Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 03:49
Behavioral task
behavioral1
Sample
JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe
-
Size
257KB
-
MD5
4616e27c8a04c1d49ac4d44b753798fa
-
SHA1
892727a2adcb252945d5fc6ffdc62cfaa9bec6b4
-
SHA256
693e4068a923ba2565a132bc89d7290608b3b3bc0a86fb264b901079495be051
-
SHA512
78fcacc930773241441675454308173bebd8d1d9b2e0e2207ff3c02ac6027e4cf6e52056d2a63fc07455e7680b72d18057080c60718b147f0bb6335310fef542
-
SSDEEP
1536:iOC0FvV4OguHxjhpA4Bm7uW0vSUsghQevBFkutIbgTuFqKRr0aF5frleGhd9TfB8:iwV4OgSzBmh04eZFkz3Rr0gwGj9Tf87
Malware Config
Signatures
-
Ramnit family
-
resource yara_rule behavioral1/memory/2188-1-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2188-0-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2188-5-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2188-4-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2188-7-0x0000000000400000-0x000000000047C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{790834C1-C7F3-11EF-A4A7-66E045FF78A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441865268" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441865266" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79101C31-C7F3-11EF-A4A7-66E045FF78A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2768 iexplore.exe 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2768 iexplore.exe 2768 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2764 iexplore.exe 2764 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2768 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 30 PID 2188 wrote to memory of 2768 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 30 PID 2188 wrote to memory of 2768 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 30 PID 2188 wrote to memory of 2768 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 30 PID 2188 wrote to memory of 2764 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 31 PID 2188 wrote to memory of 2764 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 31 PID 2188 wrote to memory of 2764 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 31 PID 2188 wrote to memory of 2764 2188 JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe 31 PID 2768 wrote to memory of 2704 2768 iexplore.exe 32 PID 2768 wrote to memory of 2704 2768 iexplore.exe 32 PID 2768 wrote to memory of 2704 2768 iexplore.exe 32 PID 2768 wrote to memory of 2704 2768 iexplore.exe 32 PID 2764 wrote to memory of 3044 2764 iexplore.exe 33 PID 2764 wrote to memory of 3044 2764 iexplore.exe 33 PID 2764 wrote to memory of 3044 2764 iexplore.exe 33 PID 2764 wrote to memory of 3044 2764 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4616e27c8a04c1d49ac4d44b753798fa.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e778c172b1dc74d811397acd7b562916
SHA10da430b5d46cdfe28ee5cda1fed9e4bf35df98cb
SHA25642a8398884fbdfdd1c2a338ed8487ccd06f825ee7523d42f28b41b742948a8c2
SHA512e7e00aaf6530897a64819e7838e439bc4be707f8432fc65c1effad19ca6700e84fcba1a519083b734219bdb2eef64ef845721a6e08d8d7899d31f72c4c09f41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1d3bab1d1a796ed5d4a2058d94d26d
SHA168a14836a9230fabcb622b50b30d8bfd97ee1a7f
SHA256392bb2993f10c418c8cb580d2936af698dbd87c327c1597f7562082f4c451d49
SHA512c17f119e5eedbd29f49e729177239887dc47d20eba01d304e75636849f7f11607aa2cf2bcca340f59563f92959d77b48cfd29e75f723f4998c7bfa05759a6471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d88fc0e900922f151f300889aafc4af8
