Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 19:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe
-
Size
178KB
-
MD5
7b5421b63e6f8bf61bb4bf86367c8b20
-
SHA1
5e5e307e2c1ef2d11b8255d8658a1c7bd43f5be7
-
SHA256
914d132564b58604caefaee827292de7d3ee811917ef8125100958ce68839b9a
-
SHA512
eb63054fd285e5489e0969b8c4c91bde24e89baff68d80850eb7a1fa5bcec0f61eacef1160d52d51ab094ee3643bb248f2c2b8a6d2510a1b6bd600336341b94e
-
SSDEEP
3072:akAwOzhjdRmSZiAqFbrnp+KsYGngdyec886Vw7ZcpjX8od+Sv3JyXOZdQwRJkx:+w8h/7PCkKsYGgd6667YjDPZRc
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2288 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe -
resource yara_rule behavioral1/memory/1268-14-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/1268-20-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2288-27-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2288-33-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/1268-18-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/1268-12-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/1268-11-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/1268-10-0x0000000000400000-0x000000000041A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C0CEA21-CAD0-11EF-B66C-7E31667997D6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C1352C1-CAD0-11EF-B66C-7E31667997D6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442179907" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 2288 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe 2288 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe 2288 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe 2288 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe Token: SeDebugPrivilege 2288 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2880 iexplore.exe 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe 2912 iexplore.exe 2912 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 2288 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2288 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 29 PID 1268 wrote to memory of 2912 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 30 PID 1268 wrote to memory of 2912 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 30 PID 1268 wrote to memory of 2912 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 30 PID 1268 wrote to memory of 2912 1268 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe 30 PID 2288 wrote to memory of 2880 2288 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe 31 PID 2288 wrote to memory of 2880 2288 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe 31 PID 2288 wrote to memory of 2880 2288 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe 31 PID 2288 wrote to memory of 2880 2288 JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe 31 PID 2880 wrote to memory of 2720 2880 iexplore.exe 32 PID 2880 wrote to memory of 2720 2880 iexplore.exe 32 PID 2880 wrote to memory of 2720 2880 iexplore.exe 32 PID 2880 wrote to memory of 2720 2880 iexplore.exe 32 PID 2912 wrote to memory of 2728 2912 iexplore.exe 33 PID 2912 wrote to memory of 2728 2912 iexplore.exe 33 PID 2912 wrote to memory of 2728 2912 iexplore.exe 33 PID 2912 wrote to memory of 2728 2912 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b5421b63e6f8bf61bb4bf86367c8b20mgr.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5646214e47bed95c0a0967375076d9fa2
