Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 06:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2924e5b67b8a03b5ee9beddfe7f30b3e.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_2924e5b67b8a03b5ee9beddfe7f30b3e.dll
-
Size
2.5MB
-
MD5
2924e5b67b8a03b5ee9beddfe7f30b3e
-
SHA1
9830b88322fc8f0c60cc8ed5d5b7d131ee3318b6
-
SHA256
16d626e7c865d793eb4d96695201e853e25a7e9aa6ec18bec21c91e61b7877da
-
SHA512
3d658c461be14b364f28d5a1cc2643b889becb9eabaf9cc676c31d951aa58076608379a9fc37b78fbe3ff286caeb85d86906df6daf48b86fda1ec7258eaef64f
-
SSDEEP
49152:P3pp9ziy5bRCrEaoWzw7ai91wgvTBBsCkh9Sp3BVcmUG8lFN6ijGUKYsVMLz6ons:P3pv+y5dIVs7aWPvTBBKh9UBVc/ln16T
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2344 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 1372 rundll32.exe 1372 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000e00000001434d-8.dat upx behavioral1/memory/2344-15-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/2344-19-0x0000000000400000-0x0000000000478000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2124 1372 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E9E9851-DAE8-11EF-B788-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E9EBF61-DAE8-11EF-B788-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443949600" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2344 rundll32mgr.exe 2344 rundll32mgr.exe 2344 rundll32mgr.exe 2344 rundll32mgr.exe 2344 rundll32mgr.exe 2344 rundll32mgr.exe 2344 rundll32mgr.exe 2344 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2344 rundll32mgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3012 iexplore.exe 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2440 iexplore.exe 2440 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1372 wrote to memory of 2344 1372 rundll32.exe 32 PID 1372 wrote to memory of 2344 1372 rundll32.exe 32 PID 1372 wrote to memory of 2344 1372 rundll32.exe 32 PID 1372 wrote to memory of 2344 1372 rundll32.exe 32 PID 2344 wrote to memory of 2440 2344 rundll32mgr.exe 33 PID 2344 wrote to memory of 2440 2344 rundll32mgr.exe 33 PID 2344 wrote to memory of 2440 2344 rundll32mgr.exe 33 PID 2344 wrote to memory of 2440 2344 rundll32mgr.exe 33 PID 2344 wrote to memory of 3012 2344 rundll32mgr.exe 34 PID 2344 wrote to memory of 3012 2344 rundll32mgr.exe 34 PID 2344 wrote to memory of 3012 2344 rundll32mgr.exe 34 PID 2344 wrote to memory of 3012 2344 rundll32mgr.exe 34 PID 1372 wrote to memory of 2124 1372 rundll32.exe 35 PID 1372 wrote to memory of 2124 1372 rundll32.exe 35 PID 1372 wrote to memory of 2124 1372 rundll32.exe 35 PID 1372 wrote to memory of 2124 1372 rundll32.exe 35 PID 3012 wrote to memory of 2676 3012 iexplore.exe 36 PID 3012 wrote to memory of 2676 3012 iexplore.exe 36 PID 3012 wrote to memory of 2676 3012 iexplore.exe 36 PID 3012 wrote to memory of 2676 3012 iexplore.exe 36 PID 2440 wrote to memory of 2904 2440 iexplore.exe 37 PID 2440 wrote to memory of 2904 2440 iexplore.exe 37 PID 2440 wrote to memory of 2904 2440 iexplore.exe 37 PID 2440 wrote to memory of 2904 2440 iexplore.exe 37
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2924e5b67b8a03b5ee9beddfe7f30b3e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2924e5b67b8a03b5ee9beddfe7f30b3e.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 2283⤵
- Program crash
PID:2124
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599aaa0d988466e3d4c21cde37c046d2b
SHA11ccd88af52f84b5d447127733a95f66a94d38e6c