SHA1f3c9a7562dd280e05ecb51c3407f0cd683426a6c
SHA256eaa3c645ed274022b3dd877dd7f096f5e744a7d267ccb337ae9d9ba6d20de934
SHA512618aab7b5733440d8212acce96ac37ea5060f17bf3a1da71c13cad9d692892080a7ce22243a05aa45c0d7165afaa95fd42448c29a99dae87d9c5c37650bceb4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55826d25b2299523887fe22ab9af09ad2
SHA11bea41ac63d598ade3431ac2d48682b79b05cc96
SHA256a5f16a3c2c68e88cb998f960f71103eb0ca934484a96a1c13e209ebf70353ad4
SHA512792ec3a328f498070a39b33843f3e98852accf048999b5243d72c0554c63a10f4134ac8c0a3d0b557ebcf1499e8903d9e422799ec550b302de354515da906603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db1e7db45bf35343e90afdbab2109a6
SHA16c3e5997ec4aba1e043d78807ff076494d7adc2f
SHA2566a64d869eae269b82c3e82769bc61b00dc1e7af83a7ae3ec161eca59fb0e9800
SHA512af3eb73a8dbfb146399b0d56e096620a284a84e2aea0b32d43ccca3b21914bc0d74e188595ed3ccefb767804c7fa1d50238f676c12254fcf18e17769450289b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c47fca6657f36fc6bdf454090e04660b
SHA1ce17d55bba1b25a3fc9a0dea35ca848ed3b21f90
SHA2567f48da6bd59a19ede718ae56f853c3b32b056cebfeff93744f99a1fae9281ede
SHA5124a902c6d331c703150c2b48a76cfa4d7022657f76858bec31a2c39a21d2df9ab687be9cab0441901f6d314f0cb6e15eb33841f71a10a2daeb4f97fbfab4d7a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5573282d0abd8afef4636d23bd99f6a12
SHA13a24f670143a5be997bbd1c6f0e14a148f95384b
SHA2567155d1393bdc5061cf5884c30ed87d352a783cc457dd607600cd1572db7ecaea
SHA512d191a2f205014eabdfdc2cd928d45b8876a9bf0fb5b586905550909fe269ae3fd065678a35cf45a7a6d3b44f1a17828f5e88e87a0347dad06dd0aa1dc4b63f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc40976aa84a5823025fce9587d848b4
SHA1f0a34be5c400425455284edc0699e116f69d0a4f
SHA256d8aa9984f9874b99b21017de3da64c323f18f8cda3768c7db6461e901aa30ac0
SHA512f8c63f35a3183203a69aa1abc64e123434eb9fab8a1a7d791dcd6561bdf5dc8a82e9c5c122245aa2c02bccf7bd509efb7b4ff2514f5baac0f8aaa211f3aee0de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0c63a38a9ce1f02d456f3718f5864c6
SHA15982563aaf64bbcd9de5dcb77c964110a3d5a831
SHA25640232aad85b3b1a35d2d7c94cc6198b0830d52e7e89d70e554e3c30d7d41388c
SHA51202ca7674495ec19dca6723bf259aa17a6198474281915b1332fafd190fcdf39e2988c9831e143a15d95fa59172777fbc04f53410503da5848cc38b542247350c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1138649491058c1c7545a6a9aa63a5f
SHA1480dcb2db82a6c358d64477caa6ff9ceab71746a
SHA2561b8cf056751ea0295499a89fa714d9d7e46f3308a82924e8dd90336649af1303
SHA512626106715e313966507227a1e84a5b286201ae096777fecd43e1f805b9d2075bb1543ce2a2caeaa580cf7ab906fbab984e6799e303cbecaf6275d438f2b8fd43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec0c38ab6e1fbc4b4de695e62843951
SHA193769d5f20ba9de035a6a32804915da3e0be9525
SHA25693ad5527d119dcb0d3a8e2d1a6aac72c2ef3fee9b81aa811a5e4e7095ffbfcd4
SHA512f9a6980b2076a6465642b6ce44cb3ecf83f5daed4bc652046822e3328570dcf1235cc6ca5da5a4fe95c7a9a9be2bce1b3916498009abc6500506c3da6ad637ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af0bdd2ea0c19ec7de04d84930d69809
SHA1ab5e0dadad40be335c2f762391b38af90d7f004a
SHA2567647674d60dc82667481241a5fa12cb40c08add9fd133e928ea9390b206b4062
SHA51237c90dfa2b99a2c3133778318839bc00bbbc023f9012573acd1fdba0a2dd367f28ad04c8c77ef3c0dc8de9ff122514bcf67f6cb020b18b1d9fc7af20a0dd7a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1a37b86f81dce140a29d5f7dcb82656
