Analysis
-
max time kernel
137s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 00:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_127174fe9a8c19f58ef466ea84316295.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_127174fe9a8c19f58ef466ea84316295.dll
-
Size
1.2MB
-
MD5
127174fe9a8c19f58ef466ea84316295
-
SHA1
330d313f3415de7d0ff2f59aafc616913183c33c
-
SHA256
6e0cb9dc708b66806c60b6917735680528fe025574667fc36e0750e9e749aab1
-
SHA512
26fde063b598703eabd8105d0116831f20b67e23474c5acc7558ae1795f746e2e1fe5df937dd468c201c3145f1e61b2b31f5f84cde67be139658744251115093
-
SSDEEP
24576:/KMa+QECSwrS2yUJ0AvivK3hPAnYGLzRxahfTN9Wn+lNs6wWKyM7Bfft8ypGYRZb:IDJzDljp0X1yoHtjTjQYPPbxA8
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2860 regsvr32mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2840 regsvr32.exe 2840 regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
resource yara_rule behavioral1/memory/2860-10-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/files/0x000c000000012262-8.dat upx behavioral1/memory/2860-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2860-16-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2860-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2860-18-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{181A41B1-D925-11EF-A88A-DE8CFA0D7791} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1810BC31-D925-11EF-A88A-DE8CFA0D7791} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443755751" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2860 regsvr32mgr.exe 2860 regsvr32mgr.exe 2860 regsvr32mgr.exe 2860 regsvr32mgr.exe 2860 regsvr32mgr.exe 2860 regsvr32mgr.exe 2860 regsvr32mgr.exe 2860 regsvr32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2860 regsvr32mgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2896 iexplore.exe 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2896 iexplore.exe 2896 iexplore.exe 2908 iexplore.exe 2908 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2840 2776 regsvr32.exe 30 PID 2776 wrote to memory of 2840 2776 regsvr32.exe 30 PID 2776 wrote to memory of 2840 2776 regsvr32.exe 30 PID 2776 wrote to memory of 2840 2776 regsvr32.exe 30 PID 2776 wrote to memory of 2840 2776 regsvr32.exe 30 PID 2776 wrote to memory of 2840 2776 regsvr32.exe 30 PID 2776 wrote to memory of 2840 2776 regsvr32.exe 30 PID 2840 wrote to memory of 2860 2840 regsvr32.exe 31 PID 2840 wrote to memory of 2860 2840 regsvr32.exe 31 PID 2840 wrote to memory of 2860 2840 regsvr32.exe 31 PID 2840 wrote to memory of 2860 2840 regsvr32.exe 31 PID 2860 wrote to memory of 2896 2860 regsvr32mgr.exe 32 PID 2860 wrote to memory of 2896 2860 regsvr32mgr.exe 32 PID 2860 wrote to memory of 2896 2860 regsvr32mgr.exe 32 PID 2860 wrote to memory of 2896 2860 regsvr32mgr.exe 32 PID 2860 wrote to memory of 2908 2860 regsvr32mgr.exe 33 PID 2860 wrote to memory of 2908 2860 regsvr32mgr.exe 33 PID 2860 wrote to memory of 2908 2860 regsvr32mgr.exe 33 PID 2860 wrote to memory of 2908 2860 regsvr32mgr.exe 33 PID 2896 wrote to memory of 2692 2896 iexplore.exe 34 PID 2896 wrote to memory of 2692 2896 iexplore.exe 34 PID 2896 wrote to memory of 2692 2896 iexplore.exe 34 PID 2896 wrote to memory of 2692 2896 iexplore.exe 34 PID 2908 wrote to memory of 2800 2908 iexplore.exe 35 PID 2908 wrote to memory of 2800 2908 iexplore.exe 35 PID 2908 wrote to memory of 2800 2908 iexplore.exe 35 PID 2908 wrote to memory of 2800 2908 iexplore.exe 35
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_127174fe9a8c19f58ef466ea84316295.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_127174fe9a8c19f58ef466ea84316295.dll2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1911a8621a8c40eeb2d0367f5b49965
SHA14b771690d6e3dd4596ccb6b90edd439d016ca81c
SHA256b9ca005ff2da706aa8ef1459cae7889e2aee756bdb646ef4c313b6e05c78f041
