Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe
-
Size
64KB
-
MD5
c1969d971a0695b3c040bf2b701c6662
-
SHA1
9cacc079b15efa01c6bb6ec099bc757051b069b4
-
SHA256
09890598709a137637c25b9355c5ca14691d894cf6ac5f275bfcf11313989e14
-
SHA512
eccf57098655739574d828a46aeeb9c651f51f388ce3929e0448fdd9765164004400608c110915eda0993e27ae68d5e167de963e20f00c32c8e6b169453f677a
-
SSDEEP
384:e3x0opJm4bXiIjACgd01E5XILg1VolgnkFu9roxxro8d6:Yx0opJhbyIZWJyg1Vozuurf0
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 708 set thread context of 2300 708 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430782000" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A87D431-6326-11EF-A74E-76B5B9884319} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000a6ca8ac6b2d4778c2b6292f366fd5b874f05d1d0414fa56fd932c2ef054780ef000000000e8000000002000020000000ff8b31b76de4a958489e88bf30f8f690de9febc1c86ca0f8e56341776141444720000000f7e981ee6d658fc428571a29d33194e4508f97b725b9b5ac7f0fdcada97f632340000000fd8fb7463fe018909e38560c4e4b8082210b7a61a3a68991e67a0bd34b6977cc08a6ce7dec227218674528e78e0c13ba86bde9347be20131d17000c8d61f953d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bd8b0f33f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A6B43B1-6326-11EF-A74E-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2844 iexplore.exe 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2776 iexplore.exe 2776 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 708 wrote to memory of 2300 708 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 29 PID 708 wrote to memory of 2300 708 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 29 PID 708 wrote to memory of 2300 708 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 29 PID 708 wrote to memory of 2300 708 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 29 PID 708 wrote to memory of 2300 708 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 29 PID 708 wrote to memory of 2300 708 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 29 PID 708 wrote to memory of 2300 708 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 29 PID 708 wrote to memory of 2300 708 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 29 PID 2300 wrote to memory of 2844 2300 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 30 PID 2300 wrote to memory of 2844 2300 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 30 PID 2300 wrote to memory of 2844 2300 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 30 PID 2300 wrote to memory of 2844 2300 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2752 2844 iexplore.exe 31 PID 2844 wrote to memory of 2752 2844 iexplore.exe 31 PID 2844 wrote to memory of 2752 2844 iexplore.exe 31 PID 2844 wrote to memory of 2752 2844 iexplore.exe 31 PID 2300 wrote to memory of 2776 2300 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 32 PID 2300 wrote to memory of 2776 2300 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 32 PID 2300 wrote to memory of 2776 2300 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 32 PID 2300 wrote to memory of 2776 2300 c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe 32 PID 2776 wrote to memory of 2720 2776 iexplore.exe 33 PID 2776 wrote to memory of 2720 2776 iexplore.exe 33 PID 2776 wrote to memory of 2720 2776 iexplore.exe 33 PID 2776 wrote to memory of 2720 2776 