Analysis
-
max time kernel
120s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 10:53
Behavioral task
behavioral1
Sample
be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
be709569169b185e615ee1e51bb460e4
-
SHA1
dc4927fe32dc9e7795dbec753ad8f5ecab66bdec
-
SHA256
92a72dd92cabbe79c15cc6d4e79384e05f13c4a472fb04eb2d4d7feb2088e617
-
SHA512
2dbccb1fa4acc630c07ff612ec23bf6e95bae0edfa243b3ca2169a5790ebd7b94da02e5c34a05af0239432806917699745ac6da7b7d6ea028ce8e690cec9474a
-
SSDEEP
24576:EActqENY7+uDUzN8k/CJ46ePDDx4R3PNqpg:EOENUoXqeh+PUpg
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1984-1-0x0000000000400000-0x000000000058F000-memory.dmp vmprotect behavioral1/memory/1984-0-0x0000000000400000-0x000000000058F000-memory.dmp vmprotect behavioral1/memory/1984-4-0x0000000000400000-0x000000000058F000-memory.dmp vmprotect behavioral1/memory/1984-441-0x0000000000400000-0x000000000058F000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C83B731-6207-11EF-ABC7-72E825B5BD5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000ffbbc0a9be5782821a44c81d786bfa2921e5fc76d9ebc98b49aeaf53ad1ac414000000000e8000000002000020000000d60f165de6614b96db20352c8d6d7be7479a95294ad51ec8f5d32088f9a43f2b200000005ef343bd13305e9fbcb2eadebbd4e6cdd17fd24cbb0fbe64e50004a97c9d1d1040000000276d823de784e82ef65ab6d6f88fe296cfd00b5b594895db1ff07060853be9bd476b98843d7a36df7b0649aba98261f5a61ec8a609776aa798d077c6d3d47095 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C839021-6207-11EF-ABC7-72E825B5BD5B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30c565f513f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430658687" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2396 iexplore.exe 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe 2396 iexplore.exe 2396 iexplore.exe 2560 iexplore.exe 2560 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2560 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe 31 PID 1984 wrote to memory of 2560 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe 31 PID 1984 wrote to memory of 2560 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe 31 PID 1984 wrote to memory of 2560 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe 31 PID 1984 wrote to memory of 2396 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe 32 PID 1984 wrote to memory of 2396 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe 32 PID 1984 wrote to memory of 2396 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe 32 PID 1984 wrote to memory of 2396 1984 be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe 32 PID 2396 wrote to memory of 2732 2396 iexplore.exe 33 PID 2396 wrote to memory of 2732 2396 iexplore.exe 33 PID 2396 wrote to memory of 2732 2396 iexplore.exe 33 PID 2396 wrote to memory of 2732 2396 iexplore.exe 33 PID 2560 wrote to memory of 2800 2560 iexplore.exe 34 PID 2560 wrote to memory of 2800 2560 iexplore.exe 34 PID 2560 wrote to memory of 2800 2560 iexplore.exe 34 PID 2560 wrote to memory of 2800 2560 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be709569169b185e615ee1e51bb460e4_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.97moke.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.97moke.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef34af2900f8bfdc698fd4d7849a75a
SHA1fe13f00a41e98c529bf4f3911ae3c0ad32a39767
