Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 17:18
Behavioral task
behavioral1
Sample
dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe
-
Size
116KB
-
MD5
dab1dbeed0f532bf082fa85a6d5ed72b
-
SHA1
20c66b7817064240aec652224cda40e8f2fa6aee
-
SHA256
0a924784d4554492b27911a4a3ff37feef6d2a89855d4b75ffdff8ec32970c67
-
SHA512
7076f67e53569ec1d6aa62aa4cf737649b7db517e47ecf9818c1f940eb4c7a808b6904dd73a8f675fd96bf679067dd2b654cad8e50298654720d7238017dd1cd
-
SSDEEP
1536:GOC0FvV4OguHxjhpA4Bm7uW0vSUsghQevBFkutIbgTuFqKRr0aF5frleGhd9TfBq:GwV4OgSzBmh04eZFkz3Rr0gwGj9Tf8R
Malware Config
Signatures
-
Ramnit family
-
resource yara_rule behavioral1/memory/1976-0-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/1976-2-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/1976-4-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/1976-6-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/1976-8-0x0000000000400000-0x000000000045E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A2F0D0C1-B651-11EF-B33F-CE9644F3BBBD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A2F3F571-B651-11EF-B33F-CE9644F3BBBD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439926589" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1816 iexplore.exe 1920 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1816 iexplore.exe 1816 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 1920 iexplore.exe 1920 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1816 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 31 PID 1976 wrote to memory of 1816 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 31 PID 1976 wrote to memory of 1816 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 31 PID 1976 wrote to memory of 1816 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 31 PID 1976 wrote to memory of 1920 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 32 PID 1976 wrote to memory of 1920 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 32 PID 1976 wrote to memory of 1920 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 32 PID 1976 wrote to memory of 1920 1976 dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe 32 PID 1816 wrote to memory of 2720 1816 iexplore.exe 33 PID 1816 wrote to memory of 2720 1816 iexplore.exe 33 PID 1816 wrote to memory of 2720 1816 iexplore.exe 33 PID 1816 wrote to memory of 2720 1816 iexplore.exe 33 PID 1920 wrote to memory of 3012 1920 iexplore.exe 34 PID 1920 wrote to memory of 3012 1920 iexplore.exe 34 PID 1920 wrote to memory of 3012 1920 iexplore.exe 34 PID 1920 wrote to memory of 3012 1920 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dab1dbeed0f532bf082fa85a6d5ed72b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5144e629201b98c1740396567fadde4e3
SHA1bea629125e6d96b4a0b771efe3ed1193f115bb1e
SHA256d4b8580a6e9a11de048de7daaa0ac9f94f391ae980bc32d0fe5a6dcb9e9b6c7e
SHA512b4402625b89d99785799128809c1678b9efe06c1e982b138802059a200e817b2360cd5fc351d2f7dde015d172c561a4ec5ec848708cfeae75146a522f2a5576d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ef0ad6868b0533009cb3d7b0da8d85
SHA13f5fd9f72224d8ff596c74b617cb2809868f0bcd
