Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 08:47
General
-
Target
JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe
-
Size
111KB
-
MD5
6b78a53653b1d75213aa4310e6339e40
-
SHA1
0490d2c82cdf1600bc7259c39c2a186afb15eba6
-
SHA256
92da34e3bed8a3d5cdfd237c8ebd7ddc351f675571b956948753712da404837d
-
SHA512
df139f71a7c370bf402a1122ad678967bfac8f2d45a8eacf8a03fc875eb94ac281a6824c9324a7124612f2dab6818f6b2039f3ced202a4a37404e4861679cc46
-
SSDEEP
3072:TROzoTq0+RO7IwnYYqzNASXRsAnk6HqNW:1kdNwBGzNAkRsVmV
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 3 IoCs
pid Process 4512 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe 4716 DesktopLayer.exe 4428 DesktopLayerSrv.exe -
resource yara_rule behavioral1/memory/3240-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x000a000000023ca3-3.dat upx behavioral1/memory/4512-5-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3240-6-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/4512-12-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x0008000000023cb0-13.dat upx behavioral1/memory/4428-24-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/4716-28-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/4428-22-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/4716-19-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/3240-15-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/4512-9-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe File opened for modification C:\Program Files (x86)\Microsoft\pxBA76.tmp JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe DesktopLayer.exe File opened for modification C:\Program Files (x86)\Microsoft\pxBAB5.tmp DesktopLayerSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe DesktopLayerSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxBA67.tmp JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayerSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5A644064-C9AF-11EF-9361-6AACA39217E0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442659019" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "785239013" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31153596" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "788989013" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "784926410" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153596" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31153596" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153596" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153596" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "784926410" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "785239013" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153596" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "788989013" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5A5D19BD-C9AF-11EF-9361-6AACA39217E0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4512 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe 4512 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe 4512 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe 4512 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe 4716 DesktopLayer.exe 4716 DesktopLayer.exe 4716 DesktopLayer.exe 4716 DesktopLayer.exe 4512 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe 4512 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe 4512 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe 4512 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe 4428 DesktopLayerSrv.exe 4428 DesktopLayerSrv.exe 4428 DesktopLayerSrv.exe 4428 DesktopLayerSrv.exe 4428 DesktopLayerSrv.exe 4428 DesktopLayerSrv.exe 4428 DesktopLayerSrv.exe 4428 DesktopLayerSrv.exe 4716 DesktopLayer.exe 4716 DesktopLayer.exe 4716 DesktopLayer.exe 4716 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1948 iexplore.exe 1260 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 1260 iexplore.exe 1260 iexplore.exe 4220 IEXPLORE.EXE 4220 IEXPLORE.EXE 3452 IEXPLORE.EXE 3452 IEXPLORE.EXE 4220 IEXPLORE.EXE 4220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3240 wrote to memory of 4512 3240 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe 82 PID 3240 wrote to memory of 4512 3240 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe 82 PID 3240 wrote to memory of 4512 3240 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe 82 PID 3240 wrote to memory of 4716 3240 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe 83 PID 3240 wrote to memory of 4716 3240 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe 83 PID 3240 wrote to memory of 4716 3240 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe 83 PID 4716 wrote to memory of 4428 4716 DesktopLayer.exe 85 PID 4716 wrote to memory of 4428 4716 DesktopLayer.exe 85 PID 4716 wrote to memory of 4428 4716 DesktopLayer.exe 85 PID 4512 wrote to memory of 1948 4512 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe 84 PID 4512 wrote to memory of 1948 4512 JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe 84 PID 4428 wrote to memory of 4944 4428 DesktopLayerSrv.exe 87 PID 4428 wrote to memory of 4944 4428 DesktopLayerSrv.exe 87 PID 4716 wrote to memory of 1260 4716 DesktopLayer.exe 86 PID 4716 wrote to memory of 1260 4716 DesktopLayer.exe 86 PID 1948 wrote to memory of 3452 1948 iexplore.exe 88 PID 1948 wrote to memory of 3452 1948 iexplore.exe 88 PID 1948 wrote to memory of 3452 1948 iexplore.exe 88 PID 1260 wrote to memory of 4220 1260 iexplore.exe 89 PID 1260 wrote to memory of 4220 1260 iexplore.exe 89 PID 1260 wrote to memory of 4220 1260 iexplore.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b78a53653b1d75213aa4310e6339e40.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b78a53653b1d75213aa4310e6339e40Srv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
-
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
PID:4944
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1260 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4220
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD56b78a53653b1d75213aa4310e6339e40
SHA10490d2c82cdf1600bc7259c39c2a186afb15eba6
SHA25692da34e3bed8a3d5cdfd237c8ebd7ddc351f675571b956948753712da404837d
SHA512df139f71a7c370bf402a1122ad678967bfac8f2d45a8eacf8a03fc875eb94ac281a6824c9324a7124612f2dab6818f6b2039f3ced202a4a37404e4861679cc46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5d3ef026dd88e6e5106ac84f80286c124
SHA175062b0190d63b6ee191c2d3fd7deed40520a363
SHA2562ecb929a03fb648afd921206e9f84eebfe98b3b343061e6d2e5bbf3a1d02619c
SHA512809dafd4a0fb9c3c22d3fff05ebb4c025b35a69b514ddb082565a14b3543581f1c430532b6dec2dd4da97a4c9b9818b57d91dcc6f91a3a5425f5a65a078cf64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD58e8e3b65ca1900f23b4da064eda2ebd2
SHA118c073bf2b00bb1a5151781c11144643b31953b5
SHA256bcebc6b8db88aeb58b104ff286c5a2c73be41bd1581b7a662d3bb186863f46f1
SHA512ee0622312afa422c6c72d3b60475059f9dd25ffb8692ce12676eb84bef9f1a5e532727e017712fb2d65f7d7d64c093e872a7ad2a6232e1e081cb23b5ee5bf926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD51f99b44c4671a3cf3d3428392bca6a9c
SHA12567bbc3d191cb80e83ccad3be68f165d0da226b
SHA256357739e1605939891384851346c31606a8f4138303721c6f54d64dbcced36028
SHA51270dd0142d6ee315c2908f0823a7bc2a30f724713403e179326c6bd9c930aee90953e02d480b6c5167b22fe92bc0ea9a2933b15a384125c7dd2129799dc3fa54d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5A5D19BD-C9AF-11EF-9361-6AACA39217E0}.dat
Filesize5KB
MD5ed8904a012cf6fd1ff1a59af3dbca599
SHA1c3ee58fb04e1ce5ed7c807f28eca17dab15852b8
SHA256da37239d4636ec3cb3a3843050680f413888cd5634710165d767c480926daf06
SHA512327b8cefe686c2782a1f910346e67f430401f19d9483e59a12510046717b539cda9c1636976b1d9c5c324fb531860813c53946c2c91ab5f9e90fa0bbb3d5c962
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5A644064-C9AF-11EF-9361-6AACA39217E0}.dat
Filesize4KB
MD5ca6107c362ed8e39ac5530d51ff8ee1b
SHA147838572dea2e34d5abff26ed9b95b3fb9d1ac49
SHA2567243afb47c09c29d58c4f275e866c87008191329ebf5d969580c94a24e70aa5a
SHA512461533b149a1a12db84d5475a8129784988d77be31191a553756dc75f2093d6891a4f8ce83bdfa98751ef6c2681a64dcb789a0bd692ddf0b83d69309b1c3b63f
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a