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1969d971a0695b3c040bf2b701c6662_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.kankanhaoba.cn/welcome.php?k=t%2FK9qMCtzqrG67buxuvF1Mbrt%2FK38sbrwK3awLfyxdTA1sCtwK3Iy7fyv%2BzArbbuxuu27sbrv%2BzG67fyxuvH672owNa9qMCtvajA1r2owK29qMCtxuvL48bry%2BPG68vjxuvG68bry%2BPG68Ctvai9qMbrwNbG67fyxuvArb2owNbG67CivajA1sbrxdTG68frxuvH68brvajG68brxuu%2F7MbrxdTA1sCtwK3G67fyxuvG67buwK3H67fyvai38r2ot%2FLL48bryMvA1rfFwNa3xcCtt%2FLArbfFwNbOqsCttu7ArcXUwK3G67fywNbArbfFt%2FLG68Ctt8XArcCtt%2FK9qMDWzqrArcbrwK23xcCttu7A1rfFwK3Arbfyt%2FLArcirwK3F1MCtzqrArdrAwNa3xcbrt8W9qMirwK3F1MCtzqrArdrAvajF1MCtvajG67buxuvArcbrxdTG67%2Fsxuuwosbrt%2FLA1sCtt%2FLG68CtvajG67but%2FK38rfysKLA1sCtt%2FLArcCtsKK38sDWxuu27rCit%2FLArcXUwK3Oqsbrt%2FKworfFwK3F1MCtsKLG68XUwNbArcCtxdS38svjxuu27sbry%2BPA1sCtt%2FLG68Ctt8XArcCtt%2FK9qMbrtu4%3D3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.go2000.cn/?23⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7bbd75ac481cd3f992e462f4f88a70a
SHA1154e3617f667414efc182fdec39c6bf6cc9f982b
SHA256f3f8cbdaee3e159ceae2b26e2883d33b10cb8582a836c6a7505d1b90325601a5
SHA512c53ff91aedce83c4b5d8d4fa729b95349732e23186a76435aac31b53ff9e8996b43b8f73ab80b60c0e5f52c735a192980584784a9750e5d51d4b607fbe611c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099899e09e96ccb23f640e2fed984d7d
SHA1efc469ec16e818fab721d1f985775d3575172071
SHA256747c5a256cfb9152173ab4b6cd5e729975a211497608a54881c2a6c731df825a
SHA512255da9ded2612291e6552e64e0134b53d18a1ebe08d7307115257a2ecf89a8e24cdbc8dc6db8e2ace71822ba52e77ca2d6c461fe2f78d4640477bf0ce5b8a424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202d42bfb70fd04530aaffc853eccea8
SHA14b2c8b273db2dee30c74de7449406f57ddd44e0e
SHA256606095250ad850b026c1915dc95a378e1b0e2073d605bcfaa648a4bfb9587684
SHA512068d3504cd32b72aabfc55157ec7ed67c3cc2d6c8e13385d53db3846c0bc7a0686c44813a551825eedbd0fba63910b51a054297f5b588bf3dfa0164b7d01c6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ab287fd25bec001a82db8405fdfeb4d
SHA1af0be656c81bf205945993d5983ef3c19b9e9bbe
SHA256202120537ccabadcd8ed3b371d2a92b53ffaf859e5d088b251032649a6a8c9dc
SHA51267235006175117e9b43167507284b4be078ee4a052dcd0306bb4071cbd29e66f2bfcc8e79c64429a3d2643217afda24983da1e133a52320d7529ba9139dd3e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c18706d5a585a873ad781939d0d7bd1
SHA1a6d0adfdc96793c87026c83b34d5e00200601631
SHA256eb431845b530f9f2d90896c749f282a8c67fd3dcee230998973ee706f77e54b9
SHA512178a68eb4c313111823ca17095c290a1fd351ffd3158f70da4452338a4bde97fa91b1bf521225ab70d0382cc38f29e59705c52eb67037657cf5b00bd3597965d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561572936dc882199b75d1dceaabf1266
SHA12d440ec30600594b8af76e19c4fa3d0e9e7ea7c4
SHA256611f1a0fa430d602ff159da4fe017d160ac23c7dfc9bdf07e3493b6cb44ca73e
SHA512e3c5b6542bd9092694e2ac23f72245143fab7c71c5341f2ed9efa84e0314a74f16de4f8dead65fcddcbfb493b8aff65ea1ccd38cd122671316833c18da25c4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acec23b0a5b421437f430d54b300f0e5
SHA179b89c67f503c927984cedd6e1d0801c0330a92e
SHA256c4faa9079cbc74410cf04a5e5020c9ce7b1efab2a692f02cf2a053db63525f0d
SHA5127e99630605f3f10f17c350ed2b53980c3f345846007e1046a68e87b708a60c458f27e96dfa2a1978fb28530fe1c4358bfef536ddc1d9449e48eabf5c840c28b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2d7f597c2a46c9687b2a5596a6c91e
SHA181946fd2ddc9a415f518a84d0540c5efa60368fe
SHA256274e0fd72a6685281ddb478cf97c59cbabf87e23727e87ed796b03d4a30ff9bf
SHA5128d51daa5cffa74ad246ee7bb43090ded9d439e749ed87ebfc325bd8f4d50abf59fa8adada18a74d2db2807f573b356d590f32048494c0b021ece2e8564eb924e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1402d397ed12b2021dd5190a373e28e
SHA10938a4cf0e1ad90210f68f9a0c210c60b2848344
SHA256514d67605e0e88e214a801c2a71dd65d66feb7e345dfa1f4de7487e929857666
