Analysis
-
max time kernel
144s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 13:42
Static task
static1
Behavioral task
behavioral1
Sample
9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe
Resource
win10v2004-20220812-en
General
-
Target
9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe
-
Size
36KB
-
MD5
859cc247e9f9f612eb010ebfe8bc1f7a
-
SHA1
35b86fe24963fe523fa50fe8a2bcfc374a7314a4
-
SHA256
9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608
-
SHA512
60b47be01827ffc6dafba4217d38e649d37fed9c94aafe983bb3853b0ae1c509094d116af19a4ae11d584d62ae4d65efba6f1aa95265954f90c04a52c61cd19d
-
SSDEEP
192:sLRgcTP2KV2iB4yWKbB5RMbr7dfJ/eJcD0ue/8:EHOK0iJWRfJnAvU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1880 cmd.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\hugedomains.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57C01641-7901-11ED-93F0-EAF6071D98F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57B1CE01-7901-11ED-93F0-EAF6071D98F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\hugedomains.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "25" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ad05af76b9bb29448ad85390a5b3f8400000000002000000000010660000000100002000000014b16d036b85bf03c782c405e6ee2b39a10b601cad908b534c9a47914b914af1000000000e8000000002000020000000bad56108b032c4dc8d5864b626f8be872835385fb66d4e76fdbc867405e236fc20000000131c8e506e2fe0d8b02aac018a7ed77dfa525848710f4bb6b1d579adb4f05fbf40000000021832c94b1068c42978513177b9dc8af5f09c209e812b48c8f1a186bdd11b7ecd5731d03476a2baa7b02e600afd0749e9ea4c1e0a2b28da5304cbf7b05744cb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377493195" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.wghai.com/" 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.wghai.com/" 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 320 iexplore.exe 1740 iexplore.exe 1412 iexplore.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 1412 iexplore.exe 1412 iexplore.exe 320 iexplore.exe 320 iexplore.exe 1740 iexplore.exe 1740 iexplore.exe 780 IEXPLORE.EXE 780 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1648 wrote to memory of 804 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 28 PID 1648 wrote to memory of 804 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 28 PID 1648 wrote to memory of 804 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 28 PID 1648 wrote to memory of 804 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 28 PID 1648 wrote to memory of 1724 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 30 PID 1648 wrote to memory of 1724 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 30 PID 1648 wrote to memory of 1724 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 30 PID 1648 wrote to memory of 1724 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 30 PID 1648 wrote to memory of 964 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 32 PID 1648 wrote to memory of 964 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 32 PID 1648 wrote to memory of 964 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 32 PID 1648 wrote to memory of 964 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 32 PID 1124 wrote to memory of 320 1124 explorer.exe 34 PID 1124 wrote to memory of 320 1124 explorer.exe 