Overview
overview
8Static
static
7201b3ddbae...18.exe
windows7-x64
3201b3ddbae...18.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3CCleaner.exe
windows7-x64
7CCleaner.exe
windows10-2004-x64
1Microsoft.mshtml.dll
windows7-x64
1Microsoft.mshtml.dll
windows10-2004-x64
1cafw.exe
windows7-x64
7cafw.exe
windows10-2004-x64
3cladgenius.chm
windows7-x64
1cladgenius.chm
windows10-2004-x64
1decaptcher.dll
windows7-x64
3decaptcher.dll
windows10-2004-x64
3fbclient.dll
windows7-x64
1fbclient.dll
windows10-2004-x64
1holfix.exe
windows7-x64
8holfix.exe
windows10-2004-x64
8ibprovider.dll
windows7-x64
1ibprovider.dll
windows10-2004-x64
1icudt30.dll
windows7-x64
1icudt30.dll
windows10-2004-x64
1icuin30.dll
windows7-x64
3icuin30.dll
windows10-2004-x64
3icuuc30.dll
windows7-x64
3icuuc30.dll
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 16:58
Behavioral task
behavioral1
Sample
201b3ddbaeaa3cc5f7480d8fe72fc567_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
201b3ddbaeaa3cc5f7480d8fe72fc567_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
CCleaner.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
CCleaner.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Microsoft.mshtml.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Microsoft.mshtml.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
cafw.exe
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
cafw.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
cladgenius.chm
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
cladgenius.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
decaptcher.dll
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
decaptcher.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
fbclient.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
fbclient.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
holfix.exe
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
holfix.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
ibprovider.dll
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
ibprovider.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
icudt30.dll
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
icudt30.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
icuin30.dll
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
icuin30.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
icuuc30.dll
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
icuuc30.dll
Resource
win10v2004-20240611-en
General
-
Target
holfix.exe
-
Size
256KB
-
MD5
53f0c95938fdb4b3f0f4814bc8b1b9cc
-
SHA1
08c2a4a3df5381f8f49a5ee2372728400bd24671
-
SHA256
6b3ed396381a68ca58a1f4c73f00b40e2c2f555d031690865a64f26d2c5ed7fb
-
SHA512
2eac3782b5c1e1f45c9492b17910b60f28d2ab69aa7ec1b3e39e3ccf628fe30226c2824309a87d1b84c288b6028b903d3085d01df762ba421c7a5d5a7ddd6f9a
-
SSDEEP
6144:wMWnwQaTtvIa5rD1U8x7Am6OoyFoLp1kvWlp2FN6A5B5dn01:pJQatIerRUAA0o8CTlkFN6Az5dn0
Malware Config
Signatures
-
Drops file in Drivers directory 4 IoCs
Processes:
holfix.exedescription ioc process File opened for modification C:\Windows\system32\drivers\tcpip.copy holfix.exe File opened for modification C:\Windows\system32\drivers\tcpipreset holfix.exe File created C:\Windows\system32\drivers\tcpip.copy holfix.exe File created C:\Windows\system32\drivers\tcpipreset holfix.exe -
Loads dropped DLL 48 IoCs
Processes:
holfix.exepid process 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe 2192 holfix.exe -
Processes:
resource yara_rule behavioral23/memory/2192-0-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral23/memory/2192-9-0x0000000003190000-0x0000000003394000-memory.dmp upx behavioral23/memory/2192-128-0x0000000000400000-0x00000000004C8000-memory.dmp upx -
Drops file in System32 directory 24 IoCs
Processes:
holfix.exedescription ioc process File opened for modification C:\Windows\System32\de-de\user32new.dll.mui holfix.exe File opened for modification C:\Windows\System32\fr-fr\user32copy.dll.mui holfix.exe File created C:\Windows\System32\fr-fr\user32copy.dll.mui holfix.exe File opened for modification C:\Windows\System32\it-it\user32new.dll.mui holfix.exe File opened for modification C:\Windows\System32\ja-jp\user32new.dll.mui holfix.exe File opened for modification C:\Windows\System32\it-it\user32copy.dll.mui holfix.exe File created C:\Windows\System32\it-it\user32copy.dll.mui holfix.exe File created C:\Windows\System32\it-it\user32new.dll.mui holfix.exe File created C:\Windows\System32\de-de\user32copy.dll.mui holfix.exe File created C:\Windows\System32\en-us\user32new.dll.mui holfix.exe File opened for modification C:\Windows\System32\es-es\user32copy.dll.mui holfix.exe File created C:\Windows\System32\es-es\user32new.dll.mui holfix.exe File created C:\Windows\System32\fr-fr\user32new.dll.mui holfix.exe File created C:\Windows\System32\ja-jp\user32copy.dll.mui holfix.exe File opened for modification C:\Windows\System32\ja-jp\user32copy.dll.mui holfix.exe File opened for modification C:\Windows\System32\en-us\user32copy.dll.mui holfix.exe File opened for modification C:\Windows\System32\en-us\user32new.dll.mui holfix.exe File opened for modification C:\Windows\System32\es-es\user32new.dll.mui holfix.exe File created C:\Windows\System32\es-es\user32copy.dll.mui holfix.exe File opened for modification C:\Windows\System32\fr-fr\user32new.dll.mui holfix.exe File opened for modification C:\Windows\System32\de-de\user32copy.dll.mui holfix.exe File created C:\Windows\System32\de-de\user32new.dll.mui holfix.exe File created C:\Windows\System32\en-us\user32copy.dll.mui holfix.exe File created C:\Windows\System32\ja-jp\user32new.dll.mui holfix.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000026c3987602597e4d824f65b327ae5252000000000200000000001066000000010000200000001639bf5f6010de5353063881b01f69758c6f4b835ada0a822a3055d540b99d4e000000000e8000000002000020000000975d725afa7d326bf9a9d2a1fab61af5ee4fef06df9ab6e8ecfc9cb78e7da1582000000063bedb9c1af39fbe49fee309889741a3247cc17993a2922b64646f0f8ee0fcc94000000009a4f547bd9ba188890d83881933b7819c2e62fc09eb4aa575e03c26a761b21befb2456588292640711d9f4b1817573569668d07367c1c2129a1e2fccd8a6fca iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\half-open.com\ = "32" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\half-open.com\Total = "32" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\half-open.