SHA256582c26a884ad64c9e5a8f8806dca0070941f5c3666947915ef036dcf34e091e9
SHA512a1c479b43ba338b57214441773ac856a28cceefd53b4be6891bd933225c17102d7bad1fe53838b79d7c33a2c99ff0580a4dde1bba5578247ca25ffc08e8e4698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf9d29117817863b1c588b51dbe78b4
SHA19ceb40ee5dfc96e9ae5c77203533d88af8a5c8a4
SHA256abfe84b097d9af5ed22a526d09bd265ad5b5bef94059165d4f92f1eca43ae8b5
SHA5123da01fdc9c482696b3d544b3dee761ba2dca66341f621bd3b849c9caf1ce1d995df6ea0a0026e2bbe0730fab6f05dca8370e10b6ccb1e8520488c81ad923098c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce5254846acab0eea73e7dc8dffb42e3
SHA112caff68869e774e518ffcffb83cd1c4e725b7de
SHA25687c961d5eba6778618062f8207c7d90a8f40f44864c0de854ec2a875d6b8b0c3
SHA5124fb611acf6298dca8a6aeab87d7cbeaa71c65c8e257cd5633a699f1c9b96f9a1ac05c00d73268c641b8cee1d779ba6d091e358fbb9f4ef8e99e53141608c68f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b985f080e69f6838734604be260deabc
SHA1b32adeb3012e8090b01291ab4af826f39f1e310e
SHA256169897095d144c1c5a5a5a97ac1bd7674d0f116d1250374c84bf9946b2a94c53
SHA51226807254eda166b927d1f04e328c888006bc9b3e2871fc68ec980e9efecd3e3d2194c24b81b765c9651376e91635818b8f2a97f6d800401645c8a289df7ab69e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbacef7af7b9bbd5abb701c185a8f520
SHA12fb4f82349b3e95b03755f45caee6867bc39219b
SHA256c11eb2205d4af55d18ef7a85b60048fc43b1d6fa819189a4ebc61e0e97335be5
SHA512b8d14cd36eb74fb752c4f67356c438ce4cc8a6af833f0f5c3220b539fbe4d48bab28d33eb005f8dc4725bde1149bb8e546fde1aca5645d55c3aba8e9356a91a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d88e63cc79c89695ec4b6ef3fda091
SHA18d7e6a22ebf18c88df19551f2f6890a9f77cb7f9
SHA25664f4ba468ae876080f190229eaec5f35128e647096136c233e82425943be9d6c
SHA512b650bdffc63a92f7e3a5959b5b08e2feca8cbf11ac36d8b83a894db29ce6c6f1fc5e434eb3699eefb4b6054d837928be9bacdacf5633e7cb5963406bc578178a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54867eaf32464e5fef089c8e1ca426f5e
SHA115d37601d64fb4da4421e18984b88b0433985973
SHA25694f0faf28b409273453a1f7f55ff2bd52e072800c317e0453ea6e45b658e32c7
SHA512b2b33b98f09145e075c19926113ff6b96853ce983b3b8faff6000b9ecd8a29c4e4d679cdadb49297b13087f950558ab99b150b6b4f34f5653abe8d068862920e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d073df26332c20c3420c546d9ce24854
SHA1b0e101bf5f450849a0f3a4326e568bc1d343d628
SHA25699618c5fffe4c842e647aa784881dc98eacbcdf4d2b8e83ce28088628b79bf96
SHA512b3537340ee48defcab4d207dd7b295eb6a676b88da60fa49237beb0d35788a7727bc8a747f703febd1ec69890da286922421f1035ac3ad3bc8e4dbb4e3161ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6809f6e58ee3561ebedb93c554be54
SHA17bca4372fb53cc8c5e322f5fa4057000602ab50a
SHA256b94313fe5579928573af721810d901d493d72af43151c8fc83439769f1ffe248
SHA512e5f4ca733ee7ff0c687f5307e9270db452bd4688a9fe43001fc8c18c4d9dacbc01659572095470f840d1bd2d1401be0fa85f3cc2165a4ab599ec12416a72eda6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5f1887a2a3a4e03d4dd932f8fc08a9
SHA1c8ad5d7e3270a81f39e82e4a7e5aee5379a1e0dc
SHA2566f4943b33721e9b30a4a18129d6ca663a167aa5ea5d475cd3d2bcab81a55138e
SHA5128ad1e22c7cab2f742df54cf29825fd9b38f3ce8e7660099958cea62384cf0e60e3e9cf453c18f4c2068ebbbb2e0faa3c83a88591c0cb2e23b809f8be8a38c66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8dff08ca4f452f9655ff4b23a5a903
SHA1f76dbe4d7dc3a535360ab52fdc57a22b6b6a150b
SHA2564fedef2d0a2aaef6b20fe878bb92daaf171a17e0967c2821b3761ac909c269f7