SHA2568ab2803942b5195f0c37e5397d03d461f66ed7ac5391c216011f5207ccad19f7
SHA512901036c6011620257f3b4292d864fa124b99509d3b9d2623b9b7a572fd97494a87332e82617d776dfa643217d1cadeb1d1936dc4195a0f63d58b3e559a6e2cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579243b3f8461375fae48e5b59ea4f146
SHA15cb8daf80541ea7bbc7fd580b4ec31e9e9b082f6
SHA256105094b77dee11648bd731bbb002d5893f75c39f2c1a1cc91b83ebe432b46609
SHA512e520901d48a6ddb730636d96728694c9f4d664f9236fbb850c28aa99332928b30ca690cf5004687c325fd05418638b069e08e9c48aaa33062415a9e89f4efe34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc3ef56146a12ab0744f1a855db3b0e
SHA1f3f41f0a8aaf370012f08990618401b9fbb21372
SHA2568637bac410a7727ffb7f16f1dce3bfefdad14c67a3164357ac6742897c7e4d77
SHA5126c7991d3a90c851f56fd5fbc8ff96e659b02291964257889c89567100e4a02c1ec23f6671f4b0c0bec0616badc1390a4169baf931d8dcea76f888f02511a8ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cbc64426a9c57f972e3fcdefea03dbc
SHA1518cc1b0327d7237ebfbb2bd0d4c5763f75a0f1f
SHA256128749fa6ef97f79e349dc7e5bb62a319169b7b331624ceebb8e57c0cb431728
SHA51277cc275e6ad371d6eeab7ad155e5f99ab3c5fecbad66ee367df9ce3921d9391dc168c20e2fcc7e9c98deea1d14178e0ce86b984f845f68ea09dfb22dfc275951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6b75f0b40d3bc2f28950d1f4e2c50e
SHA13723bbf78a776589646b1ce3d2b4b43797ad57a2
SHA256c182c07163bbb283e077650eb3ef0db50ac9146efe5ccb49116615e726060a18
SHA512910a131354f37cd1f4b41f96fa61c41e6a7ccaed6d4c4cf68fb6a7dfc2b14e597f55b09cd23f2dc95303512676cb327d329428a04746ee0d95d37e47b2db9b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a41f27d5ca54854a2e95155f31b43cf
SHA1d2802cc5ca278cd1b36369e60449d4b2292cd373
SHA25675606b002f2989c5ddf51d051f5fdae37502538eb8676205efe5431d1367e372
SHA512329c55d0dbaa5f989b49f7d4634256cc1a222447cbc9c688b44310826a0de3bf399122824ffc9de4f52cf752b4ca593f05e43fa4305ca4abf3c7c855dc53f96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3bbf7bdd560ec503f53da251c5a413d
SHA1a832303d0152875711292b30a3e1f1358b2958a2
SHA2560447dc6730f99ec3a4975da2f2bd819231dbd9acb60177fd0b58dde44a74c612
SHA5121cc5446942474bd88a3f48fecb577b938af442ca4ca928d39d254df3c12adde39755c955711842e56e495d9c0a18e1681d95360c6f3635fab68b78a383d94ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0fc45a7f04fa28fd6fdd6b3d27bd715
SHA11aebfce88e68dc248c8a8967b69cddd3bbded66b
SHA25654e93b22424aa41dfdc3b2f278bbbf25e3d8d041ea234cdc92907dfde9e8be6a
SHA512aef07498a7ff0993c8c88158042bb17f34c9fe8ca9cb6639724208436aa744dea5be636d58894e760317657a6669459c64752baff4f2ef136111751035c4bf52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c29ed86d0c432ce69012dbe403c3a4e
SHA1a551fa37f94e06650dddafa1fbc940ab6c336b09
SHA256834720e019618142553a55f0da41e0bad628ba41477bf98769169885978fd031
SHA512c53097520b9b51828152fb7cd313a46cf1d080e46fce0a0e4d10d46c36118f1c65e3a4166148d27054b62e23a90ab4314fc3e0faddfa7c9ec0ba3009b1d2ed6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb01f1e7272370b40980478add1b7a69
SHA12597ab51ec37edaddf3c4b1bc010e1bcfd67365f
SHA2565fab69af8caafba699dbec1e731f79656c610f3296c3adbb429f7580004c2ef4
SHA512ba4ca1dc1e047e690902ca205e087f0bb2b91231c7008d5bb28890a53199fc5dd1f1c465bba429442f58d6ab670de063c3a991ad69c03b62e233b070329a7b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df56b415819c56424146cb20f034fa44
SHA1ae56570fe3f8d863eccaf5765479a716f27b30b1
SHA256a5d918bd45a69fb0ed3a4394aeacb5f3e4c092dc0f35015d3200f5ea99bcf28e
