Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
1144f87bc629d720930f5ce8331941cd_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
1144f87bc629d720930f5ce8331941cd_JaffaCakes118.dll
-
Size
508KB
-
MD5
1144f87bc629d720930f5ce8331941cd
-
SHA1
0b3478027aa2652db82a7fbe2e14e93326692a90
-
SHA256
56638d3bc8f0d607599f32184885d78770eb5c78f938d2481f0229825ade637e
-
SHA512
5d78aa507c7b30e93aae58cc1ef6e72a38ce18e4a40137494975987c5c94ba0062685ea13440dac730a55509c909be539a612cb27934d9b70a910f8c8214ff7e
-
SSDEEP
6144:hhwcskkkkknffCp5CrRKlua3Bo30fHosMW7yefxmzSdrFN1:LwqqPokgszxzX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 536 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2340 rundll32.exe 2340 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000d00000001226d-2.dat upx behavioral1/memory/536-10-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/536-12-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/536-14-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/536-16-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/536-19-0x0000000000400000-0x0000000000470000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3875231-81EF-11EF-8D6F-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434167146" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E384F0D1-81EF-11EF-8D6F-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 536 rundll32mgr.exe 536 rundll32mgr.exe 536 rundll32mgr.exe 536 rundll32mgr.exe 536 rundll32mgr.exe 536 rundll32mgr.exe 536 rundll32mgr.exe 536 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 536 rundll32mgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2064 iexplore.exe 1804 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 1804 iexplore.exe 1804 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2340 1636 rundll32.exe 31 PID 1636 wrote to memory of 2340 1636 rundll32.exe 31 PID 1636 wrote to memory of 2340 1636 rundll32.exe 31 PID 1636 wrote to memory of 2340 1636 rundll32.exe 31 PID 1636 wrote to memory of 2340 1636 rundll32.exe 31 PID 1636 wrote to memory of 2340 1636 rundll32.exe 31 PID 1636 wrote to memory of 2340 1636 rundll32.exe 31 PID 2340 wrote to memory of 536 2340 rundll32.exe 32 PID 2340 wrote to memory of 536 2340 rundll32.exe 32 PID 2340 wrote to memory of 536 2340 rundll32.exe 32 PID 2340 wrote to memory of 536 2340 rundll32.exe 32 PID 536 wrote to memory of 2064 536 rundll32mgr.exe 33 PID 536 wrote to memory of 2064 536 rundll32mgr.exe 33 PID 536 wrote to memory of 2064 536 rundll32mgr.exe 33 PID 536 wrote to memory of 2064 536 rundll32mgr.exe 33 PID 536 wrote to memory of 1804 536 rundll32mgr.exe 34 PID 536 wrote to memory of 1804 536 rundll32mgr.exe 34 PID 536 wrote to memory of 1804 536 rundll32mgr.exe 34 PID 536 wrote to memory of 1804 536 rundll32mgr.exe 34 PID 2064 wrote to memory of 2812 2064 iexplore.exe 35 PID 2064 wrote to memory of 2812 2064 iexplore.exe 35 PID 2064 wrote to memory of 2812 2064 iexplore.exe 35 PID 2064 wrote to memory of 2812 2064 iexplore.exe 35 PID 1804 wrote to memory of 2700 1804 iexplore.exe 36 PID 1804 wrote to memory of 2700 1804 iexplore.exe 36 PID 1804 wrote to memory of 2700 1804 iexplore.exe 36 PID 1804 wrote to memory of 2700 1804 iexplore.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1144f87bc629d720930f5ce8331941cd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1144f87bc629d720930f5ce8331941cd_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a93b06dd1f663ae02db41e9d516a2ef
SHA1d1c767ba700c9f2a837e96fa858a3692cb710f97
SHA2568e52581506bad66a9baccaf5290369f2a04f8827af95aa3f6257c1cf9642fc7c
SHA5126314455b7ac015cf3183c5ad25bbb82157fe356e1f1148b93cd74eb27d45afcc050d042124f7d1d945f8d53b26226e7d0f3bb736c3826da47a20ba6f966aa711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a82f09b04fbe3842a930aeafb674484c
