Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 20:44
Static task
static1
Behavioral task
behavioral1
Sample
253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe
-
Size
36KB
-
MD5
253223b7d013cd4435b9dc4025f4b229
-
SHA1
9563f18b7036691e0a89c36190bf4a4b886b314a
-
SHA256
2981e7ba9267121664d72dbdc34c611da463debeeabfeab3ec4fad1649b1f6bc
-
SHA512
ab1d60a10f2cc31397e5997e500117f4bca2c8a274a1385f290a1ba1972f5f34bcf7568124d22d72015d866c52873c3604216197a9000beba51bb760a6a66663
-
SSDEEP
768:/PhttTnVpZKo5nOkw4NHKDRnm4MB2rHPL5hpj50EU:/Ztv5Okw4NqDBmiL5hlVU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000055ab80dd545b7040214dfa843c9a01c6fb5aa37bbaaf52b61fd8a0cfd36a01b4000000000e8000000002000020000000aae24a8944fae7a7e505b8d0c39460beef04dd643824f54ab8daf1b07aa6861e2000000077b13f7af21feb03c10c97925ecf0d02aaeb51db2cf08687093d463c6ba43e5d40000000a04f61cdf0831df6ce96901eacd07af5f318a26730281dcd6aac4313a3ad467ff343c4da017f1fda585c1b892e2a6e7e836d52da8cfb321909a886c20f6fa9c9 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20015db7f119db01 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434602217" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE7AD3E1-85E4-11EF-A97E-EE9D5ADBD8E3} = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE845961-85E4-11EF-A97E-EE9D5ADBD8E3} = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1556 IEXPLORE.exe 1788 IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2548 253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe 1556 IEXPLORE.exe 1556 IEXPLORE.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 1788 IEXPLORE.exe 1788 IEXPLORE.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1556 2548 253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1556 2548 253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1556 2548 253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1556 2548 253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe 30 PID 1556 wrote to memory of 2692 1556 IEXPLORE.exe 31 PID 1556 wrote to memory of 2692 1556 IEXPLORE.exe 31 PID 1556 wrote to memory of 2692 1556 IEXPLORE.exe 31 PID 1556 wrote to memory of 2692 1556 IEXPLORE.exe 31 PID 2548 wrote to memory of 1788 2548 253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe 32 PID 2548 wrote to memory of 1788 2548 253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe 32 PID 2548 wrote to memory of 1788 2548 253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe 32 PID 2548 wrote to memory of 1788 2548 253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe 32 PID 1788 wrote to memory of 2824 1788 IEXPLORE.exe 33 PID 1788 wrote to memory of 2824 1788 IEXPLORE.exe 33 PID 1788 wrote to memory of 2824 1788 IEXPLORE.exe 33 PID 1788 wrote to memory of 2824 1788 IEXPLORE.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\253223b7d013cd4435b9dc4025f4b229_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1556 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/pwdict.30006.00000977.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d612e70a1c77597515f48f152ad6137b
SHA1cfe0d7cff0a01e3a8f080f8c822de4206305d473
SHA256d1c90617d72d89ab91984183db32636a834d32a9683c7f5e8728483bde6d80eb