SHA512f9068a2b49ac0b49f3836f64e2bca908806004e8b367d993384709c4823f53b6acc2b38ca24980bf2e9edbd1d650877a399fc49c99290ad1d67077330c6879b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529781b1777c293cd2b44252543428549
SHA1eef12519cedba5fece40044e35681e7f6338dc36
SHA256897d69ff9195980b75ef9fa47929a46493a863761038a79e04e74a316a34d17e
SHA512bcba245ae81be8f3e612e139d6d969cce793329936959400d3431f1a793bc73db20636ce25b05d618e0e24c2ef0471cb43ded261bba713c509ed827b942755c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5486cc29b1928257d9fce9fd33d62eb63
SHA11446c7675d1f7837eb5b0c7b7f6ba22f2449d6d9
SHA256a3d96780782c90861f02b6f563d1af9a2e2714a7ebf8014ceb9c92353a063fa4
SHA512c54e3acbe06801da9f8a8e500511ac93e303995e9a15d247ef00faeb54d6f992f05f8c2116ba9ee5a5ce688296413ba9431eaae899955f3f7350b52d193b884c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3fc1a2a067045619f43c0abf0fd8893
SHA1936166fdcb09801759ec30253f6aaaac569b3ab8
SHA256af83f718d26d355a77fcab1830d8c5640f669889ca5c87d5ccb829df2b7b1c6c
SHA512c1211d689d405120dd5b52d1da946f864ffdcf73d7e0b08dc0ed48715e67038f67bed4f9520944770a5e2aae5d68b3e9b700ce5b17865c36148adb679ba92fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93408af7b339ddf0b80a3f7dd9a628b
SHA19033b0614b20fc03d807706b5c71f86b10b9b46a
SHA256b9548f3caf68ee60b9e0de25a98a8d35e141cd84ec4274fa22f6e1cef946d9c7
SHA512fb7d642a2c0bbddfd55190dc1aa15330aa190ee75cedf86099bf8449a1fd5d1fa4a3f2b75eecaa13a6336e59500126f4c2007ce568956f82fc3bb0bb80a25af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5bdca3bc8774ee92d8d91534f5edc7e
SHA11bef09dc66f93d522dd3815ebc657d03e6d20ae5
SHA25624c6a9e7a4d59dc405bb33f5186e4697ca85a9fb8f4046b11cee4078e8f49e93
SHA512f87cc5fe1a284546ecdc730af92a2dc29387aaa57994cdf72d155609d281127e00c81e0590b7e0b517b75848ed3b6fa0050412fc13392b8154e09f8b6d13a9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57845fa9a6c7ab8c441ede35a3f34f8b5
SHA14fa6b580b9f1f501dd797714eb7d5f9f86b6f66e
SHA256475711b2aa00f1acf08576008337bad7bb9f0a6791e47f276832eb117e43d7a6
SHA512602c7b22053ae5e05bef7732ac9a0283799fca3c49d7cf5c2ad85cbba3ee682fad5d0c429ec942dda099468d22e21eaec6349ecbef53eede6ecb487137dc2060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52846215f49ba437bbd44f4cd9dd2b595
SHA19202bc0041d81a688fd638f91e9caa029b0aa0a5
SHA25603cc8411d0c7e3499edc78d8cb3dd1f704b61b8c5b8d0cb2e2c187a07d5a0ea6
SHA5124526bae8ad23b5fb0f04210cef50914c112326c53517eacd8f000e50963893ba9bde0a78f1d9216785402dab82d452b643ed4c149a7bcb8fe98b516e2213c5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ff36075512db12485cd33f96e8708d
SHA10c569b4b38df0fece1b8c480184cea975e9ad515
SHA256c47e6a63d17f5fbfd159f73e293f0a385449309a2ed1d91d8b9d66f6aa62396e
SHA5129298736d50523af017fdf71f59ee6a53a6be6a8773fe89ce3b84ea3183286396a24537702535461f451e63379dc484032a9fdd9a55db7b82250033de8fc1772c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e1df6636cbdfc0b1db116c93acb779
SHA11cb43cf7deb25278a79dc27950640f84d217e17e
SHA25659c573eae17e65a3aceafa81b0f5a4e0e57c79201a96888dc52d874ee01b92c6
SHA51276445f9debf41770d159bc39de60da1f348251183f3d92be94863fe082d632fb7162acbce2b31d8ff242f4400d3ca0e00fc992849e4c9b0ed8d623ae6cf7b358
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3A6B43B1-6326-11EF-A74E-76B5B9884319}.dat
Filesize5KB
MD5cc2bb5b7ce969ed988372bacf57b6f06
SHA1afcd0ed96ca354941b26bc050f5bdbb3b8f86f58
SHA25646eb1d5d18155d5aee55c2a5474cb84e3cef5c73b2dc0cd1319621e9935e0ead
SHA512b8b92120d9ea466446e0c799b90a503a051985f1263945dc9982401841ccadb29cbd05051555344cd655f1ba03ffb64737b2cfe9280101bae6e5a80bf2e9f21c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b