Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_029cbc64802dae15d6ded5e295a7e323.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_029cbc64802dae15d6ded5e295a7e323.dll
-
Size
359KB
-
MD5
029cbc64802dae15d6ded5e295a7e323
-
SHA1
d68e2006c01b08bc8f6cd9ee3d40077ab94959c1
-
SHA256
0b696bbab11d388e64ac725eefaf902388c366d0e16e831adb7fa94df04578b5
-
SHA512
8dbbbc50725909108b199b9e4ef996b68c8e2ccc3caaa85bacb71fd7f4c3934268e045d9b13eccb36bdceda4c802a1775aafea332f1096e1de8cf6e28caee450
-
SSDEEP
3072:EOBOLWXivHYMzv2HvP5YeBTEEP2831Vr/rF8QOSta7WeKwkB5fK4MmC896KA3wc+:EOp8HpzdQOStKpkB5fMZ2lJ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 1440 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2452 rundll32.exe 2452 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000c000000012281-3.dat upx behavioral1/memory/1440-14-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral1/memory/1440-16-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral1/memory/1440-18-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral1/memory/1440-12-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral1/memory/1440-22-0x0000000000400000-0x0000000000498000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35623031-C727-11EF-B59A-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441777536" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3558AAB1-C727-11EF-B59A-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1440 rundll32mgr.exe 1440 rundll32mgr.exe 1440 rundll32mgr.exe 1440 rundll32mgr.exe 1440 rundll32mgr.exe 1440 rundll32mgr.exe 1440 rundll32mgr.exe 1440 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1440 rundll32mgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2204 iexplore.exe 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 2416 iexplore.exe 2416 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 2452 wrote to memory of 1440 2452 rundll32.exe 32 PID 2452 wrote to memory of 1440 2452 rundll32.exe 32 PID 2452 wrote to memory of 1440 2452 rundll32.exe 32 PID 2452 wrote to memory of 1440 2452 rundll32.exe 32 PID 1440 wrote to memory of 2204 1440 rundll32mgr.exe 33 PID 1440 wrote to memory of 2204 1440 rundll32mgr.exe 33 PID 1440 wrote to memory of 2204 1440 rundll32mgr.exe 33 PID 1440 wrote to memory of 2204 1440 rundll32mgr.exe 33 PID 1440 wrote to memory of 2416 1440 rundll32mgr.exe 34 PID 1440 wrote to memory of 2416 1440 rundll32mgr.exe 34 PID 1440 wrote to memory of 2416 1440 rundll32mgr.exe 34 PID 1440 wrote to memory of 2416 1440 rundll32mgr.exe 34 PID 2204 wrote to memory of 3068 2204 iexplore.exe 35 PID 2204 wrote to memory of 3068 2204 iexplore.exe 35 PID 2204 wrote to memory of 3068 2204 iexplore.exe 35 PID 2204 wrote to memory of 3068 2204 iexplore.exe 35 PID 2416 wrote to memory of 2960 2416 iexplore.exe 36 PID 2416 wrote to memory of 2960 2416 iexplore.exe 36 PID 2416 wrote to memory of 2960 2416 iexplore.exe 36 PID 2416 wrote to memory of 2960 2416 iexplore.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_029cbc64802dae15d6ded5e295a7e323.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_029cbc64802dae15d6ded5e295a7e323.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57536d1d5b7fc4721c461b13ff4472d9f
SHA159da63a4c3620d10612d272f206624b285c976f1
SHA2560fca9732d5650e6ee2985d625da92a02168b0a04214eed1d65b9356d0e5b4652
SHA51267f5f665d051ce896356c267e11b5ffbdc583f98150c6ac3f022b15886b869f83c4e94d0733033c68b387c86307cd9d3dc7a371a872f9bbd981d66a74326048f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec0c271dd7ce76473651b5a2af3da874
SHA124c0d685b12e3c5750c46d60c7af7fc6061d69ce
SHA2569fa5e6a0b8f2149c209075d1b4a54edc39b2b583aeb971e02e1f57aca2efd6d2
SHA5124a97af29a4d8ead096d5e7051f713e122e6ceec5ba11670083fef6a1cb373daf6904a7f9882c791e4aa726953d279cac1cab315c4a9875d17c4b8040b5c13f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2b4203c22c3b7dcc9eb33d18f70d2b7