34 PID 1124 wrote to memory of 320 1124 explorer.exe 34 PID 1644 wrote to memory of 1412 1644 explorer.exe 35 PID 1644 wrote to memory of 1412 1644 explorer.exe 35 PID 1644 wrote to memory of 1412 1644 explorer.exe 35 PID 1648 wrote to memory of 1880 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 36 PID 1648 wrote to memory of 1880 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 36 PID 1648 wrote to memory of 1880 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 36 PID 1648 wrote to memory of 1880 1648 9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe 36 PID 1876 wrote to memory of 1740 1876 explorer.exe 38 PID 1876 wrote to memory of 1740 1876 explorer.exe 38 PID 1876 wrote to memory of 1740 1876 explorer.exe 38 PID 1412 wrote to memory of 1592 1412 iexplore.exe 42 PID 1412 wrote to memory of 1592 1412 iexplore.exe 42 PID 1412 wrote to memory of 1592 1412 iexplore.exe 42 PID 1412 wrote to memory of 1592 1412 iexplore.exe 42 PID 320 wrote to memory of 1564 320 iexplore.exe 40 PID 320 wrote to memory of 1564 320 iexplore.exe 40 PID 320 wrote to memory of 1564 320 iexplore.exe 40 PID 320 wrote to memory of 1564 320 iexplore.exe 40 PID 1740 wrote to memory of 780 1740 iexplore.exe 41 PID 1740 wrote to memory of 780 1740 iexplore.exe 41 PID 1740 wrote to memory of 780 1740 iexplore.exe 41 PID 1740 wrote to memory of 780 1740 iexplore.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe"C:\Users\Admin\AppData\Local\Temp\9a57d0f6df862743f97b0e26a53e07f2390e9e8983955887cd428bb75bd93608.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\explorer.exeexplorer http://www.wghai.com/2⤵PID:804
-
-
C:\Windows\SysWOW64\explorer.exeexplorer http://www.qsyou.com/2⤵PID:1724
-
-
C:\Windows\SysWOW64\explorer.exeexplorer http://www.super-ec.cn2⤵PID:964
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a.bat2⤵
- Deletes itself
PID:1880
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.wghai.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:320 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.qsyou.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.super-ec.cn/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:780
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f3d8cbd89a38198514090ac4018ad648
SHA134103f6ad8198b092404aec3596ce02bdfa69d6d
SHA256c3193e72bd4066eda0d62883c27abe03483f47cd86bf38f3f9b7b94ce6d8dab3
SHA512add2d31dfdb4936298f6fdb749c4b14090dc21b63c9eaa4dd9360daef45ce40adb6c51481611c3b0ab81aa7789ceb080a0f910e8000487bb70da0cb7813f58e0
-
Filesize
7KB
MD5128b756d3be59fd846a3a972b84b8fd1
SHA1c1250b6e8cf32a2be6f3aefff7134a9ebd9ad664
SHA2561885e5d1a69fc5b29df5095824f3b73c2fe27cac566797b0a5e502c1b6489432
SHA512800c8eb3c547eee8bf4a963e2f525daacd387c171014453f640715ad964697b6375e2e70cccfda4f30397fb585fdab55ec739a311fb1f036182222c44fddf237
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_1F9621DB6ADF94C2E3A651910DEE5D28
Filesize471B
MD5a15de23015872f999e7b4fe1ff3aa1d2
SHA110a51a76a6f0fb1c146077abb1f70b7e208a1751
SHA25626ddae77e27f7c29f921edc208816c5f5d2b10621d31bebd7c3fa3bd80e23a5a
SHA512832c9b382453ba9ddcca605eed0bc27a66e8f8ddb818dabcfd017e5ce0ae1efd2d5233872eb54338fa4b3ae91b8d39b82f4c91eb15bac6ab1028a83bd95e153c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_38B47E384211315C1B3F041145F166C6