SHA5122fc9f3e3fd111b86ed9bed9194e924aa9e310a824c1b46c7ff44bdc8c1832114ee05c5f578c7bafd5ebe512bca07180f1d30e36be4a25b8dae02e263c4d3d3c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54537046c7c125dea906e869151300f69
SHA1fe51c4cd97676e52936a5a0400885ad6daf58fd5
SHA25663bba2a81218f53307d5721c775d95bc4468373561661cb481a53fb0fc2bc293
SHA512c44fbf80181ab55e8f465c448c5d77db37b1c599e937171f9a834604cf8dcbfb660287520ca6bf38945a165e79fd37ea5d5c811a754b4566b459c218d276d771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e7340b86fd8d5a9ffd4e71e56250d37
SHA1e5d0266541451ee7dd69cf3c057d06fb6811a385
SHA25676ea3f5c5509bd17620b2f54d21892349fafd541f5590a84380f07bcb26d02c7
SHA512dfa6e94f6b6e66ef07f825f5c1a1c2db49de3f907ed970f90f0757df9678ce0c20b88df1fd9865db65dec914478ca09e3775da2289af4bca136b3738838e1bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539202cefced844ebcbbe3e6fd589847c
SHA1dd1cf49091be7e29c2e66fcffb70dc38bd145bd4
SHA25615fe5b1665b42a89190db0cea0f647852405090b5ee0e63b2b69bbea6eb425b3
SHA512dca1a3f76394360826550d9f755c27be268cc8f7bfbd9d9dc5f71498f0afb2bebb95f16a7227cbb0bd65c010fbbef042f19db674c1af09bea2a68b63e6fc82a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c474671422dcd9da6fa0ec7287751968
SHA15ea1d09cd974ef291f7e59bdc5355237ab044799
SHA25674bac52748f93f2e63572d82d76430f735a02003dcd34c146f51a1f137b41709
SHA512cbfca44226f316da6d058306ae1c4b489d63f9de6420913bd152160b4479a72e4ff7dfe927597fa101642f004025c75f7add5fe744bd5cb9dd9a54f0cc316d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ddedc09d2c1114e0ac62d4c84822d9c
SHA1efaa502a95fc1e62e4d2ef40ffd2379fabd35d08
SHA256c47d7baa7890b3c99ff5e08e4404e4c1adac686fb910a01bcb968b48c54e1ac7
SHA512a2db8936fd70af408c5a4e1737dd41e9381e341241b8c29b8eba0e98cba5576e666bec04389eb67d34ce914ccddd1ffa6c9e0ee32b85669a8cbbe9284e366a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228e97d55a8010ccdb3a468e504cbd04
SHA1250adef74be5471cb49a1f6d5fd8d189d2879a5d
SHA256a15ab7be2cb31e6ce6528076b46c60fc0479d997b6a536a6fc5082074d0e8624
SHA512fbe2705996db5061ccd7db9ebbcfaf00571fbc90b8de3a48cf2063196909afd6191a28f59333f29bbdefb1dcd5c6f0add1d8d6df63c17f7e52c43912476ea219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e5ce3e5dffae9f5820c43f44b91a450
SHA15be832e3e9762c9786133affd54dba0270cd3216
SHA256266956f8772a18a578b6117720c491598aa63834d995d7ec2ff839043493ea6a
SHA512419cd771c5b3660050e8d5caf242abff09b526c429b854dd8bf3f493358ce1eddd4510e8ff863d998b636d25bbd0354e997d9b98f1758c8545bc3fd4fc8d3da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c9bddfc309f50cc065de8a97d488ca
SHA1c7eb4e821031900c6c49a0d306b4777d9b26730a
SHA25695dbdd74cc746ff4931ad2c89d0b4756aba97f508c37ab01afb12f8fcc2a493f
SHA5129bc1e5623e35f3c3b4fbfd2bd5db5de5674b76ecc32701bc8fcc4afe6d4bd37553a5ae804833eb70875a02689b3b45dbe7e90ad8aeb7d187ee0f25666001ee91
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6E9EBF61-DAE8-11EF-B788-5A85C185DB3E}.dat
Filesize5KB
MD5cdf784b1f6dd6779cf8070bc740499c0
SHA10ef7af6f95995b52462892f03c3d8651ec7d0a8f
SHA256e97623421f58e1acdefef51a3a4ddfd0ded25184303845031b3f41b909d6662b
SHA5129effe98b1d613e70e6f480088a01d07e40e1ddb12ec19cd6f6c1ca93ade797deaf3013e2fb4e8675b10bc8f52f5c37666e4750d05abfb609879eef5c369111eb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
221KB
MD5e70ecf2fa14973e7c61384fd7dc5c4e9
SHA1b284f9366cee9e961d9ee3be9148a87a5d2ed7f1
SHA256fd0f984f320a0422206c370fbc00c2e931bb9236d2ae36c4f9a968fc9241571a
SHA512563f7501121a16cd24a67443a919afdf4d011e930fea2719418919b9b1b1e30620d63d83954f8427899628a7023521a69cbae20597258f7654647c987c0a9aef