Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 07:48
Static task
static1
Behavioral task
behavioral1
Sample
fab0884d2195505ff7f09bd8d3722950_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
fab0884d2195505ff7f09bd8d3722950_JaffaCakes118.dll
-
Size
711KB
-
MD5
fab0884d2195505ff7f09bd8d3722950
-
SHA1
f8d887f4c6a26d149b5a24f4b99cffa0da21b9e9
-
SHA256
d9298f07aac5622c157269d51694152eb01f4557d11629dcb0e694f38be6e4db
-
SHA512
49d702346b2ecd166096e7ad786e429c8030518b865d1e1889c24e2af463321e0f0caee021a949dc135872617644909c47e3fb66adf6b16b50612c2c8127c97a
-
SSDEEP
12288:hNIyZN4+Wv4PLq6Okrh9ZN/hs9DsdBPDn/WOGR:h9TPmirh9Zdh6m/WOI
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2188 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2972 rundll32.exe 2972 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral1/files/0x0008000000012102-2.dat upx behavioral1/memory/2188-15-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2188-17-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2188-16-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2188-11-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2188-19-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2492 2972 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E13E7A1-BD14-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440669986" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E18AA61-BD14-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2188 rundll32mgr.exe 2188 rundll32mgr.exe 2188 rundll32mgr.exe 2188 rundll32mgr.exe 2188 rundll32mgr.exe 2188 rundll32mgr.exe 2188 rundll32mgr.exe 2188 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2188 rundll32mgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2488 iexplore.exe 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2916 iexplore.exe 2916 iexplore.exe 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2972 2156 rundll32.exe 30 PID 2156 wrote to memory of 2972 2156 rundll32.exe 30 PID 2156 wrote to memory of 2972 2156 rundll32.exe 30 PID 2156 wrote to memory of 2972 2156 rundll32.exe 30 PID 2156 wrote to memory of 2972 2156 rundll32.exe 30 PID 2156 wrote to memory of 2972 2156 rundll32.exe 30 PID 2156 wrote to memory of 2972 2156 rundll32.exe 30 PID 2972 wrote to memory of 2188 2972 rundll32.exe 31 PID 2972 wrote to memory of 2188 2972 rundll32.exe 31 PID 2972 wrote to memory of 2188 2972 rundll32.exe 31 PID 2972 wrote to memory of 2188 2972 rundll32.exe 31 PID 2972 wrote to memory of 2492 2972 rundll32.exe 32 PID 2972 wrote to memory of 2492 2972 rundll32.exe 32 PID 2972 wrote to memory of 2492 2972 rundll32.exe 32 PID 2972 wrote to memory of 2492 2972 rundll32.exe 32 PID 2188 wrote to memory of 2488 2188 rundll32mgr.exe 33 PID 2188 wrote to memory of 2488 2188 rundll32mgr.exe 33 PID 2188 wrote to memory of 2488 2188 rundll32mgr.exe 33 PID 2188 wrote to memory of 2488 2188 rundll32mgr.exe 33 PID 2188 wrote to memory of 2916 2188 rundll32mgr.exe 34 PID 2188 wrote to memory of 2916 2188 rundll32mgr.exe 34 PID 2188 wrote to memory of 2916 2188 rundll32mgr.exe 34 PID 2188 wrote to memory of 2916 2188 rundll32mgr.exe 34 PID 2488 wrote to memory of 2724 2488 iexplore.exe 35 PID 2488 wrote to memory of 2724 2488 iexplore.exe 35 PID 2488 wrote to memory of 2724 2488 iexplore.exe 35 PID 2488 wrote to memory of 2724 2488 iexplore.exe 35 PID 2916 wrote to memory of 1700 2916 iexplore.exe 36 PID 2916 wrote to memory of 1700 2916 iexplore.exe 36 PID 2916 wrote to memory of 1700 2916 iexplore.exe 36 PID 2916 wrote to memory of 1700 2916 iexplore.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fab0884d2195505ff7f09bd8d3722950_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fab0884d2195505ff7f09bd8d3722950_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 2243⤵
