aa9f929431931f8ed3ce18361df95c292b878e56b4ebba160559730a473a4a67a08a437ce1c93017e0270af370151fd8f6eb7f66d5cc1c885cbd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CDCF771-5F9B-11EF-A248-D2C9064578DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0771d23a8f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430392476" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 472 Process not Found 472 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2096 iexplore.exe 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe 2096 iexplore.exe 2096 iexplore.exe 2964 iexplore.exe 2964 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2964 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe 31 PID 1008 wrote to memory of 2964 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe 31 PID 1008 wrote to memory of 2964 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe 31 PID 1008 wrote to memory of 2964 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe 31 PID 1008 wrote to memory of 2096 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe 32 PID 1008 wrote to memory of 2096 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe 32 PID 1008 wrote to memory of 2096 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe 32 PID 1008 wrote to memory of 2096 1008 b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe 32 PID 2096 wrote to memory of 2632 2096 iexplore.exe 33 PID 2096 wrote to memory of 2632 2096 iexplore.exe 33 PID 2096 wrote to memory of 2632 2096 iexplore.exe 33 PID 2096 wrote to memory of 2632 2096 iexplore.exe 33 PID 2964 wrote to memory of 2784 2964 iexplore.exe 34 PID 2964 wrote to memory of 2784 2964 iexplore.exe 34 PID 2964 wrote to memory of 2784 2964 iexplore.exe 34 PID 2964 wrote to memory of 2784 2964 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b2d8da688ca7bbf678b81acaf8e51657_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://kuangaoniub.tap.cn/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.yy.com/go.html#666354392⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0ccef10da83e14e88d9b357340b831
SHA1a2146a3e1d08eb2926a476b51f6b7527aa8a7be4
SHA2561230173ae93f70566cfa3471cd4447dacf21521cc3352083779ffa84b7a9e86c
SHA5127a26f8707cbe66f425030937d60e26233c2024a17a4f901d719c39ef91a8613ead0e081a53bbc05a607c707dbc4497c7831f55c215c2690a78c9c6ccd40acf46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774642a9b260495a77b081de3973a827
SHA1d6af5d73ee404442a52e8e72a102e57c4eddeb84
SHA256209e11ff8f69d8ef7a841ae90ffb7d9c32999f5071b32ca1905446286088365a
SHA5128eec1f70d9a80f4c61475aae76fcf3801a9bb848e7bf7981989be49a22d91068707e67266131402f52f497dfa23ae72c144bc0254c1560bf47293e3036bf21fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582837407563ec898a76b461999bb5214
SHA1fd2b0217f2c9c6b9cc9a9608d3469a0f293b0746
SHA256ffe36c58f052ebbc82ad57b625ed069c9f3e9601213fea1bfd9b42dd94394c15
SHA512dcc6d10afb6fb5270a79742ca5405d1e5a0c2b544a53b2fb2c419c31f4d87a0a07d77e26ca69be72390995dd9f994907d4e6191e8da5b6e7aed02edaf18276e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530abb4b327de20e0d64db128eaabf151