SHA130f1aab8800acaac0f9cfd1c9d1e00991d3b09b6
SHA256805fba7aa45a279a72ad78d8884be2c54d011d2ea66133db29d15ad6d486f6cb
SHA512784ba338fde0706238725900f984f253da973699b6ef3d590287e6a27bf23ab7856510b8c19c87a9b53bd96ee48e39d07af5eb941e7a3b048af18128e7975a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c15f8bbad5de23d69afafd9dd451a2db
SHA113ced8ea33b48e1a40b49ccafec2ac72aded4f91
SHA2562b728a1133192fbb3c006790060f7b5a5e7d078023d1c0111b35f157e55a7bc5
SHA512ab1d1cf340e8be05d0499eea9ab9576830bd91c190f6abc150d738ad452590a94cb262dc9991ec589b3194c2a35b1cd71817d4ace9095e1ab0bb5015820ab4ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e6061082efda43d4d89f5f3429aa17b
SHA154f116477c75ff81d10f455d8ff7ab1970cbfbe6
SHA256642a330cb7fc50dbb9c97aef776dec0c81ae5e0424721c771b030f775f85032a
SHA5124557cfa52cba419c170fd26cede978ffb5039b39426f0e165bbea5378b2ab0c9ebcc8d06ab8a2086e93a805ef6be83a301b71f199233ca57b5e8e4f0be2eb42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e973e3b7fdcb957503e6a801493c21b
SHA1d00a1c2a5b54db47d46c0fb6b33877f318a4b790
SHA256a05191ad6b667326bbcc4f0bc2b1082441b0b22e69a42a9b53fdeca46565220e
SHA512c82281a50cd10cd612fff8fc6f495356297759e16e37f844addaa51546292a44f6bae5f04b26e56432ee668977c63a7a4ec07161791b26621b7231c17bece0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f486632f15acb5befdb1df917456bfeb
SHA17ff0eedcc00a1a77833d1001ab04ab345d0d8aec
SHA25657851d4d88b5e9b0f76ff5da96ae35431ed3acb674a442a139e3e624949bbab6
SHA512b2a05e45a1ff829a4444dfef57263357a4e333f316ed21999254e54ca854d0a00da12db0792eb1dcdd5610135dd640225412968cdd11caacfd7960fc2baac6c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db80b400df751b8c8d8dc62f21e56195
SHA151d7aeeb7efa4babe86c406c22a50111c56772ed
SHA256ae4eb2e18f0c9892d8f4099f19816b87c74696ff97055122e6b8d9bc77f08817
SHA5123a43f4494b3ad3a83d5bf05ce642fa9e3290b5da947e1d16c94c6c595fe3dbefb6285c2c5ca56d7b5348e5b6fca43db18391e37ad4ce8a3a471939a58605a9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a552fbaaf491b6bb9cebf889e41fc853
SHA16d1d00eb476561246dbfb847c257e145c564feb7
SHA256479c8ce2bd4ba82f14d606f43cab5f1783570495272c44c308b645a7ecd27a70
SHA512e8077b7e91450b2ceb05dd35a7cc41200a0a22ffb5bb758b6c9eedf54c838dd8a0a46514d51eaa5936142ac7090e74d4ba6dd36ea01f57a19237c8e1d45524f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d3b13525658146191a5c44b2108771
SHA13833e22d1062f80e5e460bfbddb04680d0f12776
SHA2568aa9b899d08c7d7d8c1897835de37d1845a6d466040a9b722bd4862c1b531a4e
SHA5129f02abe833a66866d8aef5933b468bf57e8b952258b49b6c166dbd1fa40402a4ba93ddc3107fb0d75c412125c96ab0eb60eb89a05fedd52140a5a990659bedb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573898f767048ede649e2e6b8d1e91e58
SHA1c5b4497b8666e79305adeb2a28f89814285ac6d0
SHA2566785cb43b296e6a43d391795bb99f05f815f880c8e2348162a7f5398af525eff
SHA51207b4359a79e4e3fc643572a5573c55728a2a92d53a6c459d97343c7cdc7a3625954a23481d03f23bb59700c7a1ab4512b88f6f92018bce2515917a1a23e3658a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3558AAB1-C727-11EF-B59A-E61828AB23DD}.dat
Filesize5KB
MD5228f552eae986d92d161aa51ad2a407c
SHA14129f35f5b784db9057bbc4c0e2be0e63bc6291e
SHA2563cad31bf43ee59be5ade16c4e912196ea90da869a754c1ea01dbe45a763c74c2
SHA512aae256645ba7cfc90c9d7ce8f40afde4f5cafbb30b3e4fbc68cc4caaf8dcf03c9766866b6999ca40340eb57fccfabc2ddafe4ae0ac9a359d4c96553d24ef050f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
260KB
MD538d0789db4ebd651202667a393edda52
SHA193345be068c4cee6f41f0dd01460161224e1290a
SHA2561c90372a12e36fd370126700cf4e222f33044ca406e88925952a236147ceda61
SHA51291431aaac4bcc3ab3f3d68f3da7a54e9b880f245a4e4ffb573351fd5d74c6894025c373c57eebff50ffccd3aa09d4416ed20bdf8d8e4c6c309746fd7940f4dd1