Analysis
-
max time kernel
147s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2022, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe
Resource
win10v2004-20220812-en
General
-
Target
734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe
-
Size
139KB
-
MD5
6db05eaa57b8fe2cf1571c82961907a6
-
SHA1
34ba14425af541e3ec6919bc91eeed07678a7752
-
SHA256
734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea
-
SHA512
cb3c575f94a04b65c292984e0f0a2c8cd2542f9519d3ac52270f71a0671f981bd02cdc04db605241ceb7c96284f6b7bb325030d3a5861e44dcf0199a6f09d5bd
-
SSDEEP
3072:8nxwgxgfR/DVG7wBpEsNDj4AYK66VklRJ:A+xDVG0BpV3o6VkDJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3504 WaterMark.exe -
resource yara_rule behavioral2/memory/4680-134-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4680-135-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4680-138-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3504-145-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3504-143-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3504-146-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3504-149-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3504-150-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3504-151-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3504-152-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3504-153-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px3047.tmp 734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe 734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2032 3488 WerFault.exe 80 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4003304994" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30989967" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4231118825" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30989967" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30989967" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4003304994" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30989967" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4003304994" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30989967" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4231273655" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30989967" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372381242" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2607F453-4A83-11ED-B696-DEF0885D2AEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{26081B63-4A83-11ED-B696-DEF0885D2AEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4003304994" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe 3504 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3504 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4080 iexplore.exe 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 4080 iexplore.exe 4080 iexplore.exe 220 IEXPLORE.EXE 220 IEXPLORE.EXE 240 IEXPLORE.EXE 240 IEXPLORE.EXE 220 IEXPLORE.EXE 220 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4680 734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe 3504 WaterMark.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4680 wrote to memory of 3504 4680 734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe 79 PID 4680 wrote to memory of 3504 4680 734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe 79 PID 4680 wrote to memory of 3504 4680 734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe 79 PID 3504 wrote to memory of 3488 3504 WaterMark.exe 80 PID 3504 wrote to memory of 3488 3504 WaterMark.exe 80 PID 3504 wrote to memory of 3488 3504 WaterMark.exe 80 PID 3504 wrote to memory of 3488 3504 WaterMark.exe 80 PID 3504 wrote to memory of 3488 3504 WaterMark.exe 80 PID 3504 wrote to memory of 3488 3504 WaterMark.exe 80 PID 3504 wrote to memory of 3488 3504 WaterMark.exe 80 PID 3504 wrote to memory of 3488 3504 WaterMark.exe 80 PID 3504 wrote to memory of 3488 3504 WaterMark.exe 80 PID 3504 wrote to memory of 4080 3504 WaterMark.exe 84 PID 3504 wrote to memory