Overview
overview
10Static
static
3a2662fb73b...18.exe
windows7-x64
10a2662fb73b...18.exe
windows10-2004-x64
10$APPDATA/R...er.exe
windows7-x64
6$APPDATA/R...er.exe
windows10-2004-x64
6$TEMP/KeyActivate.exe
windows7-x64
8$TEMP/KeyActivate.exe
windows10-2004-x64
8$TEMP/launcher.exe
windows7-x64
10$TEMP/launcher.exe
windows10-2004-x64
10Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$APPDATA/RuntimeBroker.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$APPDATA/RuntimeBroker.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/KeyActivate.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$TEMP/KeyActivate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$TEMP/launcher.exe
Resource
win7-20240903-en
General
-
Target
a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
a2662fb73bd4f01311cb33f20b72baca
-
SHA1
df62e36435f56799154bfcc1962a3e0a36769eec
-
SHA256
054ce7a68c5ef3e99d04df90781e6e084517e9499f62afef7f423d4d331e155d
-
SHA512
de09c6023a185525e29c0f3f19d00aa6c38b386cf3262827d245cac0d92f70f79f87d1d9c5c053fd490766a67feefdc33a0a474453624d535677a69ae421c357
-
SSDEEP
24576:XL2oFugO/TMRpV5n08Xcvpr+NOwZi3uv+:X6oJ1Rtn0Ll+Jyu2
Malware Config
Extracted
redline
@fx0321
193.56.8.53:25656
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2408-115-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2408-112-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2408-110-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2408-119-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2408-117-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 5 IoCs
resource yara_rule behavioral1/memory/2408-115-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2408-112-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2408-110-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2408-119-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2408-117-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3060 powershell.exe 2900 powershell.exe 2656 powershell.exe 2904 powershell.exe 2672 powershell.exe 2280 powershell.exe 1892 powershell.exe 948 powershell.exe -
Executes dropped EXE 8 IoCs
pid Process 2404 KeyActivate.exe 1640 RuntimeBroker.exe 2376 launcher.exe 1964 svchost32.exe 2864 services32.exe 2216 svchost32.exe 1376 sihost32.exe 2408 launcher.exe -
Loads dropped DLL 8 IoCs
pid Process 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 1992 cmd.exe 1964 svchost32.exe 2284 cmd.exe 2216 svchost32.exe 2376 launcher.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\ApplicationName = "C:\\Users\\Admin\\AppData\\Roaming\\RuntimeBroker.exe" RuntimeBroker.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 raw.githubusercontent.com 11 raw.githubusercontent.com -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\services32.exe svchost32.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\system32\Microsoft\Telemetry\sihost32.exe svchost32.exe File created C:\Windows\system32\services32.exe svchost32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2376 set thread context of 2408 2376 launcher.exe 63 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language launcher.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 svchost32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 svchost32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 svchost32.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1708 schtasks.exe 1556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2900 powershell.exe 2656 powershell.exe 2904 powershell.exe 2672 powershell.exe 1964 svchost32.exe 2280 powershell.exe 1892 powershell.exe 948 powershell.exe 3060 powershell.exe 2216 svchost32.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2900 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeDebugPrivilege 2904 powershell.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 1964 svchost32.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 1892 powershell.exe Token: SeDebugPrivilege 948 powershell.exe Token: SeDebugPrivilege 3060 powershell.exe Token: SeDebugPrivilege 2216 svchost32.exe Token: SeDebugPrivilege 2408 launcher.