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426101392" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\half-open.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "96" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\half-open.com\Total = "78" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "18" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\half-open.com\ = "78" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5795EFB1-3894-11EF-8CD1-FA3492730900} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\half-open.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "32" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0019292da1ccda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\half-open.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2528 iexplore.exe 2528 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
holfix.exeiexplore.exedescription pid process target process PID 2192 wrote to memory of 2528 2192 holfix.exe iexplore.exe PID 2192 wrote to memory of 2528 2192 holfix.exe iexplore.exe PID 2192 wrote to memory of 2528 2192 holfix.exe iexplore.exe PID 2192 wrote to memory of 2528 2192 holfix.exe iexplore.exe PID 2528 wrote to memory of 2740 2528 iexplore.exe IEXPLORE.EXE PID 2528 wrote to memory of 2740 2528 iexplore.exe IEXPLORE.EXE PID 2528 wrote to memory of 2740 2528 iexplore.exe IEXPLORE.EXE PID 2528 wrote to memory of 2740 2528 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\holfix.exe"C:\Users\Admin\AppData\Local\Temp\holfix.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://half-open.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
252B
MD5e12b97258d02bfffdc91d6310e6d9b0c
SHA1d3055734f5a95ebade3f8dd463f019d88ece74ab
SHA256a07c55846c618c5c162d41900d37d5e8e68d3244396fcc66f0b6a3e2b1a00266
SHA512231c317947b6fcd0e270321b777e95e6e72144de355533bf99d17c517209e23c5ccbf938662ce71b38889e5158a1cb30d78bab215162f3213ed9b15311988973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD510822c62605762b06457c956bf580abe
SHA11aa8ca9ad1b18a8791bb5fdf754e81e9fe48f208
SHA256e41b93adf05db580666688e272972dcfc166de3eb7614a85668a82b3ddeac38d
SHA512643ffa2cdaa2aea6e7c21612f2f5f4912072996f2768980bf0eff55b5443bb589e0df1c3099f359a4b3b0577bc6d20ee844dbb73bed5908b27388e021be49b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ad001ac81cde25ef6b093f27602f9c58
SHA1b46301da1e9fe361b616cc5b81b86e8861cafd80
SHA256faa1763d68b16d98c7eba02f0a11a0a589e6f805f6a32deb5271980ad0f61a84
SHA512d9c2840be4537792d894ca39bbd4fc61ab4d91e119d83a621f2440efe865994a68dad706be13674f312962ee6b9b682ff13d78f105b4cf887cda7ce94bc075e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD52f2d5a9ff812a0e8d83d0ac621d6ffd6
SHA1d3fc348e33e66148f4e4754e70174bfad11a3f42
SHA2565058185931e10e30da1f7fbdd80267ed2366f48cba7c7a1c33edabf27fde6e47
SHA512ddc6025588b5916faa0628d67f25ec2acc35f47381ad0bfe1207b90e66f6db52327214da820f1a557a2763509c8d1ca5cb9872b27a3f16781dcfd7e1d4cc6300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b69f7ddd7c43171b05550e739edc8a5e