- Program crash
PID:2492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5688ed4caa12d4f81a68bbf5362be702b
SHA1b85593ff8d59137cad269f397cd7ded4479b06ef
SHA2567bcc945526c7355ebb7f48270c814fd208a0d19294d379123f46ea79c59998cd
SHA51240006e31baad985e6a833de54b3a1f7e4a3f5b3b10c6c57aabf26f9e2492b611460af63e276a2d610ce93c3546d695e760223d4ada55d37302d6d89570e43667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50458a75af3f6095996d57139e953afa6
SHA14678059ea0c2a1667414a158bacfd8c19d44aeb0
SHA2567956e840082d90b59617b42ebe48398b2e3cf32b201333588353ba8a69b82fa2
SHA51220af9f481a864ca938edb49bc985421259709d24602ec3311c4f681801d9a2f04e7333b917466e6861f19acceabb5f14e95e70b2111937b06c6640ea4a0a6077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b38ac7681a73288197325c6bc80d720
SHA1dcf42ddd72d0d53fc7f5de6e484a2aac9b0aa527
SHA256a168f4e1f724baba36fdc7d88c3753af6ccefaeebe236d0b7e6f9369ed288178
SHA512a36bf7899968630af02518114037c3187c009f1a8ff7964bfc192bddad9dd79dcbce342c110cc316860820ae3023fcd358b84029284867b03a4581776cf179d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2696ed0284063979402a1f62cb0b825
SHA10d61d5a7c78aad5ca88d62ead7b99b6ce78103f9
SHA256e1bac3987f249535d2bb545f7a833d8708525680273507d797f66c1a994acf9c
SHA512b79ff2e2d332c5ab66631d58f780281bba26747ae308f8d7630b327243691f05652df463f1644d2f27aa978708b1a56b577953ab14442dbd24ef08d67dde32ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb5bff4ece74b4d84621212d9417b004
SHA1be3275f7a05f7d6cb9eb70189e673824ce842451
SHA256e3ffb28298c6ed8e322204ec1af21be38c8035a4b419f7409b1207d092b7a7f8
SHA5129306c9c1ef059e0df2ed24c4bef6c9c544a2c8b99b055198606b83fcc36306029f9ec248f801d4ea1b0d53c42cf346b479ff5d8fc4b8e6940caf38273575de13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3a74ccdd919cd70ccbc477a8e5a558d
SHA193818819b8ab94e0edcb077d9103700896e14496
SHA25629f2baa2e78aef5a96205d5c129b817927bfa49034a385ec42bcac4070869ac3
SHA5120d8fb8fe7b793c58c7227a7c919fea6c12f61df23997e6ee2a6baa1a500a96b8d01698f9d186ab294ed75e3abed66aa26b69b6c63851ac0296cb3392311e2e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5715ac4b61c769c6141fa9a5bf8028527
SHA108a02f37f120263515b44d9aab95f58aa8966ce1
SHA2562a4548f2b74d48618a440966e629266608d5ea731818d071fb3b0e93209fd665
SHA512fdaf78824631b7f9d119ceb075cc3c680704f3325a8996df5576afc445cd1663e4950100165fc20d265ec460f191c134bce1ced457a1a444168e5885ec848c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273d5109cf9a9205ef5263467673ee95
SHA1b3b37a0b0d4a9ff1a757fd0eaa086e57cb56a7e9
SHA256a77a51a94732b80762a6fa7c7e06507ae3914b6d586f80db78a4f3f4360bca6b
SHA51263843e32acec5249a3f636331e84137b07bd8c353e94a8710abcdfd161c2879be8a31fed8d3fc4e0fa278722be9a7e71593d90ff0ffbbe3ae19ba722aa82356a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdb4a27cf30270aff476592ad5258dd
SHA1af66c02911f1ce307abce4a61682b9b5ef3a72f5
SHA25655f51b2c0c8989b3e1cb6f52110a74fe7df6abafed8cf7d8ac19522a35c43e5a
SHA5129f03e56e2956bdf014cbf699ddf2879b61fb775dcd512160aa8616150c20af80db2b713ad1d6fbccebe38154cbf2be494050e9787a919381f3b5af2fd8abfa52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e593b0320c81af6be351cba8a8ac84
SHA10f43ffa149f36b0eb42c9f923af5f88b8971eb94
SHA256ada7f2dca7ec6c861fec8dfc24a7d89d1ef124113ff011b425eed7a22bb61a77
SHA512a5e0b0939286933d5660221bf0627f91f278be15483985f8724e60c71e04cd2d86e432c3a4888e373320329a19a3cfb71deb9d8df77ae8fcb0e26f6ae70b5427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6068fc22b3e84ce3b18b30523664cc
SHA1aabf59fbe12aee756b20ad7044ba1fbfcc7a346b
