Overview
overview
7Static
static
Duplicate ...us.exe
windows7-x64
1Duplicate ...us.exe
windows10-2004-x64
6Duplicate ...xe.xml
windows7-x64
1Duplicate ...xe.xml
windows10-2004-x64
1Duplicate ...ry.dll
windows7-x64
1Duplicate ...ry.dll
windows10-2004-x64
1Duplicate ...es.dll
windows7-x64
1Duplicate ...es.dll
windows10-2004-x64
1Duplicate ...le.exe
windows7-x64
7Duplicate ...le.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
Duplicate File Finder Plus/App/DuplicateFileFinderPlus/Duplicate File Finder Plus.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Duplicate File Finder Plus/App/DuplicateFileFinderPlus/Duplicate File Finder Plus.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Duplicate File Finder Plus/App/DuplicateFileFinderPlus/Duplicate File Finder Plus.exe.xml
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Duplicate File Finder Plus/App/DuplicateFileFinderPlus/Duplicate File Finder Plus.exe.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
Duplicate File Finder Plus/App/DuplicateFileFinderPlus/Interop.IWshRuntimeLibrary.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Duplicate File Finder Plus/App/DuplicateFileFinderPlus/Interop.IWshRuntimeLibrary.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Duplicate File Finder Plus/App/DuplicateFileFinderPlus/TSS Foundation Libraries.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Duplicate File Finder Plus/App/DuplicateFileFinderPlus/TSS Foundation Libraries.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Duplicate File Finder Plus/DuplicateFileFinderPlusPortable.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
Duplicate File Finder Plus/DuplicateFileFinderPlusPortable.exe
Resource
win10v2004-20220812-en
General
-
Target
Duplicate File Finder Plus/App/DuplicateFileFinderPlus/Duplicate File Finder Plus.exe
-
Size
315KB
-
MD5
226b40e0e43d60e79795c24b6c609848
-
SHA1
0984091f7f2156963e2562589092dfe89da94c71
-
SHA256
064be21f3e44a433084ee83eb1e0029f835c5f78e96efcc630e72deeef5c5412
-
SHA512
16315dcc6d4d573e7d178ba1aba27e2657fff3fafca35ccc8c999cd3af8ee289ae772715dd7676734e1a21c53f2086a17bc005fb08d1805f8b5bf66b05f24ba1
-
SSDEEP
3072:F8cNAwyjD/cUV4ucdmlJ/c5/eq4Dtxel2/ccJVQ5xoBcTYULBnmSkDgFiW+vf+6K:cw6NXiO47XNgVPMwHDNLO7AZwehq2/
Malware Config
Signatures
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 50b687b7e9d7d801 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1033" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\Total = "25" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\ = "1078" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2125DD1-43DC-11ED-8FA0-42A98B637845} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\Total = "785" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1078" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\ = "785" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\Total = "853" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "500" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\Total = "500" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\ = "585" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809ceed0e9d7d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\ = "513" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371650129" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "853" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\ = "1033" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\Total = "513" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\Total = "585" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c00000000020000000000106600000001000020000000e35b49a193ba50386cc5989859c2f001200e50ec490b336f4cd5934622ce6de5000000000e8000000002000020000000d5e911520ca1a119ee82072ea33e4aa791e2c385364ba236455c2843171680c3200000001e27bfdfc5c3d1db44df70c9048ddd7885d9bfca6391b6179e41988ff8048722400000009299e07e849cfe2ecd86767c155d454fd6e6be2cbea8f0a9b9c230110ad2836e5dcceb3e6aebe3f484fd03c50dccee04461790fdc5619ddc3bd7726ba54b5de8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\duplicatefilefinder4pc.