SHA19fdc3fe4538deaaed3003ff0ad0575cb74381e87
SHA256f244af116f514f448cca94ea10acf19a85b484c62f6d2820fd1420c30c41c098
SHA51218f0c2510628fd887af6759c3c605fe8b09e8aa4ba16b24e21ae3f7d5966422f789ae9c811b4197634ca333b53e84109add2efb9d49ed318edf20e54c706ad60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54bd1fffdcc6c20aac32147c6f1f1b338
SHA1d897d888bae3820606df8714a4d3b57cf9dd3606
SHA256a73a7d279e2f813cb4e7351fdfd0a6ca2a034c3eb48cf439525d4345ad39bc7c
SHA51283f3bc5cd25dd09abdf2387d66844a5b3c4891ae6d6893ca80d1a5aa17f3659b95e50927334dfdd8644a9fabdcdde97daae05186e5f819142d63d4fc383473cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c4e026bcc9d51600e1a3238f8f11b1d3
SHA17744ba82c505dde26ce954f10c9659b2e382d3ab
SHA25675ba3988780535b47fd1f8db910ab27289d01fb8e18fe54d63d9ff23decb4900
SHA512f8a2afbcc3535d6eca633c36d2559051f28d4c7c27d67fda81d0e4f177b4e4af40736e70c1cc2c8951b607aee5d444afe252eb5fbc03873bde11932dce1948eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54a813ccb5cbacdfb35604ad7ad63baa1
SHA1003d3af6393fdd895e0cf6f61fc34eba8d3618a1
SHA25699c7fc32c7c77f892728863e890c4168b83b675677711fb4cc8b786c1e651c27
SHA512030504f7c2f0eaa326ce06305accef4ed21a3f2364fbfe35bf85ebc82e39ab7772118383c55278160a286aa677212682fbaa19838c4c4fd445ff7f708ae678b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD592ffd924e98d6d6b75de4916eac10c37
SHA1d971ec9bb693b3fd87e40e713d4a398b785e80e3
SHA256b4c21fee6b75643cfd72149c7aa3449ea172e627ce82e9c49a376b3152327bab
SHA512a18cd7493c393c48493b36cf3726f43a92947841137895b789009b7418424ec190b2d902cee0cb41de6724e827092a71d9bc71f1fac2b126abdb77c7ea31944d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a3a486fb426eb51d02bac9ab6d0d7989
SHA1e25c84f1e0469004bbee0f48ad1bfe78458d9e3a
SHA2565428f776bc0d372d2550c3bc85713f9d2b5306daacff16c263fbb915f25cb924
SHA512ea3181f6de8464c6fc1b642cc568a3121ae7aa8d69f31343e4a2947deeed3e6afb7ec609299cdd003cad88785351987b86d41c8df271eb07f730dcdf3d63d803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5fb37997f752d5d312666f34580e4bd42
SHA18f4de30841c70c1b94fc55f3f2b62446f0e7a1f4
SHA256ab8822353baac410a1d206dc50b185a0da9f6529d1c29d5b9f6231cfab639c9d
SHA512f09cb47bd5bfbf6df102e4847236e7f5e83ea732962695c932b29b1cc2ee288e1a4e1bb0161f62e68d3e361c0ed51cc1173be4b6585045154b70210f9b543232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e2c57fe11ffbf2661c1a448cc7d74acc
SHA14ec39a86af011be0665b30680f676618b252702d
SHA2562072df73802b0832b6c9c852092bc719eccf06dce4c9d25d7758ae46bf9394bd
SHA512f8dc3e5f26594f6e3466b4b950ea68980aec43bfab6f4cc467ff6929c840cd8cc40c4f17bc9160cf03943606cf1442209450d22f69ae224a300441f95b991e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5699543724c852ab544ca2899f95e9b65
SHA191d12737f49f8b7d9e13be490196ade7052ebd7c
SHA256b90fefd2edba70e19ecfb5cd397ebcc9e71f68282d34add8c17f08683d3093a7
SHA512f8ca18078c40ed451bb344d9adccda3f2b405740e23a121382fc0ec13798f9ad5b3a9bf18e90848f1eeee68f0973b8a03d0effa73445333ed10aeee353c81ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d23bc6bc915ee48391f48a8442321267
SHA1e2ee313f79a839ec734bdf0ab956cd3d76767dd1
SHA2568b02ab24baaf5dfa9973667b8c40f8853094e0e01f7e54c23b1295fe76e401f1