SHA2563345d04bd8d4d6eb5b2ee00f23d4057db2adcb7ae256ada435ee0236a5d46c7b
SHA5123c4c8693ca10f8293cce5ca41bc5408ee6b110a5441337363c15cde723262b3b01e651d5e34ddfb2c4e36be78311c5e6f1fe79c4d3cc63acf0c7a3452d900d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543af49e241ea0698ac7a9910ef5bc79
SHA11dc4d65cdab1437b4e0bc2eefc95fd9681f0662a
SHA256a086a9034ab8624a78fdf63b3fee3dcc9d55ffd10054063f6e5f1bfafecb5911
SHA51245833ac1fe55df795b9323113503007ba4cbf4a746d0111be3f5a7a3233d9316f3bf4c02bd0d0375313416c9bc994aafa6b71df87fe8050202414a7c023320b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6e799745f7b8bda10195cce4f19a7fa
SHA126822d3e2a4569cb9f593eebed3f8b19dff0c360
SHA25622630d2548f16dc4087c95d28aaa52a7b21efb62a64f822835bb1368c205af1e
SHA512bb47ec160fe79e230696a4353c10719378c7a37d0c7d2b2ff124fc42b3ec8897e97f945dfe39f8538b1af94f9fc4532a88dd896cb77793531c32e99d275bc410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa085ebd749d00267d5002850645c2b
SHA14c773c0016d25a1e40a613042db285f058ca5dab
SHA256abf69eed0d3224caa7dd4a617e82a137170cca6e525a43beaffb972dc345d309
SHA51234527792e0835741e13629a611b71f148989a388e20a8d5618732085a6bd82dfa9a58072c91e45bff608a022d78a52bd68cc3e033e48141802b40475a646a5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e511773760eef07629103312659607
SHA1eeb7d50d30ce381b00db039a37a29e8f151c2022
SHA2563588eed16b9bf8e91a98a112e4dd66b8529d9857050767dedac0c681444a372d
SHA512b0bd4785638c2233d6e142046c3f50946a4516df914710f7cbbb50718ea5da26806de39215d9525e984baa21cd98aa8650ebc8c201e0f9311d33cf2968534963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b979c61c5bbc0c793ba04e344c5bd101
SHA180d6cacadad0da4b3feee71fbde8663d2103ccbb
SHA256f7cc26c3bbbeb87908eaeb9e386a8521519c4d1d0457c7067a8dcb23c678c43f
SHA51212fff9eaaf214b456b1a458967c98115d7cc581e030ee5391f58b142f59d8d5d98f85aad90f388175973e6d0d5e5d2d9b35f6b70df3d0cb36867db051b8f7f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c2034a82fa005cc3ebafa8494d79fff
SHA11a1526950acabc012e54f6c07d8ba966acc96f52
SHA2561f81f13cd3e5038a0e616cf54d1074229ceeb370be185e1dbb02158a0bdb43b8
SHA512f4a45863eaa95d29c089b467aa498bf7a62637ed317cb777dbedf65125f26f65d50f77abd0b913f1b293b561ef7d4e6d99c6c6e8db544c0ffc7d0ab897de2091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84d12bc79d024791cbf006776dcfaf7
SHA155c97e416075d535d43d3af382a0e7efbf2ae694
SHA256944922021d17bc1fd22f27a59ff85851c53a0b21714aff134e92ddb07e14084e
SHA5120e3eee7aa5804d032d2e021b10dfa844be33e5bd6fb2f8e91eacdc47a6d418dd12ff80a04ac795f63d4847132f6cbf6c4eac96b96657f22affd36ed9e4511985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d7754775ca7619a265b7047b127007e
SHA14f110680b039d32792c428f82685b8936b993dd0
SHA256fa20e847b7ffdacc5e83b29ef53c4eeb9ac66d4885069cb7d9a8d851bceef1ea
SHA51250c0cedebacd9e855cfcff1c5c253975f61fffeb84e758f4c28507f86218f30e87a93fe69569cb5e55a2716b2caea14b0937f269deba469fe32ffefb6d038371
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7E13E7A1-BD14-11EF-B1BD-EAF82BEC9AF0}.dat
Filesize5KB
MD598dd1194b3d018ed86ecc28a0bbafff8
SHA151e5898130741e7f8d5ed3d3232691cf17af6b3d
SHA256fbb297a987e001db4cd54a8821928e68f83ba05612480ad2e31eb1673b4bfdd4
SHA5129ac6e4fd55ec1c00c20e0f928996df34a487993cc5cf25140eccad6edacb4eb8068d2a9d0be57632a3eb546097dccb604fa599a63de9fb4a01a0472bd3f90ebf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
125KB
MD58765eff9ced671b9fba53a55aacba014
SHA1e15c775cc7004a736d6fc7aca09c5d80cf7ff3de
SHA25618157bf099f2f7861621864b7d63cc92077f5c20e9637ccf50f1821c37fa482d
SHA5129f46bf25cabdfbfca6805d2c22369f949a6048c833d037d413dece708cd12bab32e17a21d875437c488ab9e9b5487a1f3865d4bb1ad8cc2dad94d211c18590f4