Filesize472B
MD574d82b5960e5e12af402b01fa10b0829
SHA14b80baad99eaafa43a8a78dbcd8e0df4141b3dd7
SHA256328abed4a3d2ea1d745c64c5c40925ae5efca25846d2e1c8457a030347473b51
SHA5127a436abf591352fc0141400c8ce5ab2edbec5e7470991032a09c3910f8d75ccb7fc3313c8a64d798c832b78a30aec7726c7952368f51e5a9ddc659c708da309b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_09717EE90D5EA38724B708130A5F8203
Filesize472B
MD5784e0439ec6be7b4ca1312cd7cfae85b
SHA118dad06db451855d3009aa3207d868895c577666
SHA2566369a3e27c976088b4dda95da9422fdb201979fedfcb4edf9db60089fd9ea53b
SHA51223f6989a406fde8a46e3136d1a55e34a64085f9fb3c9f367da747562ab7ae0092885a51ef7973c9ef9aa6b29997c63be852646a23c76d9550e4e334aa8648b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_3BF35504191E4275C8C2312B8FD77C33
Filesize471B
MD52bbc2a332da069e062c141b6755efb07
SHA1e7cb19a32562264a6858b73f90caff1fe7887a29
SHA2565fad6e64460cced764a9d312bc67cf858e5b28e5b2e107dc790bc5973f1ecd1e
SHA5128fa8f87ee631afc4f2460b8ebfef60083f63de7d5b95ef9452a98efa450a43d4862414c8dad4c4d95cbad574c22b7976708515938ab4d2b721b7356bb4e8ff85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD513c6d39211bd90f495769815a27054e8
SHA10f3423ee41d586f66905a62f9182747644ad39ea
SHA256f8f1a1a61a04c19dc22c5e33b5a46379856f9f3327e5fa6b94e0b6b52b9a0613
SHA5120cc9d39ac10ac9019b9b43d80c431fba42c44958795e22e8d1e5f7359e86790f259a74ce8fe3e4bee0a4c8d33295e1671049dd7c0a16f9747c6542f9edb51d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
Filesize232B
MD5bb23bcce47d61f1d6b3caee6958c094b
SHA1b2bb93579e5b1d2a7728ed94dc75d2b0231820b3
SHA256e019f4a9890697bede35c1877bbc1493527d4a7c936de1982623ee5a57c23da7
SHA512443d02d80276f200d19e6f70319ac2898bebf8fd5777dc2e9bfce8bce7912aa337539a4b7731d602c4adfc9652ee5f03bc8e6d52e8d04712360050c8f011ac60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD579912032d7043944aa605f7e47602d3d
SHA1021654ab3c0cd419478fa3ad42762d5dff45783b
SHA256a2d8a07b4949baa896236ee92f462debcf08aefc2fb0a039a66fb893521c49ee
SHA5120d5231df8c3c0638ebbc1d1a82ea1be9808cc54649ae1ec543c4babfda0d3d2d26839b60cc5b2047145d7b085127c96a3e98bfe6b62310057db97588ea70a8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581655940dc856b46dd44dc3d54356c74
SHA197cb90189dad8b9265ef73976331d4df3b721318
SHA2564d786b50118c885112d0ac7bdc0877cf401c2e58f9d48c88e92287e1c7e13873
SHA512d2d7c191b1d867a09ca5cf8da2fea54f923bcd0bd7516c30bf513e6c28b67a811d0c6d96d95afa34c99e4edd55f060d685b58bf38c9815fa97ae42a349a44b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD58948246de8a4738bdc4ec6f4722a1544
SHA12965162c0452e43a373314cc6d10aa81a2cc8b1f
SHA25600e2fde561a979f76ba061c986b65d98b913db098fc336e646a6e8b39e95c27e
SHA5123b94abdccb22c72f469e8d4a38f14161b31f5f01c3f466ffa9592ae5225ff7416560cc60f82f39e6a3255684f2abb1de6331941708fb7fea65221304936a5d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_1F9621DB6ADF94C2E3A651910DEE5D28
Filesize406B
MD534602eb4dda0dc8ceb8b3aaec9480405
SHA1d5032daf4ae2352252ebd4edd89d43aa69493ab1
SHA25628cb89eae7baa29517a756ce18bc8e1e4703a638acbe8b32cebd479c52001f27
SHA5123607546d9cf9ec28c2c3aa0f957ac491564226623d8b42a7cb25285bce293562d6942cd37deabee4ca04a26ef758cc86ac3a4d75eb98003e1d8786950b01d750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_38B47E384211315C1B3F041145F166C6
Filesize402B
MD57cae20901ba86285b3278819e0b9cd20