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E21284E1-43DC-11ED-8FA0-42A98B637845} = "0" iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 Duplicate File Finder Plus.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Duplicate File Finder Plus.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Duplicate File Finder Plus.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Duplicate File Finder Plus.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1284 iexplore.exe 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1284 iexplore.exe 1284 iexplore.exe 1812 iexplore.exe 1812 iexplore.exe 1796 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1816 wrote to memory of 1540 1816 Duplicate File Finder Plus.exe 27 PID 1816 wrote to memory of 1540 1816 Duplicate File Finder Plus.exe 27 PID 1816 wrote to memory of 1540 1816 Duplicate File Finder Plus.exe 27 PID 1816 wrote to memory of 576 1816 Duplicate File Finder Plus.exe 28 PID 1816 wrote to memory of 576 1816 Duplicate File Finder Plus.exe 28 PID 1816 wrote to memory of 576 1816 Duplicate File Finder Plus.exe 28 PID 1260 wrote to memory of 1284 1260 explorer.exe 32 PID 1260 wrote to memory of 1284 1260 explorer.exe 32 PID 1260 wrote to memory of 1284 1260 explorer.exe 32 PID 1608 wrote to memory of 1812 1608 explorer.exe 31 PID 1608 wrote to memory of 1812 1608 explorer.exe 31 PID 1608 wrote to memory of 1812 1608 explorer.exe 31 PID 1812 wrote to memory of 1796 1812 iexplore.exe 35 PID 1812 wrote to memory of 1796 1812 iexplore.exe 35 PID 1812 wrote to memory of 1796 1812 iexplore.exe 35 PID 1812 wrote to memory of 1796 1812 iexplore.exe 35 PID 1284 wrote to memory of 1688 1284 iexplore.exe 34 PID 1284 wrote to memory of 1688 1284 iexplore.exe 34 PID 1284 wrote to memory of 1688 1284 iexplore.exe 34 PID 1284 wrote to memory of 1688 1284 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Duplicate File Finder Plus\App\DuplicateFileFinderPlus\Duplicate File Finder Plus.exe"C:\Users\Admin\AppData\Local\Temp\Duplicate File Finder Plus\App\DuplicateFileFinderPlus\Duplicate File Finder Plus.exe"1⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\explorer.exeexplorer "https://DuplicateFileFinder4PC.com/duplicate-file-finder-plus.htm?selectedTab=updates"2⤵PID:1540
-
-
C:\Windows\explorer.exeexplorer "https://duplicatefilefinder4pc.com/f/duplicate-file-finder-plus.zip"2⤵PID:576
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://duplicatefilefinder4pc.com/duplicate-file-finder-plus.htm?selectedTab=updates2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://duplicatefilefinder4pc.com/f/duplicate-file-finder-plus.zip2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD58d0b18acdb128088cd477b70eb24769b
SHA189252f65ecc925e8aa910ee6cfed4e0468e42ae6
SHA2561604e28cfd2b93bb422911155840c3437838662434cb4a35f0309a04939f239b
SHA512c23eb94268245b5e45e9adf4d2791910a26fe3da4cd68774c45f834136f2707b35c4b741d7ca936fff8702e0deafed2ae2bcaa8dc1e33b3a40fc856c09534879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD58d0b18acdb128088cd477b70eb24769b
SHA189252f65ecc925e8aa910ee6cfed4e0468e42ae6
SHA2561604e28cfd2b93bb422911155840c3437838662434cb4a35f0309a04939f239b
SHA512c23eb94268245b5e45e9adf4d2791910a26fe3da4cd68774c45f834136f2707b35c4b741d7ca936fff8702e0deafed2ae2bcaa8dc1e33b3a40fc856c09534879
-
Filesize
60KB
MD5d15aaa7c9be910a9898260767e2490e1
SHA12090c53f8d9fc3fbdbafd3a1e4dc25520eb74388
SHA256f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e
SHA5127e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD587e8154db0188c31c1a8a796b3b5e4b8
SHA10f89f8f38690704b0fa98bad96bb2d1f9e30d593
SHA25629147c38bb71c571c3b269a2e2a8c8b2f9728f39a160bcea3464252c0290a172