SHA5122112056d025bdbb6915f096cc38a1c40480e828de2e8f90ddc1d35b16d88e8b4309338b0e69507e1bbe5b96aa2302f7a3323159a990bb11fe659597f3e6688fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f46a8ac01e74e1d38d781433a77d8be6
SHA1a5eca76a1eb34ab0763cac0fc8b30dad78945f0f
SHA256aa6b4601f6430070f40b5a96f9db79af5f6b6655cbee616069fcecd84c922b02
SHA5123bd7b9f8d5bc5aa5a8d4334defd335fd99655d62297b845fca59e5ac68fccf400b2cbcb0023adf596abaaed52fcf6799ceb7c0297e5a3c685929f79a577c7386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572da3316abe2dd40a503d8e84b3d4152
SHA19d7449db1182a96f65654622c3060949f1381c91
SHA256ed9caa92e7d2935b76c0bdae528aed5492ddd6d31080ede78373a65e20e012ed
SHA512f05514c6fde8c5a001172e865eda9124203a35d73073f5eec14cd4ea5bef8161626bb90862ee7f3a9a3476c2bd57ceec9edc927dbe98cfa204767861314e64d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6ee3487c8d1c0b20abf357cd47858b0
SHA18bca6ef1c58a04638ad2ea7008fbc6536c5d1f13
SHA2562afc68c05fc8c1307816ae1885a1af498162b60ae496c5b0d71009fbaaef794d
SHA5124f522477ce3e4f0994e1c231393da1cc3513b0124e472009f7eedcd2017e6f112f8b4f4c2444fc0d9ff41c0ec7459ae1357203133e4f19dc48f560aa44757400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee0412f2266e3404dd361724efb9aa13
SHA150f9656720351c2f6b2a8672731c4fd04c590494
SHA256b0936d93cd50d917d3e3c568c9219f24373dee0ac35a3db1d33e9a98ea84c5dd
SHA512f4f235a44966b289eb12e9bf2b33571335a9c2be91dcf586a17b422b6e711fc76c5a5d0c4bfaf1ce6cdb8f106e1ad113212f00decd1094559ebbcefb325c11f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbe1590f714acfb6f3e3662b0ebe12f
SHA10e071fc009dab53fb0cb34d33f2970b8d9e95f72
SHA256b86bc213a1e71964ce3b77bfdf7e1ca8d4090cbc45b87e32c20d7924162fe190
SHA512f4afe1c9b2396bb776727ed1c114bbadacff9dc0524d565d6c907f62de90df573d77586e128bee159682e435004c69798b5ff474429f25240b6c136fc631beae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718265d537bca824ab36d6803b907bd9
SHA15dac1bf0ff486c013b0853a431423093d8aef109
SHA25630f5a84ba2ba872fd1d816b4ba27c575048100d9f7ece8524719072621640ddd
SHA512b869e5dc8a695b8fa33fb9d1cba903c0cedc34dfe95f66247c32f2a9e9c68619034aaba97b16887f218e5a93a30532c4273494be350cf2653880b233347665d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558db4655f70e1884d697a5f028cdeebc
SHA1593e3d120c527c41cb326b1ab94e6cc4d92f6f34
SHA25608cb25badb8a43a78aa3be0ba2860a9af590366254ac78d81b144ba8cdf7ec61
SHA5123102fc6d7c819cf505084464844fc94e3aeb5964a199bc766b495796f838eae4dc0cc765627078d41062a9107eed71d8c2c1f89b96f9ba1667ad6e7331f1f682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b7db2307335d2040a3890b66329930
SHA1ff836f25e76bfa7d88f29e1fbe517582298dab40
SHA256a2678186db47d1be0ceb3e6956eb3e1c23f19f18f215f37e47ea0397596aec1c
SHA512a572123d45bac425bd2cc6f0a4de786deff64dae18611d8e13dd88084478f145e5dd9b7c47360fb8b3693e4230733df12294623cd1ef296475047a00717c5b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e36b4ed4b41714895f37a6afc404a070
SHA197927c21ff6d6ce219ebe1a653a131d53ec316b7
SHA25613eaa4ee80578ec7f7335ad98fd269e1f1f35cd7a6bd0d2552d209a285ead102
SHA512c9829a42158379c826f0ec103118b6d0b31e29c5fe1d15702c5de06f46929521b612ba00531bdce29f10383dd77a30176e9f8622cd0fbcc5b1fbaa9707328097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d594ed96765f262fa8732bdb02a9b47
SHA1a79995702ba7ecab33d3f99623af92aa8a5446ac
SHA256719df81e614dc94d90afe28573f3cc87cf0258fc86fcd602f144e644ed2b2827
SHA512ab9479b95806369ce0e145beb85eef654d16858449b5af8d9edcf4aa97ac7b024b3930d4f6d64c6ca3f863cbc4cfa7bc7832f6396acee96f930350f5432196a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ba94889baa7d89f4400f440da107a9c
SHA1386ed2c4cb4493ba3eef165c31a2ef8712d20d98
SHA256571dd8d363bbb22d5c235b6426f50dce81e607702731050af8b212e214babcef
SHA5124764007bfb1b94d4414d9d0ce23f6a81c33933a929f710afc5aee13af48a661d0deb1a1aa6e18707a6d74325649ced40a9e7086520e20d79cb380fd3105885ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5496744546fa83fe770b6d33138aeb084
SHA1ec1a8cfa0ad6d6b8398b3ffc4fbec637298653d1
SHA2561ff605c34a86dbc45f3f55ddad776fdf198388800de799feb1884f74f2403232