SHA150a91591f16d10fa2eca3054e04fb0e98030a000
SHA256599d6ce6236dfc3df222ad63ccdb8e4ffc54b7f711c86e96005b6c67f304e078
SHA5129baf1b386de3f1ebb3770275ef1bd7434836f5b0d06f2aab3b5557c7c1dce428486cdff765ca2ca75808aa5c9ac52833fe343de943526f4154d0035bc7fd6fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c2e28ac069129ba63b634caade4a41
SHA1aadc874bc0106d1eccb64b8f80154d5be3467532
SHA256b60a66006c91b10398ab79a4597af46f317b1f10ee72bf374ff8f721d6fb17f2
SHA5129e9225528ed5d91443bf3ef8cce3c65895b6a4fde1fd25b3fc641d753a9e2039d2a3dafd0109eec9f563d46c5c1ad732dd6b75f5b8aaeece386d54825b79ade9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1808170197b4594c1f0ff326d6bb8c3
SHA13d21063d6510329123cbbde204bb15d8ccdcffca
SHA256503e4bb8316385de102cdb62d0dfb38c4015e1b8bd1bd0c9b2b59f9cbf873e01
SHA51254292fa8e8b92abe99230260596accb40a4caffccd8981e58879e181b3bf09867e3fae0304f65fb5f158fcfba0c5ccd08f044f4073e8540cd2ba057be0633a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542bee510a9152ec7530f2f0ee1919089
SHA1cd69aaa7e176dcfd344eda492007a6be849baf1b
SHA2566f77ab0060a55e0354767dfbc91b5e21ac3b7827621f7e1d91ff0cbb438c5525
SHA512af6d1e0bd43e65b2c3280559404b9739b4936207beba0ee11dd1fec8b03a657e0ecc09e30e1ceaaabc3effd3a66e0db8bd76ad260d68afd38e22cb9ae5fc78f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a4090a8c5bcc80ecd599a6abba0f5d4
SHA1ebc29fb4d2852ea5c0316a0ca72565e4ac45f593
SHA256ebe94c5a51c581d93a7a1076611f18abc78d8f8a8e6780a3715af4d5bdb35348
SHA512b30e273ae61fcfb56a43e3167d633588e8d6d8f07bab051f63fbc6f50d2df6e418bf16a3cae5c3b48b111391b7ceba37dadf3fb4e8017f980bdd7e2e10295dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5734d365550338a7567a574545202e5
SHA15a31dfe8a811d327918f6c1a9762120f79de22df
SHA256647fdfe6ab9f0d14fd7dda1e10255342dd04d6f9997061969593f7aa81dfd4de
SHA512da3c7209bb499c81b5ab7991e64cf73ffcf60df3baad8d8a9969396c474273e88b74e5761b38c889b3ce80c21532cd97896c3a6f19597c113d91d85b2b68cfbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e7621d85749acc4ab8333ac3705157b
SHA1ea47173a358a96069d1d66c86386c2cb9dfebb91
SHA2560f67cc89227d415a5d2bada03e33641de33781896d3adff75858bb68b11edebe
SHA5128b67d2bd3afea5e9938ea01f8fe5cd576114688faf705ce65d844a6ce1112b8850f859c97a9cd1b4cd9fb7af313f162d8b6b77e4544df55f1d7dbac30456f73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7f99d7d4f2c716ba99769580b80de0
SHA14d4cb1fe0ed5359be4d40b5cdea27c06fdf4a784
SHA2568b5071479c5649bef2c26f2466b30598e6379aa0a0f8572b1df19c87fa04372d
SHA512fb7509937d247f156b9e9fda795ad434bb1bc6490111062090590fb25872eaa17b2b128a6698b61aa3291217921d261e58b85e4a917dd25dc3c284ce3c91755e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a5798bb37446a065f6a6ad93ee578e
SHA1f6c9136e68c26499c4ea66f54d9ab406a982b963
SHA2564bd1f533f5a421011cdffab56c6b8ca4b5cb161e2904d25f0fa3ad415be40631
SHA51255e0096a52731be883cbec32639c0505f4b8daf0b62db1dc9ab4ac3c502673e27d43dd3fef9e0072903365feab916ff98f9bc5307ea670daf606ed5dc0b3f5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e215e0325a5680a1e6114f47fc936aee
SHA16f87c6f285761048cf4881d15ce81563eba45e86