SHA512d9681a3b18d3b8600da3c0e4dad712a47b8ddc622e6fde10b97a46c97e8a0d88e7de469e167c1e2eea788e3330e27b8c9bb6f182cb2a9019179083f9050f4a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56722dd49bbdb097079331e2b2a7ee678
SHA1931af9dcdbc55c4e589382c6da9787570921f94f
SHA2562e74aec3ca7fd7b887c4851f134be43ccab0a5803b63b8e9ece705a0f498d134
SHA5121186a2b92b8e92265538d07fcc2e7a6c59c3f269c7f0f763fecc194421dd080029f07bb0e1712b8af903973b3ab83dfe8218e037cdc24be35219457314b12562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56039463c242afec124a1f180ca747628
SHA17084c7bd1968592b823353dd0f704a4ce8e23437
SHA256a44f9f47157a76945ba5eb5592061dfd16e869a8194e0ec8d7793b1042384e17
SHA51245aea56f4c122bed2c4950124f6164b6a47d460506475d9e3a38c1f7a413be62309fc644e426a5d22a38ec7dcc8ec7619501e097567f6870ece0a098dcf83e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1c4c0a833b69f3016ca421102218091
SHA15006be345983c7987ab8a5db21bef602ed1c6a3b
SHA256e9a604accae00d61298eaf1b6b4a47e9e27b107de127b5cd34baf4991956f5c4
SHA512818c0a28c8713b603aab47868097fd7f285e9675d39e17b03614b399515b2b8fbeb7ebfea80c3bd0c5bd8799708636eb4dbd45f1b1a95e219742a068d36ae8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562289bcb19f44bad38478ba2b5561409
SHA1f9b45000999be6949e74df1ca74338649b70357b
SHA256a03b63b4fb4f370bef7333d5db37824bcad8ef34d3508c598fd0afd4b72009fe
SHA51293839abe73ff73417700c5e51dfeb4337760a5f9d1d32782511ea4cb1e8bf3c658ce66accf1639bd4cccbb228ece504e97b142847ac6d3cc8fc36a7014898485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575fffc485b7fff6af65960531c12c71b
SHA1bff615d92a6f303cff664a030475eb8331453c78
SHA2560ccf0dd7f50ab698268d6404fefdb33c995a74d91ddf2a186cf0155951588ccc
SHA5125269032a4a24fa52d2aac96e08d77f1cec2f80501a4546091b81c7fea245d34a7eeac6e532f6f66237fa8eec5f1326d4e0d2528c1802ad065c256cd99f257d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d581c92ff500efe8d33a2f9d6d3528
SHA188369422b6699c783c712f3ad8a0d36ee0dc5524
SHA256ddb56652dba135df59ae0bd9ffdbc16ba7e4de6da9e5b990e69335c1edf8e1bd
SHA5120cdc9cf86efdf7d8279e3065eeb6e594719be38af4fe486c92ccd920176598b120a47e23385e4d43cf5b97900fc8b73e18da2256101caf649aa2e129ae4d3209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5156df5dcd67d7baf9ccb55ac2d0ce3e1
SHA1a8447a8d3afa99ac558cf1d135f3be4aa4c55fca
SHA256cb35646bb5abd53e3404b5fdbfcc0ada106fce5558f8d3375bdaea4ccc4688f0
SHA512077b94245080b67548a7625c5dc975655ab6e512631f2f5ed1dd6b75e7663806713323c085a50e5623a5afbd8a162403529af9d13ba658dac2bcb5f83647e27b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1C839021-6207-11EF-ABC7-72E825B5BD5B}.dat
Filesize3KB
MD5e35a9af5dbe2e63944c6c6df7d98bd8e
SHA1f07556ceaf15ea4db9f486e8c2bfc98b4dd171d1
SHA2564bdd466118a7434308c7062597fafdd40464e4f0766b0aef2d2815bd20b2cd90
SHA512bf745ee796169e54739ae71546bc0ea91afa57ca0b21c98a04f65a6ac424a4a0c587016bb51396c3f7a65cc570fed2b53d15e2cfba2f787ceb6928c113f9b09a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1C83B731-6207-11EF-ABC7-72E825B5BD5B}.dat
Filesize5KB
MD576010eae054be7bab7db1944ab172644
SHA11bd8186179ded07727f5df37e7918ed520e66fb6
SHA256e9df04f328d4d27a4e734e4fc24d47ae76d0bac655b3b182fddb945036b1d2f6
SHA512ce064ac2348cc5c627248ef5bb4d7f4137969fa0ec0d3441c95023cc105fcbf1ae6d4f93e7f461731c794886f6fe8a29762fcbf252e547cbb705d47643011718
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b