SHA19b32983b688aa73dfc2d595f2ca91a2dd560d399
SHA2568997a9c4e8f9168ffc7018a723a76c8173389276a29fe36794fed3b5b882b4e4
SHA5121e4761bbefa677b9f6fb2f4c0ee38f3ce2853a81aeac5321ee4bfcf2d8bbadf5f9d7c53603b09f36943c6fb76d895b8e9c6a55d368c403a2dde02d8f3208cbce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_09717EE90D5EA38724B708130A5F8203
Filesize402B
MD5abd711ac6eb1d05e340616e812fe6436
SHA190b772f9fcffe69e19caa15e23779b018fb2bc98
SHA256595ee51d90e292ef88f437c7249e6d1fee71603f2ee9923570b2d2a92fae2c62
SHA512e4876d4887adcde13e62789e2b434aff87e2cf7617f5bbca2222957b551a9f53e1244ed5e6a1c0b7b538d58d03dd9986c0ea208c6a3117eeec6ec1bd69fe4a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_3BF35504191E4275C8C2312B8FD77C33
Filesize410B
MD59454977d9638d1c5b91f9e79b35764b6
SHA1c87d61beac85b7d2e3b53ee84d826966262dd197
SHA256f64700d38e03a3da2842876069cbc7c2658067809edbc11b6792045a1b0a65dc
SHA512fe6027e2047d4d777564aee8b9499bfd394399cf22bc788f659860a77bb112ecdc7ccb1bc1d6f1628d080d78fefbf6a4adfcdad2c107a27333d84259df91d4b5
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{57AF6CA1-7901-11ED-93F0-EAF6071D98F9}.dat
Filesize5KB
MD5f0337a5bc3754640e186df8d2f534cae
SHA17ad4b76224625ec979573c079c37d573dbbac025
SHA256fa8392f51866330cac5cf5973c63e4bef48d94e6466a34dbea6330301b9ee932
SHA512eb0dd318ca4a119966e85d511b9e208448994126f7c2e852bd692648b826234e6baf6bcaf41ee8a27b1f9f9e8ae1010db5c4a6e94c55ef76866eb403f4a33b6b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{57B1CE01-7901-11ED-93F0-EAF6071D98F9}.dat
Filesize3KB
MD544788d826efd0f2e27d1ea07f45042e6
SHA1f4750e1e4cd7a512707f759b6f18514a73398961
SHA256fdadac1873d708756797761ff596b60fe5cd916e9dd23925f115a9fd070f961a
SHA512b195f7b7721fdb750e8c1cb1427a210cd3a6e3f757a489c04ab4105674988298fb501c13b1ec656f1023143937d15d1a186e980e05d3994f111997f32533ea7e
-
Filesize
5KB
MD5aa8637cf07bd1b6a144ef0fe75712dff
SHA1c6dac4350ac87b0dddd3c3b69d3a5154b5952658
SHA25654ea7860e5fcd6eac6bc20b75e290fdbb0b0caebbdb814752912e57fe5875080
SHA512fa9f223b293bebac0b66b48e86fdd9da0d1822d73b1a7a2410dc87313ed8a238fb94bf702df01c63928538c3ea4e8350ca9dca6a1bb5a297fe07d9aaac1af675
-
Filesize
118B
MD579c2d477a8ce46d58e595f517aaa6304
SHA1d6f6f39d0231c16b1d0b1a9058e24c61c74dd990
SHA256284a48568ac0fe5858c338a6752f14b211d68442280ae33506d6a21defd28b77
SHA512678ea74fc7759ceb98f54524d6fe08f43c61bdcb9073f1c7b809b5bc7fab8869132a97b1b05840a9dbe426e0ae34eeb6c92743a7e34e34fd89b478246eb9f469
-
Filesize
608B
MD5af22a700673e12c893bf94010d93aac1
SHA12abd3b6012211de026f8d3d8491cc5309b1c019b
SHA256f9c2ad701a37e89bd2e2577349229bf7e8c78682806285085c17811dfa7c5679
SHA5122ceb264b97e0c42fb60803e2ff918cdbc076f54ea54c5a780945d9072ea819055ed3fc92558e75d97070f6b5ade7c7bf42967a5018a03838212b0f60c530ab96
-
Filesize
84B
MD5cad863dbe807d15fe4aa155545b0cea4
SHA1fda5c75fd6b8b7dc39af9a41b71d06f27fa57c1c
SHA2562d51fed9ddf16ee49e988f5dac1c49597070dfd82914a441f33dad6357a59d63
SHA51263a2c9ece69b7e2edef42ff86b7c467c23664bcd3dcd5184db0994919e73dfc04b7dd349254d6a075f346aa33da4abdbaf5d1ec8064b5246b49d27f344717454
-
Filesize
327B
MD5a95bfbedc74039d5804bcc7158634057
SHA123b4a14f168c71cb3018f92c88f39c280bdeee25
SHA2565116be8b1e0a53f678655b074fb3eb4b32bcfdf86598fcb93bda2fd71f7c0a26
SHA5120869d255a1d3f64e17cbac0a81b263c0d0c570b5bc5020ab44c15519e059dddc11b79737457d818afdbb93aeee2efdd41cf5497880bc761bd467360586e2b6c7