SHA256ec2da2a5a308407c08bee9b9edf9fc483b36e57e8cac0c718af5d3eed4b29acd
SHA512c697be00978d8e4058da72ad00abb8b10bddb4a5c7c83eeac33666b53afc69f279d8d2dcbcc4aed8bec5329d521904b334c4737b61f71eb388bc04a1ef082cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a130a0ebf647493d00a0c9abdbff20
SHA1336602ca82b5a61429122bd80dfafe69f8e1907a
SHA256fae383e8bad9fec119daffd4a30a2e5e7956612699a1f777fa0372b3e43e4400
SHA512532c2bc171a8b02cfac5b0ae73f48faad335bc114ea6563bacec2c6a2176afce618fc6005917193a77170032036e9b80ac48d6745a0a1902bf396d8b2c3c4464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbaa97e5936212cc08f9ebad2c4682c5
SHA1fe5b95212fe6dfd7cc8b60019fc6a874f40a02d8
SHA25640506f7f375219eb582fc9e34ed133fc5737524c70e52fcd470987cf80b8865f
SHA512d78381e16c3f1d6f215b6a4f24e8b0398c2a5be6b089993ca396b8ce8e5807ab4260629fee43ac5787e5195945c3d0034ef8963f615457c6d362c709e063c11e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa57020c88de952429aaa4726ca43876
SHA1d02967188bc9d34d76aa3297bc985d2b88dbe8f4
SHA256c1d2fe923c65b7249d6904fb8713d5b0b6168aa59726694428b38bc77f954c6b
SHA5125b417f56896797c3164542f6302a8957b89497d275cbc173549822c7cc532d0d94df9c6dbb22d631a714f6a0842d58ffed8e25ac415e6e65b530c0769d374e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c62acd2372ed322a0f90e1a06a308420
SHA1ca90ec59d0ae28bfaef8e0bf57d1b0c2baf81a13
SHA2568abb8b0004690c6457026a5bbe8ecedd9511a5809f73fd6f877e41496bb33f89
SHA512539ad6a75c34aa53aac87b988905ed18c6635fc9fa19091bf9cb3bb1404919a9aa271bdcd549951166655bb2f6c01d97949371f817d447186d8a7be2d6b7d9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a9c0a562ba843a9b030b2d924306313
SHA1cce60a854f4e32413992a13c63abd3a2b74cd605
SHA25626f721d9f4765161a8ad409346a7562862a05cb6bd3c4dc2a2745de4d8a10e91
SHA512a17d25bce0989c194338603a9a6893ffefbdf0b2570631513906170bf93a166ee41e3fbf0e565ff5804c1b51eca8ff424988e86c4b3f0f0a0036ba37e905a6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f296dee73b678f9fc98e7a5ab7786e3
SHA1c4d9cc1f4ebc8416b9dfc67b0bc4891d412afb27
SHA256cc774cd33ff1ae0bdcf968cece91445496b57c5e34f71378ca40f1c968a1478e
SHA5123e15c0be662409120be4260c6746b60214ecd90faf07c9e6f254b74f372c700c5b83ef0af6c1cbb47cd664190076b4a4d40b26fafff338d9f145220206e1cdfc
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4CDA9611-5F9B-11EF-A248-D2C9064578DD}.dat
Filesize5KB
MD5c0bb8b5ad99115caa45bf21fc1913e82
SHA1369c92e27a47e24234dfe432024905844a55586d
SHA256232dc7dde93924668dee6161f7b66443355121c5c164f3676dfa1a0869c100fb
SHA512dd994f2b33d1dac68bc15e2c32faa09c102990f057499ba0057e2c671fd2a8970cb1372ad72f92ecdf418cd00faee5fac8059703b2d127a239ab697a7da4e98c
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4CDCF771-5F9B-11EF-A248-D2C9064578DD}.dat
Filesize4KB
MD59a4df29174a7fdf43870a365c77a9430
SHA17c96627db68d85e6fb78eaa74a628f0f302585f0
SHA2563b13a3ca413c73b8b7068e3375d54b56fe69d4dcac2fbcc1d7e7171ae16ad798
SHA51248bec717f43ecca3a3d019119154f1282a8a312194bdd52042c0d03b722d51598918615fed8b494e5eb4651ce109f1b2a71ade79d79129a41ff5b6ac585193e5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d