SHA19de215e07bf66f18f8d8f390e7861c0d852777ee
SHA25632201ebc980d680c75216cfa289e4eaafee1dc3cad1ae3261c0ddc7f312567a3
SHA5125d5806772ea5bb7a16ac43f9788756db1e2a7f3493ceabd87ac963679300fd241b2e6f834c5f876fa6afa93b4ec5267442d2019595db3c696c977959f4c9df2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eda90080fbbba6c16b14357256e98d90
SHA1cd3f38d6ea2d68844671dbdb21047b3ebd4df445
SHA25693c0436dfcef0b01bc8b63d25541dc806976aaabfb78bb6428dc6a610344536f
SHA5129fe510e19e17fc33395effe34c5f4f6073bee5a511e81d46de519f97623b7b3d3537a71ca00963e91c99fae540d1eab46503cbd21d9765957ab48e4ab2483f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535f8c0c84b0f42d48ec4195191670a62
SHA1960a9d4c1525902e711644a63b62e3bfef27c90d
SHA256962013eabb2ecbd7d73515af3fe179ee1fa92b8b8c4d392d4117e4d35f4ede33
SHA512ab36b3f63d644c5b29963cfb161aa5089a81c033acc5054bddd6db4b5df79832b743b65c5ad54b29743a330b1d1feeaf1033677f935243cf22a91e05f8e5eef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774f26b2fc712a205de95f6c5015aa6c
SHA11a2dd92be94c9f6141fbdb10f6091141b5fbb6ae
SHA2562276d0eed50d21d557efc1739daa0111496867b9f981ac277a687104d5ee0d3c
SHA51203f59cff16a78b94a1fa2955454538a2df8b79d492a8b2d8ac4304799597e913f6fa5e2490c2281e165c31e74f349e1b0c44e68ca3b0e4046cbafd6ee0149471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc54ef2a61c56b7b5637e95d89fa0a83
SHA1e99895686abf7b159f40632b78a5ae4b6ff790a8
SHA25659f4db4fdf28ca797b75264a0573e8036b16c2e57c48ba27732f6d8725ad7353
SHA5127af6a8e12e3bfca48b3c9df99bc74d47646f90fa0462aa850b2e0dd0467486f669c43c4ea47f530b04a0ba934c56dc30bb18bffb2e93b758cb4625126b340d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb6f40180bea68a06ff95e346f9686b1
SHA16026d2b3153d5511fd9ee960262895fdf3b07c71
SHA256962cc7593c5b154d9f02f58f80e52c355abbc887d9b32b7588d0cb83c917c209
SHA51200c3022d8a11acda7d316900eaa8d62a659df8f95f773f3dd1253e9f5d924b65b046c9bb612be5162582f7ba9706f765ace8f9934c948592c1dee5ee581b0cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce52ca41f23891edfa985361b36382c
SHA17fd05fd65220a741e48860f238c365510539a17b
SHA2566a27c6655558de1b38163157c93d6ac06a2b154e6d33214554b14e5761298099
SHA512e7afdd3178ad44c363ef7d6658214dae3663a86d4b883a5dd1adf5ee2d628fee33294affb16bef035f063170dd403ff66888c9a6dafc41316ac3a09f2c231a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e1919270ccd24ad1d37b9a3026f35f
SHA13514739762d2e46a3a91f6c155c2a998738fcefb
SHA256c4b147e85bde978e03b0765b94b3350326234e9c9bd4854439cb6557dd67f11a
SHA51222ae605f7eceb7dbaf7463a27ffe9d0ae5593d85d78222682dc7c0fb486fbf13d3aea846fd331c6e03a80b671b3c6920570873f2a5d69255717e893a7aa1d5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f774f1d711765510f8feb38e135db866
SHA1abd417c02ca92c7d070af716395b61611d68f429
SHA2562af148f3f112d6246fd06ed9a9eb75a8292e1b6275d5f5fadbfdf486dff27c14
SHA51251f93488a72455310d45b3af99602314abbe80649cb48cf16324c11c25b79aed75898e8c379ddc28f9381b44f841f80f7cc8c1d83c1dbd25861a4d6b6a71059a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e661c3a6e9bb111fa6389ef9c52e8c7
SHA19a79598efb7cd6ece06837ede53992b8ce97f5fb
SHA2566f2cdc911e8a6181682c49d6934fe19955e9f601e0149a5b5cac0f659965bd78