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2404 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2404 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2404 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2404 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1640 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 31 PID 2148 wrote to memory of 1640 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 31 PID 2148 wrote to memory of 1640 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 31 PID 2148 wrote to memory of 1640 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2376 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 32 PID 2148 wrote to memory of 2376 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 32 PID 2148 wrote to memory of 2376 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 32 PID 2148 wrote to memory of 2376 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 32 PID 2148 wrote to memory of 2376 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 32 PID 2148 wrote to memory of 2376 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 32 PID 2148 wrote to memory of 2376 2148 a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe 32 PID 2404 wrote to memory of 1936 2404 KeyActivate.exe 33 PID 2404 wrote to memory of 1936 2404 KeyActivate.exe 33 PID 2404 wrote to memory of 1936 2404 KeyActivate.exe 33 PID 1936 wrote to memory of 2900 1936 cmd.exe 35 PID 1936 wrote to memory of 2900 1936 cmd.exe 35 PID 1936 wrote to memory of 2900 1936 cmd.exe 35 PID 1936 wrote to memory of 2656 1936 cmd.exe 36 PID 1936 wrote to memory of 2656 1936 cmd.exe 36 PID 1936 wrote to memory of 2656 1936 cmd.exe 36 PID 1936 wrote to memory of 2904 1936 cmd.exe 37 PID 1936 wrote to memory of 2904 1936 cmd.exe 37 PID 1936 wrote to memory of 2904 1936 cmd.exe 37 PID 1936 wrote to memory of 2672 1936 cmd.exe 38 PID 1936 wrote to memory of 2672 1936 cmd.exe 38 PID 1936 wrote to memory of 2672 1936 cmd.exe 38 PID 2404 wrote to memory of 1992 2404 KeyActivate.exe 40 PID 2404 wrote to memory of 1992 2404 KeyActivate.exe 40 PID 2404 wrote to memory of 1992 2404 KeyActivate.exe 40 PID 1992 wrote to memory of 1964 1992 cmd.exe 42 PID 1992 wrote to memory of 1964 1992 cmd.exe 42 PID 1992 wrote to memory of 1964 1992 cmd.exe 42 PID 1964 wrote to memory of 1372 1964 svchost32.exe 43 PID 1964 wrote to memory of 1372 1964 svchost32.exe 43 PID 1964 wrote to memory of 1372 1964 svchost32.exe 43 PID 1372 wrote to memory of 1556 1372 cmd.exe 45 PID 1372 wrote to memory of 1556 1372 cmd.exe 45 PID 1372 wrote to memory of 1556 1372 cmd.exe 45 PID 1964 wrote to memory of 2864 1964 svchost32.exe 46 PID 1964 wrote to memory of 2864 1964 svchost32.exe 46 PID 1964 wrote to memory of 2864 1964 svchost32.exe 46 PID 1964 wrote to memory of 2828 1964 svchost32.exe 47 PID 1964 wrote to memory of 2828 1964 svchost32.exe 47 PID 1964 wrote to memory of 2828 1964 svchost32.exe 47 PID 2864 wrote to memory of 2084 2864 services32.exe 49 PID 2864 wrote to memory of 2084 2864 services32.exe 49 PID 2864 wrote to memory of 2084 2864 services32.exe 49 PID 2084 wrote to memory of 2280 2084 cmd.exe 51 PID 2084 wrote to memory of 2280 2084 cmd.exe 51 PID 2084 wrote to memory of 2280 2084 cmd.exe 51 PID 2828 wrote to memory of 2996 2828 cmd.exe 52 PID 2828 wrote to memory of 2996 2828 cmd.exe 52 PID 2828 wrote to memory of 2996 2828 cmd.exe 52 PID 2084 wrote to memory of 1892 2084 cmd.exe 53 PID 2084 wrote to memory of 1892 2084 cmd.exe 53 PID 2084 wrote to memory of 1892 2084 cmd.exe 53 PID 2084 wrote to memory of 948 2084 cmd.exe 54 PID 2084 wrote to memory of 948 2084 cmd.exe 54 PID 2084 wrote to memory of 948 2084 cmd.exe 54 PID 2084 wrote to memory of 3060 2084 cmd.exe 55 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\KeyActivate.exeC:\Users\Admin\AppData\Local\Temp\KeyActivate.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\KeyActivate.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\KeyActivate.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit5⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'6⤵
- Scheduled Task/Job: Scheduled Task
PID:1556
-
-
-
C:\Windows\system32\services32.exe"C:\Windows\system32\services32.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit6⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'7⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'7⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'7⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'7⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"6⤵
- Loads dropped DLL
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit8⤵PID:2260
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'9⤵
- Scheduled Task/Job: Scheduled Task
PID:1708
-
-
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"8⤵
- Executes dropped EXE
PID:1376
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"8⤵PID:1912
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 39⤵PID:2820
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 36⤵PID:2996
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\RuntimeBroker.exeC:\Users\Admin\AppData\Roaming\RuntimeBroker.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\launcher.exeC:\Users\Admin\AppData\Local\Temp\launcher.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\launcher.exe"{path}"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3685040a2628980a2e80db393223a13
SHA1752888ae91ad83ed77f4b08fc255a9f8dc9fe5f1
SHA256ceb47134507fcb29c774992001106823ba6ceb2c43912aa16e2a486f1871ebe2
SHA512f53904ca8d674b87533c3243e040ba89d377c9af6c2ce6572ac667ff78db0169c7e373bb04797fd2879fed75b58263500eb49f1fdfc95d70512920ddcfe4f5ae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59dafda1f5078629ca4d3de04ff7c6b76
SHA1e7125ba6503137f145f6ac6120040be283e5e722
SHA2562e4989543b32bbc1bf14cc1b8ddede7c4a273e530336c72cce7ca14285ad2b80
SHA5120300fcdbbc2155022796b257269b76e69d391ff98ed16244dcad4a885df59d928b501eaa9392422b57ff017fd392553d71e140f4ce9d395b2724a6e905f40232
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5649417c55b42f37f872e111d8b142c9a
SHA10b908daaa936a7a9b4860b5607765825d40581f0
SHA2561b387fe121642d347f86c2ad4782e1e56a387f688c4a31a533d2147e8490133a
SHA51271a2b2d6df48755a72d08a55e2d6a9be64e1811c5d1ccc4de0d593abd65d56bbbccbecf7aa2480c87ae18f11dce6e84becb42f113824ad99f17f47dcef6f999f
-
Filesize
569KB
MD59bb06ab42d4883d1315641b62dd65e58
SHA1e58876178a5cfc69c62c6f72c06c6f34b3e4b821
SHA256d1347ceaeb056a0ba1ceb2a674864c2b6123c5ec516d1de0d6f1b17653638474
SHA5121ca41b28fa675c6b7f8efc9d5fa9e515324985e7715f0bca33c5e75ccf85845096cbc44688a0a7f6b1c73a807031ffe1814873b51559d56e9f608525250870c8
-
Filesize
416KB
MD53f4ced9fb30a8c31f129d5e717141171
SHA12e6cdc927bc9e17e8c3e3985e6dc783d2f359e55
SHA256507640330eb0d338c68d640ed4c4a4fe0a87a6293bf57afa74cfbaea20dd019c
SHA51201374beb7508b7ee962fdb4764cfce2a3b5902ebb92993f0359ede0363de905eea72c30ab1d80cc9e0f0771c8c95e5b3faa189703d948a2d87386eb9c0df0faf
-
Filesize
119KB
MD525ded84c49d528dd9e42b67957a50054
SHA1bd60e556f58a1003f61c4a8a5030827e83e9e5b7
SHA256d8c727520b198021c1ea7dd848900be0c21d308028f46982796c027a53e9a2de
SHA512643a3b90c06a5d1e9b01df9c616aebf393a249a50610a4489d4fb7135a4b813371f53caaaf41c85d03879193d55b9715acf1a6ceb250b9b0a5d9274e94bf70bc
-
Filesize
58KB
MD5411e7ed61ef7002096f3e3d2ce519734
SHA1fdf8d29b4b310974477539fc35c3b3d327963c6c
SHA256822c45c64e7c5e5781cc07933042ed274b13083ab32125efcd8d68cb33a899bc
SHA5127500c26d1a3e6c3e318c48799c4adb35dfb8940daef7950a451fe78c6433cec057d4fdf4cc024e6e172568253056b869dec058f9b2d3c21e0a8c25001887bfe2
-
Filesize
51KB
MD545a31abb24f3e89a782878eaf61b0fa1
SHA15fcad02840a08f7a74dfbb5b1b08d07b3b3c03da
SHA25695c4af41d733e31b1208cf70e34faf56856ccdf0f5f8a2a29ec37ba81b68402b
SHA51290a0d2c0b7b4e5aa1853d5dea654de93e34e196c57aff6b0102d1984c2427fc6e2dca936de3998b320e3dc438411ff7b1bece05374e0d48cec7dc632d326a15f