SHA256c636b7507a6d1e29072f86e13e86d32abd75b6c5b6d7408faf809e5cde09dcce
SHA5124880a9c99b175f6aee3d783d908d8e446069cb6ecebb4f1ea18a8a894a54a0363ec36d01e6777814d768e447e4b9efea30a052a60eb44a01ac646ed80c40569a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d07b2aec0debe19b8936392ed6d68c1
SHA1ae47558b3cca41245c27691274439901567f607a
SHA2564423f8657f04930c4a046a680389cab52080fb48c44f64043171b07840c009b6
SHA512ea9aa1933bcc648db33951f6cce57d8892efd2aff49fdabcd7c0754be76725ff4e87652465c2e49d44876ee056874d9f19e839097b7c509b03a81e816b7496b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706865f8ea10cf939d817e33a34c4ff8
SHA1d308b384b889896d8ca08bc12c50ff58dc37c16d
SHA256c8878a7e674d19166f382de6ce9457d8f6a81f68c46837779ee86adbf096e23a
SHA5120f60e04a120a48803f138e04934c193b322f2c2c001f9c2d1e870d855d27bfde88d70282f5a8df701ea07746c4ff2c362307954f5d260dc4718ccb14415565fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b940647e612e5dd86c58c1a3e2894e
SHA147f099e205240945fe3e5362247f29f4bd4fff48
SHA256050bbff2fed85626cb122e8fcc141c9b9199210bc7f88787e7b8c424fe679617
SHA512424609e87a53138e1aefa2d025f4f1dfcee03b22923cafe258bff5d069443c9500e45316ff722d67a4b4d60f635c1936a3e83534b222e1b20bc96e168de44ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d0e46b78e45a0ddc94909408c63ea9d
SHA168e1d3244fb74a9e5e7209c9cfed34b4764f2740
SHA256e8bf4451d1ef503ea737a998b333da8b9be4c65033b41e94b635fa939fd90d90
SHA512a5afdab86267dcfe54d1753fbad2c685082d8632f120def780978d9275b55634ec5da10c26acab700b09898939cd91886bd7ae93bf3c979bce691cd9e111cbe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230c76cd77d0f6e4745d4ba48cc711e5
SHA19f751ab9919f62fd0fe89719f28c03158ce2f0bc
SHA256fc71bcc8928ff69fa581ad90c73a084630cc63988b30597320bbe31190cef2d2
SHA512fb136e75e34d0ce0a75b3206840a4033d966a567f8b92614af127ded213f1ece69ec7b373aec50e82707490b61805d736650fe8238d3a6ba46eaa776b85a855a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565cb3db5a5971b37eb75b6bd892d8c5d
SHA17c416fc70c021ccce8c70388db8a7a3c77e7c314
SHA256b09869317b21f5934dce51180e912322204955052f14765af59141fa4f27da3a
SHA512ac865ec702bcd0838a4657f8fd6080818978fc859aee0b16055102402c56636ec56fbe4d921bd645ee4e260729b6f53aa688568c54255431fb0bc954a346ea99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a697cc84f25e89a5745cde6f60cf8b83
SHA172a8738549719c72b7692aa68765ccce832f024b
SHA256d9ba4a9ccd9f73649fcb91adeaf69e46add2b8425278239cae7e8c49c1741729
SHA5127b0a698310f6b582feb9ec650ffd67d4ae166aaeca81f835a0fd4b896e03e5e3a68e5d6f2cb34d5670ce3d870d71852f163b364a139251a129232431b34842af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5102d3cf000151412d4aeb9f73aecc0
SHA1e8bb4970d6752ac40bd92fb221bbfa0b31d773f4
SHA2564078da0cbae27639c55c37dc6dd15dda57e45ce6da3276094f8646f09dca98e9
SHA512bdc85b7119f2bdad30db156b8c1d6a6647de27e860a11166b70009b36f6ca9bbcc14f5b6dfc00f926861c4f15c9cae08dcff36d3265105970a5e90564212d7c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da891ec57bf5f235243fbb2504139186
SHA172e58b67e7e18bd18d6a6e5d1cbaa9e637242897
SHA256f2465ed23ea447143c7258bb76eeb7b871f52cbb0281f758e292b64c7174555c