SHA512355b924f0da07b1284858c2315439ddbc6ed27d84cab7c19aa7ec17edc793574a897875527a31a162e888fa3e40d22ef9447e2423a2289946e42c170dadad102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD5428f5f76d2345098272ab6509b093df5
SHA19e91544bdbef935ffec0d607c6a08e006bfa22e2
SHA256eec8286e85ed3528133e6ae88589adfa9004bde5c92bcfcc071a4845c386eb1d
SHA51254da2c0dd7fa6c1d9f099966a69606e359cbd20d01399b29e5c3224e19545c80909ed513022a7af12fe345d5b3ccd1b75a1fd2f51b9ee49f2cfe92f03387e5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD5adf8077a03ac343444e87b105bea74bb
SHA1e0e3d37152c0754106b36badea45688354d328f0
SHA25674df73e299307a632e743d1205d48f7c898139cf576e84ee9717fc1ae7ecb873
SHA51263482a0e7c25532256e25c9ec1274ff8a6217c61664cdb3d84c005e4a0c5d3c8594a3e51283065b608c3778917efde2842ee19b2714204bd00e89a926d3be46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD50846ef2c7a56ac311d44799adef90d9d
SHA1680dc645554a023699fbf502134010d41f876f44
SHA256940db7726d5342f00cbc9ac021ea143ac29fcd3a5d6490b8bb2404a74a9ba582
SHA51257ece99e5f4fd6e771d196f8615244510731f81e122d76097e9182cf898c09dba7ec66bed3f88b70f2b1784e7a1002bf824fd2e3b2e5bffe376e30be9d6c1238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb61054c357b77562f352ab641744d66
SHA1afd4483f85ce89edd99fef6f5835be39c915a440
SHA2569ebe9863db6e42880e56e0718caf4232b8c2462de75c06002d63c297a20365b2
SHA512dccef72f9351dcaa98d37cf492c8acd1abc0367a8ed35b0f362465fc0b8dcfd078ac69c085298ebecb69c79ada88488e74e6b794f63e0d8e96f5dc5496e747a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f416bc7606290ad1db8d714537ce762
SHA148346df385dfbd6cc11e1d34fbf980631cd66881
SHA256abba31375ac165a336909176b4a27411803012985b6f22b7c0d308c9ce9ba395
SHA512e6558aa9040fe58c4deb1a971e2f890d46d29a456a60bab4046c38fc25dac7caac14886bd27e5f38ca75ed1f714560d3161970cca53897a07937c422a0cd11e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53f4d54f05d686ea0f0908a8bb3658711
SHA1b421c77c6273da778dbf04699254bcc9d4bf8a6f
SHA2564454efc8121c295e7744656a407a65750733e76ae54c7a5dba0cd39df7454a01
SHA5126aa9afc90b063b97003385a8ed893671df4a82b781a725cedc4f4a130f835e6f4e5ae4ff011323969f61ea8116b0554ef97f24faf35859688cef8c49f078ac4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53f4d54f05d686ea0f0908a8bb3658711
SHA1b421c77c6273da778dbf04699254bcc9d4bf8a6f
SHA2564454efc8121c295e7744656a407a65750733e76ae54c7a5dba0cd39df7454a01
SHA5126aa9afc90b063b97003385a8ed893671df4a82b781a725cedc4f4a130f835e6f4e5ae4ff011323969f61ea8116b0554ef97f24faf35859688cef8c49f078ac4d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E2125DD1-43DC-11ED-8FA0-42A98B637845}.dat
Filesize4KB
MD529b4de063d30e63620f37a273f28414a
SHA1e12c274d4de1d2e627c8699932616ff0fe4ade89
SHA2564798595dc29b0ae87d161fb1c90d9412729d03a7c05146a807d758d9ede62902
SHA512da34afb91b16eee85912417e1ab78cfcafb3749e1bfd9c93e6d3c5879811627b3d3f7e6a5808fe307f7c7430541b36a493ef209969241b86a0104190f906c89d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E21284E1-43DC-11ED-8FA0-42A98B637845}.dat
Filesize5KB
MD50aefe5393ee957048fcd44a1a961a90a
SHA192246cad14ec7f0d1aa9b75e54852c25ecf9da41
SHA25669643c11c846bbe367b4f93ec3486b32e181b828c7717964143d07a71c0f66a0
SHA512ff90ef915fecb070b5a932f61f06721885d169029ac574ba4bc0cf5d84d91589d47499c531054f550fc5f3d403d7809923e14fd1f901a4ec183233aec660f2fe
-
Filesize
5KB
MD5ccfd88a97619b5b85adec4aad656437f
SHA1e590ccc4b2350cc3f775d53fad087c35247d4123
SHA256276fb8982290fba2dd59b4724db23534a62adf2cd5b149bf531ecc8ceb2ffc9a
SHA51209580eea61aff1c5ed8b0d45d70496fda38f79cae2a66634e25e9f62cbf36ae7072f31b1532fdc2286afaf5e503aa79ada3d02fa247044c6d53363c57b7fe1a1
-
Filesize
606B
MD5f17080a289941c14953acede27ce6f48
SHA1dd7a4ac3dfc0fe826ff2bb0e1fdc3ba900074bbb
SHA256eb2a9cefd85d0854cf7a44d2392920ea105ac8b419cfc1de27da790bc2363720
SHA512133042db7d4de3dc190753a9343a4f018804f8f4937a60dbc1b17eaa7120dde4b645e4e8d21324752acd438439d73057bf118006461f6c2238e562e9a2431556