of 4080 3504 WaterMark.exe 84 PID 3504 wrote to memory of 1936 3504 WaterMark.exe 85 PID 3504 wrote to memory of 1936 3504 WaterMark.exe 85 PID 4080 wrote to memory of 220 4080 iexplore.exe 86 PID 4080 wrote to memory of 220 4080 iexplore.exe 86 PID 4080 wrote to memory of 220 4080 iexplore.exe 86 PID 1936 wrote to memory of 240 1936 iexplore.exe 87 PID 1936 wrote to memory of 240 1936 iexplore.exe 87 PID 1936 wrote to memory of 240 1936 iexplore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe"C:\Users\Admin\AppData\Local\Temp\734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 2044⤵
- Program crash
PID:2032
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4080 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:220
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:240
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3488 -ip 34881⤵PID:4368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD56db05eaa57b8fe2cf1571c82961907a6
SHA134ba14425af541e3ec6919bc91eeed07678a7752
SHA256734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea
SHA512cb3c575f94a04b65c292984e0f0a2c8cd2542f9519d3ac52270f71a0671f981bd02cdc04db605241ceb7c96284f6b7bb325030d3a5861e44dcf0199a6f09d5bd
-
Filesize
139KB
MD56db05eaa57b8fe2cf1571c82961907a6
SHA134ba14425af541e3ec6919bc91eeed07678a7752
SHA256734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea
SHA512cb3c575f94a04b65c292984e0f0a2c8cd2542f9519d3ac52270f71a0671f981bd02cdc04db605241ceb7c96284f6b7bb325030d3a5861e44dcf0199a6f09d5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5957d711ef13aae49d723c4d2b1d4fa37
SHA1aa818a5cfb5ce97987c05c8f20866cbbafb4bf93
SHA25643184ac9a857febd19b97a04797528a7de0c15744ae3d540e23cc4b5f1d2641b
SHA512f5c8fb180bba40d0755c909349bb960be5b8242de651237b9c2368d74accbf845f3cad131ff9b80f71745353dd11b53ddda7fd5cb928a2f543be217b9e975030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5957d711ef13aae49d723c4d2b1d4fa37
SHA1aa818a5cfb5ce97987c05c8f20866cbbafb4bf93
SHA25643184ac9a857febd19b97a04797528a7de0c15744ae3d540e23cc4b5f1d2641b
SHA512f5c8fb180bba40d0755c909349bb960be5b8242de651237b9c2368d74accbf845f3cad131ff9b80f71745353dd11b53ddda7fd5cb928a2f543be217b9e975030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5f262551155e39439fa6103a6366a6ca0
SHA125685b0330973ee4a6f4906337858154f4ec59b4
SHA2569093606d9f99769d03112f1d284bde232a0c001cc4f1c5e04ea70ebb7a87d44d
SHA512ef01bf75938c412225e8e5ee379b25ab24d5dbb6a6cac2fc35ddc367995d4482b62b5c374a5808ce8c4542208f0512555f6c77fec51882aa4452df0defcfb75c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5f262551155e39439fa6103a6366a6ca0
SHA125685b0330973ee4a6f4906337858154f4ec59b4
SHA2569093606d9f99769d03112f1d284bde232a0c001cc4f1c5e04ea70ebb7a87d44d
SHA512ef01bf75938c412225e8e5ee379b25ab24d5dbb6a6cac2fc35ddc367995d4482b62b5c374a5808ce8c4542208f0512555f6c77fec51882aa4452df0defcfb75c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5f262551155e39439fa6103a6366a6ca0
SHA125685b0330973ee4a6f4906337858154f4ec59b4
SHA2569093606d9f99769d03112f1d284bde232a0c001cc4f1c5e04ea70ebb7a87d44d
SHA512ef01bf75938c412225e8e5ee379b25ab24d5dbb6a6cac2fc35ddc367995d4482b62b5c374a5808ce8c4542208f0512555f6c77fec51882aa4452df0defcfb75c
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2607F453-4A83-11ED-B696-DEF0885D2AEB}.dat
Filesize5KB
MD5591f45011ce9cf7799e23d50843ac122
SHA1be7b94300de17c9d0abc9d946f83b27e37599325
SHA25617a954203e1ba03199198e8575a7e1ad5bbdcd3d5d99fc12400eeb87ccd1d6f3
SHA512b049e3cba8bef611eba5e0cf70415f5930f71f415ff26376e8ce9e251f11eb4af99aeac7bb25375f97cea190227d786f7b808743912cbae81a90c4d5dcc47582
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{26081B63-4A83-11ED-B696-DEF0885D2AEB}.dat
Filesize5KB
MD5a08698e3ddbe57600b1e68adb7169791
SHA174b3268443698e1cf48a09f715596a985807e3dc
SHA2564422970d06679586859bf86d0db9fabfd0de1ae5ed9ec2d094a2bc2dd91ab3f5
SHA512004013e562d12b0f6a8fb890433ac4db262c00c38efa53296df5a96e6ea01a1dd1b3d645cbc5b7a77fed1ce657b39b63c13e997d6bbf2f66a079cac8618249d3