Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
28135851ea9320c87a56f1648de67778_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
28135851ea9320c87a56f1648de67778_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
28135851ea9320c87a56f1648de67778_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
28135851ea9320c87a56f1648de67778
-
SHA1
9effec89fc15e1cdd024cd7e394109533c7269aa
-
SHA256
d00b16326b8b5117e0c8756c1b3f646fc26a523ac01f3d4f9da665ad72b2d330
-
SHA512
466b96ca4c2a7e117bbd3030ff0994a031160ef37e13f48114e66ce3d2becc807491120e1f322bd3e03f56e8cae3e52f9818ab0019af54b88d04a2fabba6221c
-
SSDEEP
24576:TaVr/4p6qO4pDlPJsZtZQk5p8hulbEwfDpBzjRvdsxlTShiVNmLj:GV/4Qf4pxPctqG8IllnxvdsxZ4UgX
Malware Config
Signatures
-
Loads dropped DLL 10 IoCs
pid Process 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\soft200606\seemaos_setup_O7A4.exe 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe File created C:\Program Files (x86)\soft200606\tt_2006.exe 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe File created C:\Program Files (x86)\soft200606\MiniJJ_12318.exe 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe File created C:\Program Files (x86)\soft200606\wl06079.exe 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\thenewworld\newnew.ini 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe File created C:\Program Files (x86)\soft200606\pipi_dae_381.exe 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe File created C:\Program Files (x86)\soft200606\d_2006.exe 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe File created C:\Program Files (x86)\soft200606\a 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe File created C:\Program Files (x86)\soft200606\0620110605060622060620060606.txt 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000f38127a91f8800c7a7bfe4daf1c5164bea5647ad177e1dbcd86874085bae444f000000000e800000000200002000000016b343dbc4b177a4bea2a814f66ce02477ca054686bd1bbc3dc756ab185ac8b220000000f6c48aea410d9e548726b2e30f2ab2f9bb1103e76d8ba1dc50bde6629d9de02f40000000d1c7a3c37d1e31347cd76ef49b934c43fb16fe227f93e8c73937914053e20dd0b8432e60812ae47dd92cc186d3ca9996226240bc46467bff323b3d06da59122e IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A9C69F1-3B7B-11EF-A5E3-DA219DA76A91} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b075406088cfda01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A9A0891-3B7B-11EF-A5E3-DA219DA76A91} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426420589" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2800 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2592 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 28 PID 2008 wrote to memory of 2592 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 28 PID 2008 wrote to memory of 2592 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 28 PID 2008 wrote to memory of 2592 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 28 PID 2008 wrote to memory of 2592 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 28 PID 2008 wrote to memory of 2592 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 28 PID 2008 wrote to memory of 2592 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 28 PID 2008 wrote to memory of 2680 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 29 PID 2008 wrote to memory of 2680 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 29 PID 2008 wrote to memory of 2680 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 29 PID 2008 wrote to memory of 2680 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 29 PID 2008 wrote to memory of 2680 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 29 PID 2008 wrote to memory of 2680 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 29 PID 2008 wrote to memory of 2680 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 29 PID 2592 wrote to memory of 2696 2592 IEXPLORE.EXE 30 PID 2592 wrote to memory of 2696 2592 IEXPLORE.EXE 30 PID 2592 wrote to memory of 2696 2592 IEXPLORE.EXE 30 PID 2592 wrote to memory of 2696 2592 IEXPLORE.EXE 30 PID 2680 wrote to memory of 2800 2680 IEXPLORE.EXE 32 PID 2680 wrote to memory of 2800 2680 IEXPLORE.EXE 32 PID 2680 wrote to memory of 2800 2680 IEXPLORE.EXE 32 PID 2680 wrote to memory of 2800 2680 IEXPLORE.EXE 32 PID 2008 wrote to memory of 2716 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 31 PID 2008 wrote to memory of 2716 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 31 PID 2008 wrote to memory of 2716 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 31 PID 2008 wrote to memory of 2716 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 31 PID 2008 wrote to memory of 2716 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 31 PID 2008 wrote to memory of 2716 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 31 PID 2008 wrote to memory of 2716 2008 28135851ea9320c87a56f1648de67778_JaffaCakes118.exe 31 PID 2800 wrote to memory of 1652 2800 IEXPLORE.EXE 33 PID 2800 wrote to memory of 1652 2800 IEXPLORE.EXE 33 PID 2800 wrote to memory of 1652 2800 IEXPLORE.EXE 33 PID 2800 wrote to memory of 1652 2800 IEXPLORE.EXE 33 PID 2800 wrote to memory of 1652 2800 IEXPLORE.EXE 33 PID 2800 wrote to memory of 1652 2800 IEXPLORE.EXE 33 PID 2800 wrote to memory of 1652 2800 IEXPLORE.EXE 33 PID 2696 wrote to memory of 2712 2696 IEXPLORE.EXE 34 PID 2696 wrote to memory of 2712 2696 IEXPLORE.EXE 34 PID 2696 wrote to memory of 2712 2696 IEXPLORE.EXE 34 PID 2696 wrote to memory of 2712 2696 IEXPLORE.EXE 34 PID 2696 wrote to memory of 2712 2696 IEXPLORE.EXE 34 PID 2696 wrote to memory of 2712 2696 IEXPLORE.EXE 34 PID 2696 wrote to memory of 2712 2696 IEXPLORE.EXE 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\28135851ea9320c87a56f1648de67778_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\28135851ea9320c87a56f1648de67778_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://taourl.com/6jb4v2⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://taourl.com/6jb4v3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
-
-
C:\Windows\SysWOW64\Wscript.exe"C:\Windows\system32\Wscript" "C:\Program Files (x86)\soft200606\b_2006.vbs"2⤵PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293B
MD582eabb2e4e7aa3f17498049e0e624f1a
SHA1eb8bc0962535ccaaf40d3c4f9d7aac76462c8bf6
SHA256ce2377915589fa254faf0756012545f98188a7cc1457df47428e0c1c0d16eb07
SHA51297a8c44d9a1ce31efb032c1ef5682f491aaaeebfc6c443328a2c3101a3d21ef667ea90f8acef4b13d08833cac33a8c90e2f669b7c7f2a0b697d633ab9c453db4
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7A9A0891-3B7B-11EF-A5E3-DA219DA76A91}.dat
Filesize4KB
MD54801478a8624f1692f6db0314d9b5a1e
SHA19d35fa66956cb2a6a4bbe7c25294d6048ccbfc11
SHA25614382f85dc8db368cf5bdd7f0c17093d4a7f86eafdd47555e991dbd95c68f830
SHA512b52c60df6be9c4ffc920757e5d6288304b9725d07539e5c81b2ea4bac01d294bf47f0c39cd107493fdbd5698f9fd3511646e29e01c5d4501048cd1b1c567da43
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7A9C69F1-3B7B-11EF-A5E3-DA219DA76A91}.dat
Filesize5KB
MD55943eff1418263c15d41f75efce28255
SHA12930fb6344a87060abf1ea7bb6b11d673c64563a
SHA2565c8f3ae96287e1e00a579dec12ce47b8b76a2bcd4b16466ae6084bb9a6c0feca
SHA512642b9434adc2afefcca0a6b19f37700202b9c8571a8bca33fdaa55e0515d795641aff73f4d2c4c8657119f101adba0376c50c5e198740c675ddca448f376020d
-
Filesize
31KB
MD583cd62eab980e3d64c131799608c8371
SHA15b57a6842a154997e31fab573c5754b358f5dd1c
SHA256a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294
SHA51291cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9
-
Filesize
14KB
MD5254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7