SHA512bb8a00d28b61c970892c2f6eb56fb9a769b75570da90ca1ccd5ec4740455f7446abaf2ba788ac077aa57085f5b4bcd9d7a267f0e1414771597ef1d0a11c0756b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af7a6b2878499ee1894344a67f4c1966
SHA1841a1207951ac475af340a6518e0745d03450c86
SHA256722639e6eba51ca214b43340b6f60c9dbc1dcc3c3af95bb98a2cc3274616307e
SHA512664bb8c0a2cc9c646cdd92c3521bcbad197f7adcfca6285f8472b2bba01d10bdb74982c2ace423b31a133a2100f8ff2bec63602474655e8ca4ca9d9a09c3d1ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567138b3f39b9e2f6ecf80ce24a5d4cd3
SHA14c3750de0bf0aef9337c259db3c18ed24156c230
SHA2562aa30a084dc2c395b9612fabfe7a0b1159bad333cca062b6afbbe01fb1bdecc4
SHA512c061e49889a3b36179f1f0ce4ffdc10d828d9b7665986e8024144c4c24b7b6e8fd32f3ce34a82775760786033d2cf8cd13edf82b1f5652822a286e9417b3de43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cfa3429cc4b4973666c414b40556c11
SHA1fb9baf71dd57cf5adbfa8a97efdcfe3f9fe3813b
SHA256488e98fc7aece8af43c6339b3d6cb6ca9114481e2cb366839948ba4d687c331c
SHA51249aff3b09b224e2d622befab5a544168c61d853064f0b7e2e92fa26e268a24b6ca99c5e969c9f224de1e5f1365aaf37ef6ec99e5bdccc9a8df0f2ab7f55595e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e47ea061463d9450dd3e99155e8427c
SHA105f6f5dbee63c734e4a532ee9f11527c351004ff
SHA2564dc5ab1856b7e853dbe57444f23ad3feda35a9d54faf6d1d6b4622a7b52626c3
SHA51214520f728dee8173e7bdc50a60655dca00e9a35eb067f5931bd8516f7dc0d3723cf396622232cc6475442e4ff1a1c44c6df168fbcb61f98db44e80d7b7789cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e04b298e3ee122079b83ee5c132a34e
SHA14eaa00127706d1f7ea8317115d37d774640ad43a
SHA2568e4fca6ae194a9841dd79363e10d99aa8c4fcd474853d4bfbcaa86ed45fc41a8
SHA5122bbf3fad787358937b7cf50336c4672e04307480288d142859937af874accd09cf3a18914ed4042c6ee98a13fb116290dd2e367b359af96c4adc4b17e8ed00d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e212a7ff2aa224aaf8dc4da97d17e9
SHA1b0319cb9e898b464c65f6d4473ef2a9cec3eed6c
SHA256b52b957fe9213f71d7c30150dfa7e0d7c9dfa93f729e20983c784fb42af86468
SHA5120827d3cab8e5ea1f377c54f2ee1986d3fb4e4724c5455c23686d2f9270f29261c09c12be4ba76ec21cca9cec7dcb2ec86709758be4528a286efb7c837da1b93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574cf9acbbe585836959947ee88ae7620
SHA11c5cfeecc9c1dbd23c53aa6fdd950a48fe0d561e
SHA2562861d97fb6680be8c2a690f7fd1dee9c9605a270359d2aee85fee0f99afa006a
SHA5121243cc21acd858d2cbc37ca14f92a8aa1e436b79ee8e61915c8ed6e5ca1a49f29852dd88de3cbc427fcf789807887e60455e05964a07db832886d3852288b904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e18d2532089c85371034c9666aed6503
SHA1791834a8cd7a7f70ff2dab8e14012aa021b8de49
SHA2562367c7c82af6be801d27a4f0d3c5371ef40cd60dab6e1c80c59d5f76eccfa9e2
SHA5129b81faf201562130e860e154cec3f93064b7e1d7804a1837a41e31ae8ad3d613ac24580264844da7e199e7c9dcb0181abfc3a60bcecfb0159849d13b7b8991b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5268a908cedd24c428487c141f28475a7
SHA14be29eade5422cff40f6f5500cf024f757a52d3d
SHA256d50710d913fed18519cbadb8fc05cc631eef0b5d963769c802e1b04a92763af9
SHA5125bdae1c83324892b69da623327914807d7fa53d2d5bdb2c3041e8522dd7488c36421e3b6ec5136a6cba54a598b124bafc0bd3f103403844462cd95829ba74597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3de7499e2c623b56d8137e381b3d730
SHA1e72fb7858879c529fc5888d8eca7e1cc0e071b04
SHA256953cc945808d947d287a2aa74ca22fdbc14b9d693baf961e107c45d31ca3c2ad
