Analysis

  • max time kernel
    94s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    11-05-2021 09:40

General

  • Target

    e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80b.exe

  • Size

    224KB

  • MD5

    01847661bed25ae4cffb7bec7a004943

  • SHA1

    30620170803fb8c97a9253f658ab6fa9f146a876

  • SHA256

    e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80b

  • SHA512

    bcc32e70c3457175cb64cae36ae07cff545ba586f72cae1b99164b3c7fe89e87883754b212d545bf5bba58fe37c5e5be1fb5531378455db45a09bdbdc3d72ed3

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 8 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 18 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80b.exe
    "C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80b.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80bSrv.exe
      C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80bSrv.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80bSrvSrv.exe
        C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80bSrvSrv.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80bSrvSrvSrv.exe
          C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80bSrvSrvSrv.exe
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3832
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3832 CREDAT:82945 /prefetch:2
              6⤵
              • Suspicious use of SetWindowsHookEx
              PID:4292
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:60
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:60 CREDAT:82945 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3304
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:82945 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1364
    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
      "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Program Files (x86)\Microsoft\DesktopLayerSrvSrv.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayerSrvSrv.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3496
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3496 CREDAT:82945 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4356
          • C:\Program Files (x86)\Microsoft\DesktopLayerSrvSrvSrv.exe
            "C:\Program Files (x86)\Microsoft\DesktopLayerSrvSrvSrv.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:3160
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3248
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3248 CREDAT:82945 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:4264
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2204
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:82945 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4380
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4252
  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3784

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    MD5

    965916288fecc620d419ffb26d708315

    SHA1

    5e60bbd485109a8c4f30a9cb48f177bf4c690f53

    SHA256

    bb166d3013163a9ee2093d2b998f00432c46f7be8567935443231912724972e4

    SHA512

    861af2a01de4368e269f6ed9342a38b1a4b7b215c5d276931f9a174b45342bef6d1ef3fdbce5b139f5a15242ee67d4a6f9181ec43f46c885bf02127e1f76c543

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    MD5

    965916288fecc620d419ffb26d708315

    SHA1

    5e60bbd485109a8c4f30a9cb48f177bf4c690f53

    SHA256

    bb166d3013163a9ee2093d2b998f00432c46f7be8567935443231912724972e4

    SHA512

    861af2a01de4368e269f6ed9342a38b1a4b7b215c5d276931f9a174b45342bef6d1ef3fdbce5b139f5a15242ee67d4a6f9181ec43f46c885bf02127e1f76c543

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe
    MD5

    395a1a546b4424e3f11cd3ea26066ff9

    SHA1

    2f18bf153ed75cd9f33f356d1b9b02219c3a1279

    SHA256

    5dd67a6408d0421a214abba36a7642591cce652f8eac6f71f6d357c154025e6a

    SHA512

    2a5a398a56f895bffb245b830fd9b3003d887c2a71c6f1e022fd25bcec303cacd691dc744c0121f1d93f1f6e9887da386b3fab096ec0090a607d2d1aa72710a7

  • C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe
    MD5

    395a1a546b4424e3f11cd3ea26066ff9

    SHA1

    2f18bf153ed75cd9f33f356d1b9b02219c3a1279

    SHA256

    5dd67a6408d0421a214abba36a7642591cce652f8eac6f71f6d357c154025e6a

    SHA512

    2a5a398a56f895bffb245b830fd9b3003d887c2a71c6f1e022fd25bcec303cacd691dc744c0121f1d93f1f6e9887da386b3fab096ec0090a607d2d1aa72710a7

  • C:\Program Files (x86)\Microsoft\DesktopLayerSrvSrv.exe
    MD5

    f018e9eb66dc53d840ee98c5926f1e2e

    SHA1

    8e736010173688f982e5713fa8b70c978f17ba42

    SHA256

    8e9e93a7ae39aa3c6e17a11d567cf52e6190b726d76e6f60b57e9db99ee58bb6

    SHA512

    30b1fb67767eb5b15bd9d45091d9f184811d4934faeed47b672315d8c8d05b9dc031a6a02addb4b71de1c6b286cc62ef61db2f55dfe4df4bd3c584f256ca49a2

  • C:\Program Files (x86)\Microsoft\DesktopLayerSrvSrv.exe
    MD5

    f018e9eb66dc53d840ee98c5926f1e2e

    SHA1

    8e736010173688f982e5713fa8b70c978f17ba42

    SHA256

    8e9e93a7ae39aa3c6e17a11d567cf52e6190b726d76e6f60b57e9db99ee58bb6

    SHA512

    30b1fb67767eb5b15bd9d45091d9f184811d4934faeed47b672315d8c8d05b9dc031a6a02addb4b71de1c6b286cc62ef61db2f55dfe4df4bd3c584f256ca49a2

  • C:\Program Files (x86)\Microsoft\DesktopLayerSrvSrvSrv.exe
    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Program Files (x86)\Microsoft\DesktopLayerSrvSrvSrv.exe
    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    MD5

    f7dcb24540769805e5bb30d193944dce

    SHA1

    e26c583c562293356794937d9e2e6155d15449ee

    SHA256

    6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

    SHA512

    cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    MD5

    f7dcb24540769805e5bb30d193944dce

    SHA1

    e26c583c562293356794937d9e2e6155d15449ee

    SHA256

    6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

    SHA512

    cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    MD5

    f7dcb24540769805e5bb30d193944dce

    SHA1

    e26c583c562293356794937d9e2e6155d15449ee

    SHA256

    6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

    SHA512

    cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    MD5

    f7dcb24540769805e5bb30d193944dce

    SHA1

    e26c583c562293356794937d9e2e6155d15449ee

    SHA256

    6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

    SHA512

    cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    MD5

    f7dcb24540769805e5bb30d193944dce

    SHA1

    e26c583c562293356794937d9e2e6155d15449ee

    SHA256

    6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

    SHA512

    cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    MD5

    f7dcb24540769805e5bb30d193944dce

    SHA1

    e26c583c562293356794937d9e2e6155d15449ee

    SHA256

    6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

    SHA512

    cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    06165dea77d5d10217992bd74f065006

    SHA1

    964d97611d8050aaf7d8a3a5e641cd20df6afd92

    SHA256

    9b125647f3ede14fa37214fe956f3b906f8bf58510bdc1eecfdf2ca4c827fe8f

    SHA512

    e126e1fdd45d2b08c37724b568a1ee9eef95895f2c31f5626186032293eb7f2a62f907fea96f1f0fca4c7de3cd9bac45df28bb69d42b2cd7ea5468e1aefdfee2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    06165dea77d5d10217992bd74f065006

    SHA1

    964d97611d8050aaf7d8a3a5e641cd20df6afd92

    SHA256

    9b125647f3ede14fa37214fe956f3b906f8bf58510bdc1eecfdf2ca4c827fe8f

    SHA512

    e126e1fdd45d2b08c37724b568a1ee9eef95895f2c31f5626186032293eb7f2a62f907fea96f1f0fca4c7de3cd9bac45df28bb69d42b2cd7ea5468e1aefdfee2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    06165dea77d5d10217992bd74f065006

    SHA1

    964d97611d8050aaf7d8a3a5e641cd20df6afd92

    SHA256

    9b125647f3ede14fa37214fe956f3b906f8bf58510bdc1eecfdf2ca4c827fe8f

    SHA512

    e126e1fdd45d2b08c37724b568a1ee9eef95895f2c31f5626186032293eb7f2a62f907fea96f1f0fca4c7de3cd9bac45df28bb69d42b2cd7ea5468e1aefdfee2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    06165dea77d5d10217992bd74f065006

    SHA1

    964d97611d8050aaf7d8a3a5e641cd20df6afd92

    SHA256

    9b125647f3ede14fa37214fe956f3b906f8bf58510bdc1eecfdf2ca4c827fe8f

    SHA512

    e126e1fdd45d2b08c37724b568a1ee9eef95895f2c31f5626186032293eb7f2a62f907fea96f1f0fca4c7de3cd9bac45df28bb69d42b2cd7ea5468e1aefdfee2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    MD5

    2c9db2ca793b41b857c2457a033003cd

    SHA1

    e96e2e45ce8f771d08ce47d0c84439f6561e3fac

    SHA256

    c4eaaa5ff5f72480fa48a2256ab67bcbfe0ae01054c715ad303f4d88bcaba5d9

    SHA512

    58ba05344285a79c341e7bfe2995999b966cf4dd70d219be28f4ba92b13e480db5497878b3b6818e1c8b1f2da10eb2a18d0daafe6d72b05d3902fb9598c5131e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    MD5

    2c9db2ca793b41b857c2457a033003cd

    SHA1

    e96e2e45ce8f771d08ce47d0c84439f6561e3fac

    SHA256

    c4eaaa5ff5f72480fa48a2256ab67bcbfe0ae01054c715ad303f4d88bcaba5d9

    SHA512

    58ba05344285a79c341e7bfe2995999b966cf4dd70d219be28f4ba92b13e480db5497878b3b6818e1c8b1f2da10eb2a18d0daafe6d72b05d3902fb9598c5131e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    MD5

    df366e4ddc4b007b2af70d80720f2e20

    SHA1

    9cb6282c1f45618560f66a3070783d7aa903c17a

    SHA256

    ee95e58b32e367cf36663795e77b5e4e7f19994a87f1038a1ca5bb4ed0c18401

    SHA512

    a4acb86071db379415a81ee8fef13d1a39dc30772f1e343e978c3cd3666cff02a06570873a5b447219a8ce2dfc0b8dd6f9825cd3b4a96c578900c4fd580a2830

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    MD5

    df366e4ddc4b007b2af70d80720f2e20

    SHA1

    9cb6282c1f45618560f66a3070783d7aa903c17a

    SHA256

    ee95e58b32e367cf36663795e77b5e4e7f19994a87f1038a1ca5bb4ed0c18401

    SHA512

    a4acb86071db379415a81ee8fef13d1a39dc30772f1e343e978c3cd3666cff02a06570873a5b447219a8ce2dfc0b8dd6f9825cd3b4a96c578900c4fd580a2830

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    MD5

    f6a4a19b9d4916f38fc2234caceae1b4

    SHA1

    44db233f39ca93c1168be048e7a11dd65aa5a990

    SHA256

    88fefec5f40d7082e1a8f7611083accede907049f15866914439cb7fcc203073

    SHA512

    2d9d24665741daedb4f6081d0d45ca710c102220c026080133f527cf0326eaaf661168678a5942cbd88dd057fda42dedf48cae4b9c2cd9c5655d2522f3199c64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    MD5

    f6a4a19b9d4916f38fc2234caceae1b4

    SHA1

    44db233f39ca93c1168be048e7a11dd65aa5a990

    SHA256

    88fefec5f40d7082e1a8f7611083accede907049f15866914439cb7fcc203073

    SHA512

    2d9d24665741daedb4f6081d0d45ca710c102220c026080133f527cf0326eaaf661168678a5942cbd88dd057fda42dedf48cae4b9c2cd9c5655d2522f3199c64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    160d1345c62a9a361b38f5cb9e568f39

    SHA1

    eeb5cc24f5212750339621932a6d55900b5c8cad

    SHA256

    2833ed75ec60dedaab868d9be1a8b0fe1a44fc78a338184540b87e22b937e2d2

    SHA512

    4300a0e871188c72bbdf36fcf28e802ae8b4c8e4e46d1a4a8721098d389e51bac46ad3e4a87410319d713aefa1e10db24f004f148db937639e775cf0bdd969ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    160d1345c62a9a361b38f5cb9e568f39

    SHA1

    eeb5cc24f5212750339621932a6d55900b5c8cad

    SHA256

    2833ed75ec60dedaab868d9be1a8b0fe1a44fc78a338184540b87e22b937e2d2

    SHA512

    4300a0e871188c72bbdf36fcf28e802ae8b4c8e4e46d1a4a8721098d389e51bac46ad3e4a87410319d713aefa1e10db24f004f148db937639e775cf0bdd969ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    98d6e66b1129bf479ffdc1d8fd5a65e9

    SHA1

    bda004d43f44e81470273dcf690d81e1b1930996

    SHA256

    3af20ae60c762190c5efed9bff2dcb78727c909ce152787b58769d9b59a4316c

    SHA512

    356ce8b897c1ae88291b0303d3148397858caf8b2d95f065fb5283cbf7de9cb381e4619fe4aaf1f2db7c5e32a1b77318e44115d2b60d43edf846ed979b375522

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    98d6e66b1129bf479ffdc1d8fd5a65e9

    SHA1

    bda004d43f44e81470273dcf690d81e1b1930996

    SHA256

    3af20ae60c762190c5efed9bff2dcb78727c909ce152787b58769d9b59a4316c

    SHA512

    356ce8b897c1ae88291b0303d3148397858caf8b2d95f065fb5283cbf7de9cb381e4619fe4aaf1f2db7c5e32a1b77318e44115d2b60d43edf846ed979b375522

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    98d6e66b1129bf479ffdc1d8fd5a65e9

    SHA1

    bda004d43f44e81470273dcf690d81e1b1930996

    SHA256

    3af20ae60c762190c5efed9bff2dcb78727c909ce152787b58769d9b59a4316c

    SHA512

    356ce8b897c1ae88291b0303d3148397858caf8b2d95f065fb5283cbf7de9cb381e4619fe4aaf1f2db7c5e32a1b77318e44115d2b60d43edf846ed979b375522

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    98d6e66b1129bf479ffdc1d8fd5a65e9

    SHA1

    bda004d43f44e81470273dcf690d81e1b1930996

    SHA256

    3af20ae60c762190c5efed9bff2dcb78727c909ce152787b58769d9b59a4316c

    SHA512

    356ce8b897c1ae88291b0303d3148397858caf8b2d95f065fb5283cbf7de9cb381e4619fe4aaf1f2db7c5e32a1b77318e44115d2b60d43edf846ed979b375522

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    98d6e66b1129bf479ffdc1d8fd5a65e9

    SHA1

    bda004d43f44e81470273dcf690d81e1b1930996

    SHA256

    3af20ae60c762190c5efed9bff2dcb78727c909ce152787b58769d9b59a4316c

    SHA512

    356ce8b897c1ae88291b0303d3148397858caf8b2d95f065fb5283cbf7de9cb381e4619fe4aaf1f2db7c5e32a1b77318e44115d2b60d43edf846ed979b375522

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    98d6e66b1129bf479ffdc1d8fd5a65e9

    SHA1

    bda004d43f44e81470273dcf690d81e1b1930996

    SHA256

    3af20ae60c762190c5efed9bff2dcb78727c909ce152787b58769d9b59a4316c

    SHA512

    356ce8b897c1ae88291b0303d3148397858caf8b2d95f065fb5283cbf7de9cb381e4619fe4aaf1f2db7c5e32a1b77318e44115d2b60d43edf846ed979b375522

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    6f4c6306253d53e60aff8704cb35894b

    SHA1

    29495e1bd6f9578e9a146138b24825926d5088ec

    SHA256

    1a44c7563d8c4ce03ee5317a744ad0a2915890c3fd335aeaa52cda0f6291f486

    SHA512

    2affe02901ae0c1973d5c8c2ff1dcf4b9518f8519cf364d8d0e4bf501799369afce10f7f5760a9ef3a850df46a5c8bb129100e78ee8a18673e508746965ff2e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    487e75a07796dbff230b6b2c7efbfdb2

    SHA1

    a89afc3a0f2db248dadd5c0dc8f5f9c6fd486c84

    SHA256

    e944c2156d9292011cf86083d9b64463b9528ce453c5f3193630cad5ae0b4af8

    SHA512

    a7fee19269bf0c47d776370a760218043347b319b35ffabbe27850e4fa593577e0ce879a0414e9af32b61b7c1f46c13273e7519b6ecfe81bca91f6addafe6661

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    487e75a07796dbff230b6b2c7efbfdb2

    SHA1

    a89afc3a0f2db248dadd5c0dc8f5f9c6fd486c84

    SHA256

    e944c2156d9292011cf86083d9b64463b9528ce453c5f3193630cad5ae0b4af8

    SHA512

    a7fee19269bf0c47d776370a760218043347b319b35ffabbe27850e4fa593577e0ce879a0414e9af32b61b7c1f46c13273e7519b6ecfe81bca91f6addafe6661

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CC74812F-B24A-11EB-A11C-7E556571BED2}.dat
    MD5

    e737a0cf0842b667fd1cc0b106ffe3e1

    SHA1

    68af09437292fa9406da409479441650da8c19b8

    SHA256

    1565bf72ebf8bfeafdb01eb70653f99d9eac1c842acd3761fe21ea697768bf58

    SHA512

    10dd57365c02bf0c1c3a6e1a4727888fa7636d3a8e636098c1a87ea1407ee5fbae69ea054179cf1fe24aa8fc62b2f37435e1d8c423de07e990bff587b957c435

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CC882FAC-B24A-11EB-A11C-7E556571BED2}.dat
    MD5

    608a0467f57bc0e33c0a974dffcd921d

    SHA1

    b749b78583f353823c0c3cbd3bf8f123ebe3ed98

    SHA256

    8653d20c24477c97eaf4239188bfdd6a595a17f8e644da2318059968b64e8ed9

    SHA512

    7fb47992569ab1079e356cdd2ce014b9ca15419a672baf800a924175abd3ec5f778e5c3abf5d1da1702df0320f23674036eeef1e6ef4b93a88321ff523efd3e2

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CCB3ACA3-B24A-11EB-A11C-7E556571BED2}.dat
    MD5

    ef036240a9d045327b722883d3a7bfab

    SHA1

    9b1f25d8cf5ec8a2a0f43f4a8020f860dc24d45f

    SHA256

    97b746f021edb7dd15e2b1cf2752cc2563084d26f7f7fcafe690ea3d1cf74640

    SHA512

    667f9eda50dc063f2cc8eb684929fc2db811bfcc6ee2d2a3138146bd7bdf75d38569fdc344f97de46fbeae8dec3e2783f8e151c87c922f1e58de27214c56c77b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CCB3ACA3-B24A-11EB-A11C-7E556571BED2}.dat
    MD5

    8373d7cb0b63af00a93d77dfeec41857

    SHA1

    25a8b2369baa3358a58932f795974fb7c1b7136b

    SHA256

    61b4f820b9b6c4fc7c6c0484063401e719daf19044e093cec4b6879fc260b59b

    SHA512

    f8438040dd8998ed4a375bff0e8d5dbf2f871d6dc81a632d43eb543e455dcc23a78b23bf1b8faf10c9ab8d84d56a283b8e8075512196937da09532effee7a157

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CCBD4A45-B24A-11EB-A11C-7E556571BED2}.dat
    MD5

    5f7bce6ef968f00a61a96fd7d299ec42

    SHA1

    13051261cd5b74ea4597d29528d21f224c94ecb4

    SHA256

    335db283768c6c8a5781447251b1082d9bfc12a860d8dbc45f29bd11f859c75f

    SHA512

    6ca0f523795476a7ce7d77267757481d1153e07e0d5b4dfdbf1558386d5f55b21f653f597783737ac4598704e778961a7c4f2c6c09e7443ef1b7026793f67f8b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CCD95CCD-B24A-11EB-A11C-7E556571BED2}.dat
    MD5

    727cd8a3bb4772a7c87638b6385ef896

    SHA1

    4307e93aef1cf962740c70c39461a9f445a369a6

    SHA256

    cb9bbd34b0bcf94dbe138358e90eb7cb6a6478b6a2520dc25d6199ed24e35dc5

    SHA512

    e53a0e10dd13fd2da006fce8bb08060cead4e30a775d0daa2c64735a9c58a7960200bfed57ffd9e0db0f6baca10ab037763e99f3200f9ce694eb24553a4240e1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CCD95CCD-B24A-11EB-A11C-7E556571BED2}.dat
    MD5

    6b0fe07f6cc4e9dc593ef9828147d915

    SHA1

    b0d71d79e79b4ec20aae707fb8488e35f10c0e3c

    SHA256

    492f22f40d99f7f366e8f1cc8a317d5ba4a258aa0cf1d0b4f6c92ce648ceb167

    SHA512

    f70562c9d19f4de845d2c40df9cf6301d8e7582950f0d5f935f72205a30ee4c4cb6e597faa718d2aa6bec08477de036aac04c2a1017cecb82fdcbf2decf2b009

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\Y8S0GZY8.cookie
    MD5

    4cb48997c4e2de681cb0fece89c5e995

    SHA1

    e0e930505450e280c5175b2efb156e894451a869

    SHA256

    ef4c4581d83ca47ee7a7de43d82f5731b6480da7c91952213cb3a755916c9d34

    SHA512

    5edf2cf7cb01da0ff19fcd7c47d6a98c440eb65f5a3e387bfc868d91915a6b728bf86f944ee5148f48d260f3f4af684c82fd60e42db946ae52cf9f0a8642e3e4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\YQ1FCQRH.cookie
    MD5

    762043654c5bd8e411e21837743fc47b

    SHA1

    320c6aa01c0bd265ae09bbe0e115329821623fd1

    SHA256

    ed2b94240567e6c7535abbabbd75dec216e0ea11c51326a71281fa4a0f91c4db

    SHA512

    63896bc5bd7ff7eb2042558577f0f9e7db1dc7bb2fb8ceb16260f51ae7ac28c5b8beead812e60f3f95f393cc7abba7a554f434fed19eb8c6d4a46b1a4690b9ac

  • C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80bSrv.exe
    MD5

    395a1a546b4424e3f11cd3ea26066ff9

    SHA1

    2f18bf153ed75cd9f33f356d1b9b02219c3a1279

    SHA256

    5dd67a6408d0421a214abba36a7642591cce652f8eac6f71f6d357c154025e6a

    SHA512

    2a5a398a56f895bffb245b830fd9b3003d887c2a71c6f1e022fd25bcec303cacd691dc744c0121f1d93f1f6e9887da386b3fab096ec0090a607d2d1aa72710a7

  • C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80bSrv.exe
    MD5

    395a1a546b4424e3f11cd3ea26066ff9

    SHA1

    2f18bf153ed75cd9f33f356d1b9b02219c3a1279

    SHA256

    5dd67a6408d0421a214abba36a7642591cce652f8eac6f71f6d357c154025e6a

    SHA512

    2a5a398a56f895bffb245b830fd9b3003d887c2a71c6f1e022fd25bcec303cacd691dc744c0121f1d93f1f6e9887da386b3fab096ec0090a607d2d1aa72710a7

  • C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80bSrvSrv.exe
    MD5

    f018e9eb66dc53d840ee98c5926f1e2e

    SHA1

    8e736010173688f982e5713fa8b70c978f17ba42

    SHA256

    8e9e93a7ae39aa3c6e17a11d567cf52e6190b726d76e6f60b57e9db99ee58bb6

    SHA512

    30b1fb67767eb5b15bd9d45091d9f184811d4934faeed47b672315d8c8d05b9dc031a6a02addb4b71de1c6b286cc62ef61db2f55dfe4df4bd3c584f256ca49a2

  • C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80bSrvSrv.exe
    MD5

    f018e9eb66dc53d840ee98c5926f1e2e

    SHA1

    8e736010173688f982e5713fa8b70c978f17ba42

    SHA256

    8e9e93a7ae39aa3c6e17a11d567cf52e6190b726d76e6f60b57e9db99ee58bb6

    SHA512

    30b1fb67767eb5b15bd9d45091d9f184811d4934faeed47b672315d8c8d05b9dc031a6a02addb4b71de1c6b286cc62ef61db2f55dfe4df4bd3c584f256ca49a2

  • C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80bSrvSrvSrv.exe
    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\Local\Temp\e54df5f3b47a500a5d23d4585d8703db220a32da378a623db7a03bbfbca6d80bSrvSrvSrv.exe
    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/60-140-0x0000000000000000-mapping.dmp
  • memory/60-157-0x00007FF833950000-0x00007FF8339BB000-memory.dmp
    Filesize

    428KB

  • memory/1364-178-0x0000000000000000-mapping.dmp
  • memory/1508-119-0x00000000001F0000-0x00000000001F1000-memory.dmp
    Filesize

    4KB

  • memory/1508-114-0x0000000000000000-mapping.dmp
  • memory/1508-168-0x0000000000400000-0x000000000044B000-memory.dmp
    Filesize

    300KB

  • memory/1556-116-0x0000000000000000-mapping.dmp
  • memory/1556-133-0x0000000000440000-0x0000000000441000-memory.dmp
    Filesize

    4KB

  • memory/1556-171-0x0000000000400000-0x000000000043D000-memory.dmp
    Filesize

    244KB

  • memory/2084-117-0x0000000000000000-mapping.dmp
  • memory/2204-131-0x0000000000000000-mapping.dmp
  • memory/2204-146-0x00007FF833950000-0x00007FF8339BB000-memory.dmp
    Filesize

    428KB

  • memory/2428-169-0x00007FF833950000-0x00007FF8339BB000-memory.dmp
    Filesize

    428KB

  • memory/2428-166-0x0000000000000000-mapping.dmp
  • memory/2668-127-0x0000000000000000-mapping.dmp
  • memory/2668-144-0x00007FF833950000-0x00007FF8339BB000-memory.dmp
    Filesize

    428KB

  • memory/2708-122-0x0000000000000000-mapping.dmp
  • memory/2836-139-0x0000000000540000-0x0000000000541000-memory.dmp
    Filesize

    4KB

  • memory/2836-128-0x0000000000000000-mapping.dmp
  • memory/2848-130-0x0000000000000000-mapping.dmp
  • memory/3160-143-0x0000000000000000-mapping.dmp
  • memory/3248-150-0x0000000000000000-mapping.dmp
  • memory/3248-159-0x00007FF833950000-0x00007FF8339BB000-memory.dmp
    Filesize

    428KB

  • memory/3304-177-0x0000000000000000-mapping.dmp
  • memory/3496-153-0x0000000000000000-mapping.dmp
  • memory/3496-161-0x00007FF833950000-0x00007FF8339BB000-memory.dmp
    Filesize

    428KB

  • memory/3784-165-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/3784-154-0x0000000000000000-mapping.dmp
  • memory/3832-145-0x0000000000000000-mapping.dmp
  • memory/3832-156-0x00007FF833950000-0x00007FF8339BB000-memory.dmp
    Filesize

    428KB

  • memory/4060-123-0x00000000001E0000-0x00000000001EF000-memory.dmp
    Filesize

    60KB

  • memory/4060-158-0x0000000000400000-0x0000000000459000-memory.dmp
    Filesize

    356KB

  • memory/4252-181-0x0000000000000000-mapping.dmp
  • memory/4264-182-0x0000000000000000-mapping.dmp
  • memory/4292-183-0x0000000000000000-mapping.dmp
  • memory/4356-184-0x0000000000000000-mapping.dmp
  • memory/4380-185-0x0000000000000000-mapping.dmp