SHA512d0865265b921ea8af027a6401aa4a3ed7cf3fa0d297009c8cc9fd11aaa8782c7954c12b5d4b801667c584bb8e71e80d241934e9f335f18652ed5ce5c923668a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576692553195b6358f1bc67cfe9948128
SHA1eafb1fb07e80185baa7b3ed6d831fc08a453a9c8
SHA256ad929f71f3eebf0c6f8682a93c19ef732467efd54a4c5c5e4bbe1b25654c886f
SHA512d1ce7aad726959bd70a17094116dbbc7c49287445b72fd3cfb3e32494c907d3b6cd1c9efaf1ae21360c61606a8b96cb8491eb0f3359e7fc62547ae6b390e1b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207c7e53b812e36c129a20635598c1d8
SHA1fd812c3455d1aee78e71e275f2f5c93d8bcba729
SHA25678c30a2f76c0188987ee7d3e23cb514a5c61f6d33eda5b828966f7deb7d63971
SHA51290d988e45beaecaa784ce0f67135241843cab1ea2f7a51ee2fd50447ddb0c83030681d433382dc517bb6b28f0ee3198782b9d7ba333a6af81fc3b62778b92799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240a7194d408dc63fb7825baa0e11523
SHA1f912b25030dafe12dffc0fe02e1bd6c9705284fb
SHA25621dc6676c30a65e77bde6f3c83b97667b4f3956400bc28ae8082d3013d910dc0
SHA5120b1e0730d919566f1269302e079b32f74a1332ac0e5921c01fc9528905bd189067205c587fa6f65bb5e7df16af29e3e19fdd458d3d02c1c2ecac1e0919c34fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c3bee0d04c029fe1edca505348993a
SHA10b08d2f23d6d0801df18d3e4828f0f8461e0aa93
SHA25680e1ecbf40c1d71d5000cf2faf6abe7fa183c224ea84b40aabf804b18994bd3d
SHA5128c567860e2191e416c72d39c8ae5f5f63c1395e70ea8326217a6b8cdaa2be2df3f4b1f4cd799a279058a7e102c40b981d966fd7900fccf5596a11158bb94f19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a87225f0a0441361438b94fe812f05a9
SHA185c133e7dbe1855fdb95a39d1bc86ed115c9ba15
SHA2568b2b230eddde3d02454ea0d691eae87eefc01544980fbdb8f45dccbd4aea3c53
SHA512669eb6eddc7eee1a0edb0de3c607d86438a29b1538322833347752a9b428d4e1c3c742c8ff795c58ccf0d4421ebb4a06c548ec687e286e648bdbd4fba4102210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e69f9fd6a76b72980ab766c4c1c03b3
SHA11b445bb93b5ced18e18c9d29b857a819011237f4
SHA25654bb7427e3d1cef256491a1aaf7a1196aba8d4a06551c7e4b4cf76a6b1847688
SHA512be25ca3c516545d24f5f976a05f2ba2b323831a7af9dce817fadc16875541474cc9441aff3ea63828c1f48a32dcdcee41e688541261b4e0d754d7354ac92a09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55306ec632996c373ebcfb0db2b1db118
SHA17e0867e03294a1217127e663108fb31f4325f225
SHA25668828cdb4afda4e36eb456a77c25ad0081abbb6221b171f50dedc7a803990426
SHA51257ee65d0647e51b5916d6327a91ebe8afb23759842e49fe166b6c6bef342007fa87687677e77cfcbf9c30e467f3d788878b57e7c59b07115bc19d4d00a47101b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad3325d337d2de98c088d1ce3bb0578
SHA18d0743fce69b13e49dd4564983c7d15b8a3e8989
SHA256d1e36cdd3713cd773719d102c6c414ce8c93ed55ad9f36f8f89acc27ce3476c7
SHA512db967d81c8215de8e820fffdeb27e7ba294999e5b2898b353f815b224f0650d502de78d8dfef41b6f2722e4f187575a78a71df7c8b5510802f28aaeda4648815
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A2F0D0C1-B651-11EF-B33F-CE9644F3BBBD}.dat
Filesize5KB
MD5a791ac9b2ea8d5c5c7bce86c2b811e06
SHA1266fcedf8302ef777fbd841218dbc8d1915f5b76
SHA2566fc5e139b003232c96f3457eaa1e2cb3bfb796d8dd334dc7ba90504b3cfed1fe
SHA5121c52b0b484aabd388a30dd76419e8e72a0b1c50580e0cdac315783cdd93cd0aaba98d93cdfb721a7bed60d170d27f2118551f2ed64253f3b35aa8b4142334c7e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b