SHA51203de94e078587ebf5b5a7b6db685892114fb28f477d923756846afa62f33f08849b5de3dbf6561aeba7306a585a948777c34a6481a3722dd0be397a2741caec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5104084609648bdcf30973b6cc4fdf5df
SHA1bd1eec3c6133136c514c6647cab12d5294435d7f
SHA256eafe72bc3e9ca9ef3adef6b4bc9e384c97affead074ae46c3ffd9797331fa129
SHA512d92c5043cf2ade40f3717af3e36ed0babc5da7dd966649561196c064fa36c33a3dd78ea66240b6fc0d378ea77c44924f0e31daf97f2698d69a447e8f9adb2e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a2478cf55a9cdd78e086922dae23246c
SHA1b6b656a574b262726cabffd7ce4c24430e33ba94
SHA25646095880fa5c821278e3e8aa5eefdf306e0f41ac0a90c688f9e3fbaad502696b
SHA5124ebe4160dc6a972bbaaf032c699931cfbd38c6f8f2ffc629e0b8eae48c65baed837b004ca1b3ac89f9fb19f837917f8c422e8ec34394d55a64fa771a16ecb1cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51af985387b0c254d245a81b686a2932e
SHA170def1f0c841207b6c0f289431a30a175950d58d
SHA2560b566f41ea4dbb52c9d58b04c63522f27af383a986649071bdcd15ef68fdc950
SHA5128425a79c7fefa825fdd2244174f9f87d0ce3e65957c39a5c884481d237c336f08f4500bb0fe4dbc7c1879b910255749bc2c562fefff7b2ef8b816a6ff1c346e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD587c6eb7cae9dcae784f37fdbd56b3bbb
SHA17c90651932d42ae450e7eca681aa0d411bc75b51
SHA256104df3e229ee0543c80979beff1383ec44eeed53e856af49e39170c3c8f0cd3a
SHA5127eb956856be496c2ad71b28f334a820c47c71d74962fd3c9b321ceaceea7a594009d71d9563cb5564b1f7f6f00c7f1525e7b4af8c9ed7cb41cc55db8bbb0d98e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57fdbb9d5241922961b64181bcb230764
SHA10eb876ccf19275bc95ceec32c7adf8da08536215
SHA256b989902acc21328c7d441cc366709a8d09953690affbf3a5227170918200d9a1
SHA512462ba4c6f2fa7ef5db645bbdbbeb1a9a5313fa1e01a90ea5b040a2387235330f0a26a4da26af2fa6cb71cf3273051e6e9a30d20a8baf01ade803298a165ac789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD59260eca0853496abd37898ca17d0b6b7
SHA169dfdc9fc9669e50667d669528adb0592e41d82e
SHA2561c1630daa183a67e4f3810768898663d7f749c21ba343336262a0b2eec868e55
SHA512b301eda4394b21a7f5d802716c4f6bb3bf38d87395dccf5382dfe09f308bf0ae11b8e9ea570fcd5afbb5a948b533f39548233249ef60cd681a50950de39b32f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD5986bfaf88976124ce61939c8aec178b3
SHA141eacc4062f10ea8aba3ffe088ddaf392af9fe65
SHA256e06ea06822a29b91b172a451edd1822fa12c8267a4b1dc0dc49c99d299d24916
SHA51255c9b7d58f617650d4af8d20084e916607c06787b3ad02ddd710fd1751a13c270bf22dd60b86b5c43857155cad937be69875441b59fe85cae3e4941be2e62ccb
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\EVVI415O\www.google[1].xmlFilesize
91B
MD550357ef4568744eb35f261713f0a2066
SHA16330f7353635bb3e1e15aa78202850ff4d9e4003
SHA2560c601811f8c732ca3222c4f3ec169901fc0541655e79c69a11751ba44524f725
SHA51296f593d6fcbee3067438bca17c50ce1e04d3b6ef37a222cc366067cd40e9abf6f7b9d496f8e7eac75276514265b1ad8ef8270bc3baa4950a8001b8e2670493e9
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\JAEZQD4L\half-open[1].xmlFilesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jw2rl61\imagestore.datFilesize
1012B
MD5ccaad2ba980589df32d1f3706b15143e
SHA100f135c6af37918c730d6072aceac3b49618fc04