SHA1867d076cb9d55369dbc5ddae3821ee17b98f0cde
SHA2564439e584aa1a83a4431f5de4a9e107d8e759bd3910c2bd6bd36f0f88dfce1ce7
SHA512d819fe0659628acf1276d36e1e5d8e6a9113ecc223fef0d6b3ed28aab56754303965a4a827443336bfbc31fc01c8bf15d732bb187e9763b7f29152aa1aa961bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b47cb7fa527d1573cf76bff327850cb
SHA1e18ac89e2dafeb8e2f7ee0881de5442133c9764b
SHA2560d504c81745786bc69c3350a6363a59395a8bfa9154bf76617a3fd491f128372
SHA51272345b18dcb4ab6dc54a84ec0f3cc23fcae4fdb0ace46b82bb97be6ca9667d30cba0c63e03b4bafcade203e2ca28ed3b7a088e5d98cac7b1fe34cacacbbf6895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511cf5a682a3eaa9cd084c2e133e13382
SHA17b2564e04b2c81a077ba33d7a857902f60da1bff
SHA256bb3e98c0049741ab6e4d60b66a4729083f21151852df7ead3f35ccbbac64dd74
SHA5129de23a4c0849536becb1d1c05042fbdf594caf8cc34dbba4778a6f59ed1f169c9e7d23b7ba110522710035c03da8601cd7c9906ec727598fe945fe5df0c17c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7d8fc365d63b0d6d886cf869fb06eb
SHA1bf1ca55220d0e3fb7bb1e7616a2057142c85097b
SHA25608da74e7a38778b61d27eeafd6588d04459b732681236bae4848c0ce33c2436a
SHA5126bedf67b8abb4c3d0c8c0af4cc3fd943e5d9050221da69166e269b0c5e8323ed6f94e73658ce42a74ac66d535365119aadd86177fcf690114cde1339db6a628b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ffd08f438a0a415b7eed56d57f77d1
SHA15e55b4af2b6c87720be2a90b1bb7efcb44f1f2d5
SHA2562bc199493465ed5bfd5154fabf6899de06df6d70160cf27d77388e0b53f8bb39
SHA512c1da89c4521f1c87bfda0a3eae6ae6faa33c06e294a1e8f899e221aef904e4e3ca4cd5263d2bc28526b8708dbbd750abb2a6d87b03c0073892c286d2bb50f519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce10f314fb721c182f34b467806cc62
SHA13488852647a8b34237717be0817666f6979be983
SHA25602516fe8c4f5054c596f99739e378b1fa101c9de7e101c1f9f230faa7c3ace4b
SHA512dcb1a13e06e7fff89105c0742d2b26475a415e0ef61ccd3ceecdc0f71b30c701ce478bedc912a60d1018402dbef89973a1455090a1fbeab63be75c39ec8b76af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560979acae4731df71d4025e0e4e064c0
SHA17870bf8ba9f737a7d8c74959fb8998b313ddf88a
SHA256984103bd8036845fc414c26433ab518e79c8f8b070d9f99bb450b9873955c932
SHA5120c61f6b44d3c3e7fe0750e5a92e514ddda095f43b97e0c59525358f4f180faa8429fa687efeba75f951b30d0060caa8fbcbf87f81353a5e629f299c2cd47b5df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50024ed964b62fc9ac5b1b51264c00f80
SHA12ed7a4dc4cc0f88e57422e234d3effbfc1ec7ee2
SHA256db2ba92724b15c8ce03ad73f67876f3ce0c61b404ccbc254bbb7db31b4acd104
SHA5129fc5f551b19fce4700250c5ff76009672ca2655749765ea9dc80c9806be030489c009a01e9abdf236a117c11c7ad61b7124561b379a05f070c8ef05889f215ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b2d84d806541df5f6f20989139838cf
SHA16390934aad74482236277f2ffed8b53ba41ffd95
SHA2563e9f58236ed922c60a9c41cda07bf7450fb01308150c4d32d9e718b7c5065501
SHA512b778a149593c892cbe47795f284dca4af5a116915b901ad8d619492bc9327ba626f639a7a64d7a461ba8f5649177d89640b602f2577a8bce59d9f96d99f6db72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c9fb18eafe4deb120918edfbee2989
SHA155d3a6c3d2ebe573727a3067d497a1da67307091
SHA256a96bc232177d0b1b23264e97565b4ce0aeeaf221ee736fcc9e1da77a48e13790
SHA512eed72c72e6684d1014599e07c6ac1377f1f248ab1d76fa97f079fb8bdad5330f1e25d4da369baa6c924a10eb539c94fe7d8b50ff0a4aa1b7eee7fb61637e0b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57377f25760159714fa55e5af532635e4