SHA512d266afce6a2899c95129b04b234a84aee7cbe43b8609898f03db3002e4bf80d38c8d16f06b04a274afec31508ac3caf47395143d49ab898f32c93e5e9fc3d9cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594674a9c6e4623caa19ffd76655bfef8
SHA153a9653f790ecb0a4acf6f0e55901b9be57a7c30
SHA256e881cb0b65e12bdc1bcde322f5e56a3c18e5532dca26faf239f332064b1cd6b4
SHA512ef53dfcc427baf8ebbfd00f4e31ec3d321fc728c04ed48a78c325c79bcb7bf6217e19a64a9a25e6cd8ccb4dc5b0fc8791471fa29bf35ee73b6f70417cc98745a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583de183e1faca5c42593933603173708
SHA1936aedd8124de0549718e12d767d63b2b148c1bc
SHA256c542e56298ce6d6cf43a1768b5cc111b97e8a8a200acf2096387ba154d96b928
SHA51278db2a2475168596081e5283b6e586f895f0ee68088d02f457583027070619acfe5def112bd66743ab113695cb840d5aab968bc62065d0ab834cc179ce60f1d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579a86c9c30165e036010b617558d7ad6
SHA1ff90e5ffc4c9af37245e052549a95ad081187567
SHA25659e93cfe21aa8c621fad787b2fa07c156712ea11364991eb63f82119e2badb6e
SHA5127270ca44a3d433c8401afb25f9a4769c001010cee5d0645fe58b17327154fa94e84324265339fed75d937256f436bcdacb1ddb9717b5618a337708b3105c1a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f8cc579bae36fd489e674ca8455ad53
SHA128243cd5c1c2aaeed432c6e506157595d8768b9f
SHA2566eb4394eb2e3af2d250cda516c42f3b0ec5deb7bae0737011d38088f55ce3ab6
SHA5129842c56830e850f6d27edb7b7960081e807f75b1733ff265d81cf11a8d1096e5594b78331e429d25fd9f42a725f602d4b2ee7cdfdbe8ea112d4b1efdc63ec945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3a1d1f57c3efcd3be7e693b0dda1b4f
SHA1a3c546956004675fefb1a70989f6e504f1a1eba2
SHA25639d7d2f37de40ce2a828a47cb744eaae561b28b17762e629c2da2031a5ecdd6b
SHA51291165864c2e7d473c575cac99f9cc6e548b0866da9c60226123313fb9148e0a407753bde61e5213269a92201d5158a8c8ba9a5bc86fa52ff011d100ebf2e2160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a828a51bd96c6b21d98c6cce57f94d7d
SHA1c60a8ab595f166912bc2a07e247422a730eb274f
SHA256a76d24fba274a09e0c91817aec6ffeea755fb0a490bf6f8b4877bd3c839be2e4
SHA5124e765904ffb66d7bce461eeeb6885b6b1258e0d3fb133f2a90b22d3bce2a5086c0f81ce3a50d5ad57a51f533482ffe24285ce48222c69a519f6b05036867624b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771be44ed661e3754289e2a068b41c37
SHA19be3a77f11cec91ea36947f486e1fe61234e147b
SHA2566cd01aa51613d4cca82b4f758e1263b070731f7d5343d6db5b5b8ee1cd0ac73b
SHA512e2f7ce7110ea638d454f6683f89e3898826eee36660afbe04e7f2fa2d4d8ca9350f6509995b3d516d80d18429ddc593d3bde083f844a5d8282cfaeed9d1db0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c436587a595e267362e105a9f639a0
SHA1c163cc5447965a7f69ca19eb84dfda387e495614
SHA2564e0cd42b31216d42b597f0f9e2096ca6c2ccbb328874230c13c8b35b9577cd1e
SHA512ff9083634e89cd34dc23941f1308a463d648e68206cd11fe6ecb53b13c4ce700795a01f2632ec97a75562c7416959b90e154295d6b363522132afd13e817c774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef7b4e1221606ce2e98ebb69bd9fe35
SHA1de885576e91fb35b5609af0419856845538553ba
SHA25640ee741bf63e3d4e5a5df5b9bed9ea53a18fd7ccb021274792bef8d5bd9ed17f
SHA512b7776bc665daae14dcf75f9a2c4dd0f9811e6f41884c62204115e049b6e4389da39aca52e304aa6f9159e3a3b6b29331523db1fcf7e55aaf3487b464db5664e0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1810BC31-D925-11EF-A88A-DE8CFA0D7791}.dat
Filesize5KB
MD5f9a418607f09d21ea527e70d3a041d4c
SHA134fdfdbd5ad72c2f81e22f93ab2d0e5bc604e0a5
SHA256734c011f7df803f43f4c081b7dcf26f167c3d6d6f26aa841e553fea9f200a4e8
SHA5128806e2f2ac931296ebdb5fb30a9ebb555f60a6f388757afe7fd8d6c04332c59282bd08da93c51cc96ae1e09f87b7a235263148d9364cd2f4586e48e4c3480c33
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
99KB
MD5f57eee1185dee33198b752dd1f66ad55
SHA1b60f88d65f8805bf2ca095ecd1727b15eed4ff12
SHA2566bb93bea58d84b9c6a562a6b888ec84ba0ecb7575b6c8f3264a9e9fb44ee37f7
SHA512cd97a2207d7ad6178cc7c9fb13fda7015bc30a924aa43b6e8ba07961ef878a841e6d025047a35e3b60ef23a3ab9b59b16d1abe09f39dc0cd6e5515d46630ad40