SHA512cb22639b2d6936e66fef7a50618e700905d186b20a37f49d4602bce52ca0da7fb1e00122d28a263b1ba3593628d2378675796d58f919c8656000afc0553ff2fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c01688e7040b8cb627c519244fca71
SHA1a04b183e5b469f35da1b76392e37976f324e7bb3
SHA256669c475c279f6be3c44515f21feb017753990754eddf94ccf50d99daecdcc0d6
SHA51211b480e363e9a87e26dbfa7fb963ed760928bbe347ca0cb7aa43be9bf899bd37adede9696b8364c77cca65682a7cbd3a5c5b318631613fe8884e741c8d21c33e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588b824dd03ec2197cf38c1594827e579
SHA121c660a3790e785fd54516ccce219becbee14af7
SHA256a8ba16a7d3b58aa8da75fc00e4d015c9830c29899c6ad5125fd2b9e7bc901d29
SHA512b5a6a484bc54a0b154cca0eb344b684cb801d46705e78924c56fccff4ff3cac18360cb7f7322472f3c37f08bda0df30f93d5b77e932e86b17786f293bf8c1288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c8cefac516d9d5519f1f719d4c31ae
SHA1719870bb6bb8dbdcfdaca945b8801926656f8daa
SHA256a16e21dc3b1a9a23890f5584f49545eb6c7ffb718c6229b3a587752b72fffa92
SHA512226e46264016e0292d6429467eba28eeca6259d031d454822909878b23399fe80b3bddf5414438a7e638c20fb2c8a49581cc3a1d937ccb0435bf1ab39e06b2c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d9b861cabfc551606385f4bd4c0b6b2
SHA113a43280825d33439a3a9de576d32fe61668edb6
SHA2569afa0b081e3eb4dc86564e1af0a6c991c3ecbacd2d6a12aa1613474a077d8690
SHA512b139fece0844dc2a28317a27bcc4858ad37a6be21959eb575f1a133e6b0cf839e0957950a7cefa17c72a9d205945ee50726b24bbf30c3a271e69fa34b9367a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9269749c37303f94d487e717c3cc06a
SHA17d763ac42f1ae99bf6ae93c991d1cd5395e94eb9
SHA25623a66be9991cfc464ee0816047fb664a88203ccb172aa73b85a723f7f0ed3c34
SHA5121e964f22b54129ec54942637013085911d9d6e5145f70ceb24692d5644710f249dbfc16e7857e31c378fd09081f7eca5227d998f4e2d5838622870d1ed7e6038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5946321d91a93dc5bc08bce212dfba34e
SHA19c5f22363d1d7b077e2405c6b85dc916810201e0
SHA256aa4b0c2ec00756f6adeec7efa298f1c1582c2e117389dfbd1a7b345c702eccea
SHA51261046d5573f585dd38132821be28cec25e69ab2c56b5238bfebd91e6c8b71d9e51492943166a1ad38f7e4097591dd6c605ab9046772ad449f2496351989b2128
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0C0CEA21-CAD0-11EF-B66C-7E31667997D6}.dat
Filesize5KB
MD53609b39eec54753b7168a360616c6994
SHA1288f4966df1474d43a7cdda4886bcafb47e2d2d9
SHA2566515c0a24a38d22f476f3ebce1774b272ad140164dad5a30e9c3cf7ff7012d80
SHA5129696f5936fbde2cfcbe2072d2028019b3220f44429092ca38e7bb7fbbeea6bfa2a1a5b378310d29d70006d577626cad4f8ef7da9b72c02f716dea6543e0b9250
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0C1352C1-CAD0-11EF-B66C-7E31667997D6}.dat
Filesize4KB
MD5c4e5e2f9362e03480192ac37c0b8e47f
SHA1c80ba0aeb4e236bf340b0ae8d0c20d97628fbf1b
SHA25631be9fa15cc0b42a743009177f87ca709dc3907849e27bbfd8b2947ef84312c6
SHA5124a48e5f9f755dc801fe1d8c598c660c31402bbfc51d09e021a53117950111c0c4942f0768ab2493ec992b1091c317d1146825e33bee335d33462bd78d054f096
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
88KB
MD5a61ea5f2325332c52bff5bce3d161336
SHA13a883b8241f5f2efaa76367240db800d78a0209c
SHA256e6f8a54ed663061527ab46b8e8efc2a0f3c99ae77829c0be0e50eb5b1b48415b
SHA512fae031e0e7dcd719240bfe94a3f78d1aac73060324d5b65e0cbe564ce6d6781aaa5e930f0729293e3b502b7d07f53f3a72fb2048d44d93d36851aab8330479e5
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b