SHA10c4cdb1079e6f925b51cdffabc26fabb105187ed
SHA256a1ddb3b52ddfc24b41c2a6bc9dd0348502d4a648dd17c5ad567686591278e4b3
SHA512b4ecccb6043f61adfa2de5bd66ebf3e95afc155da49f7ec1c401abed84bb3f1fdc3fa58344976edfb103536da78713af3ebbb9922001669bc639ce6bf4ff1a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e73f48ababba1b55bf993fc0140f18
SHA1435f736b85873b1c87ab22ff2f213b919601fb82
SHA25685ab9934d389dac96b447966e690f8449e90afcfc64328d3a309261015557505
SHA512357952f69e3b3b0d74a12e8bd41067df4a667f5a319e405e20ca1ddc1caef8c1fd7715ebfbf2a84f1ada2f1845a70880e448d216ec92572c1d076e6306a2c4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e4141e962105fa56cd6946d3d4948f6
SHA10ac2744ff192367fd540efaff001a9d868790d95
SHA2569f9159bfc0bf9e488be3334b52a9d17835e64210fd8001eaab844958bc74c835
SHA5120dc04d6422a9f12f5234636639842f25c4237a6560b73e52c2ebcbf1c6e830d7b93c17e00e7a8a010e41847e72939a28c53cd1a6a75f906c08ef3b34c5930ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522312bafe78d000e85baf56fd4e799e9
SHA120ec6cbe426abde36350374606d9d03f7bd91b34
SHA2564741d9da426454ecd274791ac746b2108023efe645a4a67974e0896f57b1fc71
SHA512ec32f8fe28e4a0864bf52d4a58bef8115a4c47f4b4f2bac8007d50f9537476f2e8897b768b70190b178cb289b9d7c7504c20e6a8fedd19a6eecbadf66b9113bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b18af86ce52f975b199147f80ddd9ac2
SHA1f49f192ea91b2dd248059a605bf07fa674e8bfa3
SHA256a398b2d5525603d0c14dd94c8669e9e4097d0bbf11e9545857932aab9d6e9e90
SHA512ff424611e65ebe6f91412d268a4da1d23df8462e54770a734da5aecbf556264dac45132bf4badc7b91d7973790ae5ce3ab9bf9980b499862b4ac369f56619acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56e56b1491c3d57cc484bded3b6db6c
SHA1e8a075d06a3d6ec0f1ecaecd5aee9c754d008906
SHA256ea442647ea0af10608b43f2511ade2bffab8f59c6c8098ffd183d2ac57c803f0
SHA512f32668b86885a28a37dcaff9682aa2a427610b6353d749dc15157437c99d3b3745c110e758107a5a2e305ddb378a0173efb8cf4977c0765ee82e57bbd3604f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c157b1495a6f87d30ed2bdd387c51c
SHA1cc352ed296bd7c73c68fb3668eda71da23ddf6f1
SHA25606e06cc1886e4255b6d09cde510c6e735729da8030109d947dd3a6ad257dfc8e
SHA5121d790e5c738e6cfb66516e8fbb6de8b2cb57d63f09c7327971408e1b05efb74e3f9243a6d66f03b3e66f10c8452b79841591acc040cf7a6e571d1ad319673588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c73964d9ef3caf0d58dee2752681a02d
SHA191650deb9ebf70ff9f3ce71752074db461645d32
SHA256df761fdba928bf5fc67bfcf442a57a792ffe247030f04e4c7bdd9af6f11457ad
SHA512627788889f70d0fb87fa8f7771aee8460d3cef9cd0697cc4af47fb8f17acf71bbfa2762683654e035c55477242c0c67a2ac0d3d4e0848ba31c4cab04321c7bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf310a9dd4aad91c5a91d1f1b5bd99e
SHA19747213b86576f9779f3b0100c9cdd56077c638e
SHA25631c9f529b672cf657e27f176dcda605c75cead144166c5e68bab77eee430d42b
SHA5121fdfdfce602564dbda244f740cbe15d7ff101b89857ecdc2f94cf29020769947500bd8687c18d7569c2893e133de18dd906a48d2a564344aae557d1ce36d2298
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{790834C1-C7F3-11EF-A4A7-66E045FF78A1}.dat
Filesize5KB
MD56f9faee8b51913b9cf9d8b751cc32e57
SHA1afb49847af517929ee6dc683cf5f83c8c2b3e271
SHA2569771ca6071a9582fa4a1194e4f5fcc85cbcf20ac56af1eaa0e16ee8bb70e5b9d
SHA512ce7a6476b9e1d2e27cc9375754ea1f0189c3ad621d0fdf840263f2a81eaf9c234a88bb89320b68012a8701342449eeacb208567267f652b9a63ceafdec9ef95f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b