SHA25606c71ccbbb48db7c73099d122f369c10b15a010aa2b2a7c316464db031b11b17
SHA512042d1f095f5d0f8686b6b31115f40277757349d00df2f0660fb85c103a43039366bf0b7ce7e300e1dcc1fda09804838851e71eb7d0933f83214a40dee4c43ad7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CY2G78MW\f[2].txtFilesize
30KB
MD538339212ce1f47762b00f774428c9146
SHA183d0a78e31bb6fb317d786480fca1b837557d678
SHA256925d416095684a9ed6276ac3fb2ec4307a65b6a62ba2adde21208eb95ff0830b
SHA512451b4d0a6a2faeb7f69ceb70fcb1e5c3159f18560f0322fcb519a7fb2cf6ef9129806fbf76435bb91a0229d4c110caffe65105f4da99c42e98aac47dd9f2a0e1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\I2qUFQRfrMumZh7jZD1OuWiOpNfXCU8kmvnsrzk0bzI[1].jsFilesize
53KB
MD5ec76a06a5a44d0ca983871248ea8aa2a
SHA1921f472e4340d6d489b1891e798badf1c2b534e4
SHA256236a9415045faccba6661ee3643d4eb9688ea4d7d7094f249af9ecaf39346f32
SHA5127112b0a38f4587f7f2c9f9393f984c01e2ce04dc055ac2f44a5315c59a8d8e1cfeed9a15073e6b55d831e170c62c4bd4a68c877c718baf8db65f6360c89a655a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\f[2].txtFilesize
29KB
MD5ac34906f1e0a4cde17b1ae0620a05a9a
SHA1b93c3a3f14902376bcf59628bb88b6c396da3894
SHA256a0a1f658a1e594724109b586bc66c22913d8a2eee1bafa861f82e39699a69463
SHA512d1323b59f44bc8444407aa67ac87ed996a9fd3c88af34c9dd97e636b2f5ac5e9a70d20556a88045ddf4be3eede21ec4e7a6b5c449bd03ac1780871c66b89f7b4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\f[3].txtFilesize
2KB
MD598408a561a774e2414e19971eec1f993
SHA1f51216ceb3dc42de1416511664a7ab3bf7ef6b55
SHA256bc7ef6c5abc6ad9f53e4b766c83bd5f57fce9d43db9cca546b1187e4a0583ef1
SHA512a81646843f0d44a52db9e04debcd5262d8892827aa0608fa3a9284f3963e9177cbf3ae99538c28692dcfa78ed6240ace96486e9e6eab6562a6b8d9e1b545f844
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\uWv0tZr1g4yjhscCRqiRBgkX4o_GbFMllRVwvBM3xsE[1].jsFilesize
53KB
MD5892803d57ffc8be625c8421657af1460
SHA16776453c1a3809358767d63e76f415a9443a2b16
SHA256b96bf4b59af5838ca386c70246a891060917e28fc66c5325951570bc1337c6c1
SHA5120038911eca670d4cef15ed59f1123ed32baa72c7f9c0cb1f6c0e4e3feffba6b5f0dbd338e85d1858dfc6fb24f63d9ed93e61a0da393fbde8c8f7490bcdfdba5e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RSAB58HZ\f[1].txtFilesize
40KB
MD5ddc8fc9e5ed5b9ceb3310d1420742da8
SHA1cc24cc6b88c87245febc08be6f6eab5d0824b8e3
SHA2568cf22d4d96855b3a926c1d6e14ff39c7817c3c01b64196e9ccd4d3ce1a0ccbdd
SHA5128fe7add3cb81a1b6fc5eb4e57f14898fec91e64c5267c7047fe5c6451d12485d870fd51de1bac673ec0e5e4fa366c1443b46dfaae0ea636742d7cedf47cb49e4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\f[1].txtFilesize
204KB
MD58b4778bb22dcfcd74d1860041722ea01
SHA16c2676fbb1b8a70a46ec0d518d3364c906d0149c
SHA256066bf781659af09bb40a24a7d87dd2310c2324c9619e347c6d6d05c00ffeb182
SHA51299ef210ba36ec1ee9d5b4787e84d05fd9f2a7f0f8bb677437e95483077d6d66940002f3b0aa211bff34ea4727be82a54e0b88db49012a020823726270a9a6691
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\f[3].txtFilesize
2KB
MD5cc47d2de85d243938c1e5277f7be2cbd
SHA1df36c30bc0dc38b9aab1a2e9ca9fd12447ea2a74
SHA2562897afa8893463a77bfde7d06c22334a7c2b4b671d2bbdaafc06396d6d4a50c0