SHA1ff60a81f3937cd768140ea50f54d3d9ada67f1cc
SHA256ee9531020556ece62d1e904b122e412a1a52381cc81b4856b2efa87e3f2cac05
SHA512b50813f1969bf3bf06d89d602b87ea606e7fcf353be9821a172cd522c1e915fda4e31e3e5880891b110dc27fe0becfad2b4122c34a81da8c692c41c06327eadc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b7210db192f13235d5de385cc45679a
SHA16585a6ec903f568dedbaaaa898e5cba8d0141d6a
SHA2568c62b7aa989021cf34dfcf628e4de2493ddd943e5815413b571fade4172d32dd
SHA512de3a36870ca0ace0dc9dd22efef7912f39e251e7b8207f1dfc345ccb7015f775314b48c119b326432547c28bc3a3db1701b6388b3278b77e7a488c4ee235c69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695aa6536f101ba4eb6fc54b18bf1d8b
SHA1a754d47dedbaba65a12917190311bd1f3bfd2d10
SHA256579140cb61e94d050be5134b7d076a9d594a463d461e4671654077becce1dd69
SHA512119300d0db297d37259b5ab8b60b4962ce3d513ef373e5f60aef8c4b9275c9b7ebce027662307e8898e9dd335fed6495dcc853ac45d89b0040b811988e28effd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abcde46760000dba6a67d3aebcbf52f
SHA189f6cfc20bdcb3d0894361ab4ff6d8c09d95dd80
SHA25675e8f67658488376c7f0cd260ebd4ed6a08f442f8db1671f77b90d5f342647a9
SHA51243f7bea4a59082e8c33934d922007c022f37b87baf6879d8bfdbe0c5eb69ad91ef4352e1e10f8cde8b58d4869d05dae28e962df49246495882c36bd803179d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf065bf96987c19bad560a3df3d3e8c
SHA197cfab64466e39f26fbfa992b1bfd4f6360a5791
SHA256e45db94968860c3ee6f0a3d6623b77d8ff557f394dca1540ef4d15e994d845b8
SHA51287c470a7ef1789c055a03a9e1fe504772263e6c4724ed43918c72d80fc6bb4582c32d659f529e92dc1b45b774da70b3cc3b97a2d516007e525da4293fa288063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555cd10569b5f709c40bf239cc26c9991
SHA1c1931d0b8fae0ebde69ab4c84376bed9ec30181c
SHA256805de1ba4279fc598f81e9cdfc45f44ca0b79718f28ee1f52f2f5404bbf810ea
SHA512dd8c0c83ba825e9e5f27dc727e19cde5ba3cd6a2c80f76979924be8858bc395a78b99675b1b237d86966b047a0abb003eb62fb088b0721426131febbc67f2c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ace7e132797c62aa6280cede9fa6d51
SHA1d044ce9a8881209affd7b04a79f254f8a69d973d
SHA256f5ddd43fbdddf2d688973387b10aee493081e50d4266743ea664e1bff0f29224
SHA512765b23f8e0fe14e7d9bf2031317fa310fa35813ba0bba77814d805c49f1a73a31f8d1af0583ae1a12354122b207f0044f413c01580dac443350afb1d2bfd3336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718180ec9fe05d3662008bd88e42ee4f
SHA16c416f10de7a0404486af2831545fca515174ccd
SHA256b39c6baf3acdc826a082668f8207040abd200e3ca909d92680c9a2d7cf4f6c3b
SHA51211d986ba2943de06a150150bbee3bbff1fd33bbe7549873418d8712c2a98c3271a68393d9a2a64637db1da23d77a159701de7ddb732b6511232fe906a29ad24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b38240a0a782175517954ab12e8af4d
SHA1c5e43717f0444ab25631deb2b684dcfd1ed5ae00
SHA25612aca675162c5482f3092d831dd6abd8281280c5299be5c137e8557d5de34703
SHA51220fe55ef467abd4994d605113126f04e9bcebf9eea139046f94ebbecfcbe5c1166809e658cb58c7f943e1359a7e770d901bc30d7ec65bed28a8eb61b92657993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d13b4c94a92995c762e0b702e1e8b0
SHA16b928c678913dfe644792ffee5285e2254a5dad4
SHA256b4de5418d5f0706a1742f6bbad2c7fcd8d695e0ee56b720f5b99797ac143129e
SHA5128433c9033727f18c432d2e9a30bd5fe7cd2a0be7572a475dcfc4c4b3947f321c62c97989ff876e36275f80f6e7b941a023ce6d259ecf4db23a30c1a0b48a3bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54edb5d6bbdc3601d09134627982a1c36
SHA15074aa865856db511054c136c669bb52895ad07e
SHA256bf285deb4535e59f23fc840ebe3fda750072b116c89f5d62d5aa86ab55ff5c26
SHA512c89fc7f7bd9ba8cebdea11d362eefa6c3afe397a4360c92fcf04831859995d3783af5e4c9c3d45a8ab333548b16724efc0a315396d5dc1491a0e26644fb54b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9f067dada5822bf72ec4d94d1984be
SHA1c47a23146e601652f897ecbd1247898c090be000
SHA25652d099c683e34c1fc687ac3d076d5a76d637d246b93b46963014d6fff73a9fe4
SHA5125e3f710393fc57b29774fac0d7bc5d1076ce9338f615a2f6c827e4e4084dfb76ffa8d9f12dfe1954b1b6390e72727d85fd49bfa7111410d150fac94654012c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52964a556c13714af74bd98f5ec766da6
SHA1e9c04d943a5308035acfd71302c5779ac139d8d7
SHA2560a7715b3db754f9fc69636df5a689b6cb41184b419de029b0c4d7fda28ba6439
SHA512b671404aca6ade5952ae8aa974b33d65a58c8b1d0476b4ae08e9071ec329e50e287303e40ca82ae21646b2b1b70b17b6f2ff25412674668ce158d3f67a98ff55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5375bd9e6c5fb285c9e1c12e1f671e6a6
SHA1003ff6440ee6aafdf251e58c3606d217a282df2c
SHA25689666875402ebc659a9306774b47ce378fb59e139fe4eb49df09a8de22e82eab
SHA5127bb1fb8f1b4e1979e2a097083afaed383c5890dbe149f0f265656a61c8ae0255c320fabba38367ac534ec16d57ed4bce5b86cafbc30f29f87df75b03a4ac7f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b0b78ad0611b8c0607a80fa5a6cdf6f
SHA13b75c9893473c5d20b093b39a5c8785f71bb8094
SHA2562ca98ff225d83a3e2fb1ddc00ed13d0af9acd61ea6e59c09b3a8e16173d81898
SHA512c5bcb9a4b95f093cacfa1ebf386db22547f3905eac51918f4556e99e84956c5d9990441c4871c9b6b4e9c4e3bca7e3cbbab31ec27be0e22f142584b5be99c5f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f44cb33df52338c85fefe30cfc9b90
SHA1806213a734dcbca74c9694461291a5abc2315ddc
SHA256aeba57979261270e82a07b9af0bd78af176240d90b9148f9d8363538b493f957
SHA512869fc4226b62eb64fb8cc936855748c7eaea3dc2f02b0d2a8eef4510b3647b01673114bd3122a5cd1d693ca606228f02c1b1f39a29a74da0edbbd06e93591c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541bc8fc3dd1120fc824c0d7a0e5e525c
SHA1cce1bbadc7c232c3a4324d1848f1b99f0ed750da
SHA256eeb18742e2df3e607f11299c91034d0a88470a724fe4d9387c516dd35b1d1dac
SHA512f5d78d61a600165d55ecc31570408861b0be2771d4f54215d13d0eb920ed7307d9ea99abfb0bf0f7b31985aed200627cb5185e522fd8379176ca512253fd8ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290e954f5317e6e6b93f518a20a52c39
SHA1fd39463916ea69d616ad28e6b60b5038ff50dc0a
SHA2562790e2818fd25435d26994e52629a806be9120e5b33d0b05f1bde444a998fcc5
SHA5129295272fc073e5433fc6191866424363847c3fa96082083953764b8744a7ab7e203e96b167285aa2d99102bbfcdbbfc09d7cf9f7ad86301dec3db7e833269949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53505523665ad64f44978ddd7d98d3f4c
SHA1f5394209777e942205329a99fe31f4af4442168f
SHA256decbe941e36660d7e33a87d54325b29e01ff605a906b5f205da137018efca902
SHA512f5e03f9c9c74cba6ec90d0f79ab59468b8caf39d9b0bc78a124bb26846c9d3cacb3e55c784881936e6f4ce070221bf06d4314549fac1a34bd16a0b7efe17e959
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E384F0D1-81EF-11EF-8D6F-62CAC36041A9}.dat
Filesize5KB
MD5040fa37332131859d8a35fa913643c9d
SHA1f0f56aae5836ecd9d1ea7b11f555cc13f5801b36
SHA2568681062d0e22fe7f4188964b54442d4d50675b7af99c72b6cae868829d7cc63e
SHA5127ee7d933ff4382882b583dab2429343a2592c3eb438b97afb9d15f75ceaf3312d70243b6f1b2e2ae2206f6e3ab6d5416095d46781fabcd087fc9d8726e9b16bb
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E3875231-81EF-11EF-8D6F-62CAC36041A9}.dat
Filesize4KB
MD50962d578db0afbec9cae08759a589c2b
SHA11d6b225e39aad238272f53502d758533a8077a9a
SHA256e14772227b2cf7f832f75d74b375114fb2eb8ee2ef474e62bd57296a11daa3b5
SHA512487375b395526f9132f61304f2533e7f3b4feb9751899523409f5ab58611757fd02e55c03fd890ee82f2557ce4d0310698a834a531a7828df95a6c6ee38fa532
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
220KB
MD51b7fc3fa0a84470506c3028b48a5f04d
SHA13fa9f258fd20c92c0dd366f1520d44f61e236d3b
SHA2569f62f582fc02ae7b3b5df9a8a90718a80773eed10828014cee2a938976ab056b
SHA5121259215288d11be9493abc5d9babec8ff2563be3ed1aaf47fbda3f5832d7604f4f5956d09a06854ff133fb9e0971ac398966c46c743dee3f0aead6a2d0901c19