SHA5125e0c36a29e0a982876488be50fd7cbbb055daa32fd7737ea3a591c90e65a730318e12909273eda3df93bcb1acce579e47831c39147edd8a94a3337cb026b4ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910a639b9a47210cc9d02064186aec67
SHA13eb333b218192bf55e3fc990cffca142ae7e86e6
SHA2562e4d1de521e1afa23fcdfd6a793076fe340cfdc5c0abb7b12737b6c31295fd04
SHA512168da9a23a6f2d9842e5c9025c07c17949750394ab0bf0dea7802233cf6d9af2b4df003e8cf8dcc7b12f70a36cbd3c552849e0f17307e4afad86d170d07d0e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a9547bc0faef3db417de612372f286
SHA18782e2712ba298eba402271458f9a9b65aec69af
SHA256071536784b6877b08559fbe99676810a95df0d80f96f6e35465ed2c360ad1503
SHA512c206ac199a3613c4db12e35d2417b0acae9ff5a1fbb3d0e6bd23673d242f9dd15d99280798a7995a5b7c1efaa81d7cff9f5d837c7a723e66dfa3eebd0e4f8026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea9b4df7b9e230ee9aee147d744fc4d
SHA1686b104ef08ab335142ce3d760f9d347cc9fb1d9
SHA25617e5c7e5b93a66e9872a45eead73707262f2e538d11cbb67bca577fffbc0a9ff
SHA5126f2035ff132a08710c4a300c310ea59ef3c9d2b6c59ea93213a5963c1e1b6d1a2b2e3eca81dc5ad0cd12cb7a913a0d4a1fa876d7a360a857fda1be6c871c7437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55405cc3beeac760f88d34e6178e879b0
SHA160cb0cbf86f56bc929fe0d5ed1bfba679ac3840a
SHA25692b2c2abd8c4ef6fb4be1e1a83aa9c29f728fef4d463c211cab63e0722e65c25
SHA512f9ae2c7d88a66a2de18fe5b8ca5f486d357efe62368751f08cd4570fcd571f33965fd32e46e0af44e97dc7a0aa48193afa24f51f3bb4b81fdfb687efafb75f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb1f6bd72269969625bc593ad2dfc0ee
SHA1a0edb20608d9a24efd5802b11396360927d2f0bc
SHA256ecd52f876887a92bcbba46a9986d6bb7048e27e53da12fd06905992a424c8c93
SHA5124e2f2e68b441fee8acc36b86103292f8eb847b1133a03a4c26905885184b500ebd329cb3ea9c118c54679da3df8fb578c17fec1f15a0b53216273a2d6b275682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d1705caf9b958e6f1d91f1f9d1e6d1
SHA1c08094f895191741342511e6059ff34335087667
SHA25614068fa61f28b85ece8eaa35eb42e1fd063b1bebd068ac486026a530987a240d
SHA512869b621c3853226ecfca874635d76df1ce77dfec0c7d8a30aafcc0bf5920e6cfd19361ad4203dee7f798776970501df0f83be9074fd0976d43bc502850515328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d4a2ccde2a36788ccad2b97156f315
SHA1315c8adf9e5368feb7129410484b2130c8704119
SHA2569fddd78088b3f3ccb63b2ff08181711ae8e715ffdf98a5ac8955bd3ec0be70e6
SHA512e161b523a7a8d66427a88fe2915c68c09e2ca1206bc7cdd90e9a46115b0af933dcfeb5c009b2291e43763b41b28bcbe350a8a402cdde4194e96f1c3fd280d133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52839d6a8a1dd4cd89b8402e64a467af6
SHA12cb114ab3940bfa491b41e648cddb78b9c541086
SHA25617eaaec29d6b7220b235f636eefb2454fb699a22797a3b01c97ff6e187f8df71
SHA51283537ec0f8db95931b873287651d95bf78244b9c9f20f80b70a8fd2153f0298ca689d108d31c5ba10cf51cec22f37168e3f6afc982c467059b671b5e2b916f97
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{DE7AD3E1-85E4-11EF-A97E-EE9D5ADBD8E3}.dat
Filesize5KB
MD500ba8b35222f4f9d827831f5208291c8
SHA1cd959bcac3960edc054ea7922304dd4b1443aac5
SHA2565980402b7c75d0c77ab1ecd0901b0282395f130122d9759970e4aaf6e59dd530
SHA51251d1ac163fd340f0028d342ee307db4fb81bd4fcbfe66c89e2eed58968680209918da4846e82085a212228bab7fc6d64d9d7e5923453c5274d4409f2bfcd88b4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b