SHA512bbb56750c63e11583a48e82357bc0a2e95bd92d612d282981216ebb7b453841f272dea552fa963da632ddc1d111494d417801817574972b49c58d70be444baf3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\favicon[1].icoFilesize
894B
MD5b52bccba80f24a0302940325d198dc4e
SHA159482479a5cd3e85397758902c5ed0517a73b713
SHA2560733e9ae345ee15b468e2aa7363e87aad4e8a42f2e55e641acd02c0c42031a21
SHA5123c5c727f40bb803b62f701e28150bf65dd17a06ba4873efd2629fc62bef933a74b6ac152bda260d99039511ddc9987cfd686d572fd8376bd404e22276048f964
-
C:\Users\Admin\AppData\Local\Temp\Cab479E.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar479F.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
C:\Users\Admin\AppData\Local\Temp\Tar488F.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
\Windows\System32\de-DE\user32new.dll.muiFilesize
19KB
MD5f124dbe67c50788db4fb1d6a9be8d050
SHA12949b65e3155eb8f5bf16e0857459ebd3cd0909a
SHA256bc5a077b0b3daafda0ef75bbf92b9dfa81b0ff01dbbd603f947282437fe0b4d0
SHA512861e8ad6c611aaad1cd9e471083e0d6688e6b666dc344baacbb444ddc1d94c71f480ce773cad07ec1bad7687c13fcdedb4104228f38dfdb79b5b7e8bd74f87e3
-
\Windows\System32\en-US\user32new.dll.muiFilesize
17KB
MD5ef9bc0d92f9af6a446ca3179efda0ce0
SHA1fd411d68b187aa5ef59852c9b815846fcf794bbf
SHA2564420eca521bf0c29aa2b14835a9c4d36770a2c42a3c8b097a7a755e8937b419b
SHA512171014b7de0e59cd81291fc970c9205616c16ebd8918812a9d59f7342ccad1ac0a3f4971a1c5d846418d58aeadcd08c2edec1bcfda9b8f22e6ac3c3dba7e2479
-
\Windows\System32\es-ES\user32new.dll.muiFilesize
19KB
MD5532ed4f40d2b6f0b9b2490fc3202f79b
SHA13e11449ef3e737df8c969946468c48d232d8dbe6
SHA2568b38226109ce42f831e3b2859f09ceb6dc871fc35e184f05e5e5425b290e41d6
SHA51220b51771064755a40082c7558f2903bef5bcd33bd5d9c40c47de10a59673b95f8532eac2047ad2a087a3b6243a2a982a32d552c0e0c455b84c82641c6089ab82
-
\Windows\System32\fr-FR\user32new.dll.muiFilesize
20KB
MD50d57d091e06bb1e58e72e5d08479fddf
SHA18e1885e1c030d9ff96c20150c34fa9bd7ddc4919
SHA25667eee41ba82aad3adf2b4c34d108cc88b108c9eebc02f901863e2c8438e38b40
SHA5123c38cc5b0e4525dab39ae08cfb57c08a8b28e6ae7bb0a8adc38fdee7ae5461966b0b3f026ddc6b198ce45ec661a940f887d9885e8c8dbc590823dc7ca47a8246
-
\Windows\System32\it-IT\user32new.dll.muiFilesize
19KB
MD58600c49b59928f85c1db3aab8d1571f6
SHA12a7ade977bf35fae4e51c0c8c25c3fce99d601b4
SHA256d58f104cb5ef742c6cf34edc2d5d7d90f2e24c39b43891f2a2c07cded4bb9c34
SHA512225e9991df48c2c31db4504e18a54696b7644b0f77032917bc2d0b8e198433fb2aaceff07b612dba24a72571ebcc09adaf6de0f270428da5e9862036f0ea4c9f
-
\Windows\System32\ja-JP\user32new.dll.muiFilesize
14KB
MD5a6beeda73b13dfdb10ae4bbab0209986
SHA10028487943dece80b9b32952cce430e2145f1efe
SHA2567d91394a5c63cd5c6a599700ee0c079b9561f2824973695c886c77982a6adea9
SHA512adcbb2b4b045317a6a0b69e77f263c259bb5aac6f4340f6bc44196720bf30ab238fefe6d9a9fc5918d47471a5d652298af20ec89758d70da5d01534aeebdb11a
-
memory/2192-128-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/2192-9-0x0000000003190000-0x0000000003394000-memory.dmpFilesize
2.0MB
-
memory/2192-27-0x0000000003190000-0x0000000003394000-memory.dmpFilesize
2.0MB
-
memory/2192-0-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/2192-1-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB