Analysis
-
max time kernel
78s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 14:39
Static task
static1
Behavioral task
behavioral1
Sample
51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe
Resource
win10v2004-20220414-en
General
-
Target
51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe
-
Size
3.3MB
-
MD5
095408d1abc0817739b86c3e7e4d0dfd
-
SHA1
161d670c99c1ede6f26f97f90532236a0f4a6415
-
SHA256
51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182
-
SHA512
c6ecb1dd97007e4a8ad3793a7ea040433bfd26b049540aa989542e9f4ff83417d1f60767441ff59f1236e6208e3eca4c739961c124329fda82da84b7f0d6afdd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
CLIPPER.exehardware.exepid process 1644 CLIPPER.exe 1716 hardware.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
hardware.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hardware.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate hardware.exe -
Loads dropped DLL 8 IoCs
Processes:
51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exepid process 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
icacls.exeicacls.exeicacls.exepid process 1732 icacls.exe 1980 icacls.exe 468 icacls.exe -
Processes:
hardware.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hardware.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
hardware.exedescription ioc process File opened for modification \??\PhysicalDrive0 hardware.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exe autoit_exe \Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exe autoit_exe \Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exe autoit_exe \Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exe autoit_exe C:\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exe autoit_exe C:\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exe autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
hardware.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier hardware.exe -
Processes:
IEXPLORE.EXEiexplore.exehardware.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main hardware.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\wwa.lanzoui.com\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004863fcdc101a3947b120786fa95ba35b00000000020000000000106600000001000020000000b8dea9da54ad702cb4ec91f74b0e38a72d39067a9864ba8979765ecb71ff2138000000000e800000000200002000000052b42289c43cd4a6e245077f5a03c57e4814409dfa6e12ce60f844de91c6f74d20000000988471530e664c12cd89ab56458c01001f5e34b731b51ff52507541ac5b357c840000000d1a1dd1e266e7f6765bceaf593c781e56e782187d5c2ef85e962077ed0ca23cab79d3c0fc92190271cd7a4a9f264734f343209798e79c4925d472d931f7bf3f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\lanzoui.com\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage hardware.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\wwa.lanzoui.com IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69F3B7C1-DB74-11EC-8FE9-F2D3CC06C800} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.virtualhardwares.com\ = "63" hardware.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total hardware.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch hardware.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\lanzoui.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e94130816fd801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\lanzoui.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.virtualhardwares.com hardware.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "360170333" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\virtualhardwares.com\Total = "63" hardware.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" hardware.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" hardware.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\virtualhardwares.com hardware.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DOMStorage\virtualhardwares.com\NumberOfSubdomains = "1" hardware.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
hardware.exepid process 1716 hardware.exe 1716 hardware.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
hardware.exedescription pid process Token: SeDebugPrivilege 1716 hardware.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1932 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
hardware.exeiexplore.exeIEXPLORE.EXEpid process 1716 hardware.exe 1716 hardware.exe 1932 iexplore.exe 1932 iexplore.exe 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exeCLIPPER.execmd.exeiexplore.exedescription pid process target process PID 536 wrote to memory of 1644 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe CLIPPER.exe PID 536 wrote to memory of 1644 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe CLIPPER.exe PID 536 wrote to memory of 1644 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe CLIPPER.exe PID 536 wrote to memory of 1644 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe CLIPPER.exe PID 536 wrote to memory of 1716 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe hardware.exe PID 536 wrote to memory of 1716 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe hardware.exe PID 536 wrote to memory of 1716 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe hardware.exe PID 536 wrote to memory of 1716 536 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe hardware.exe PID 1644 wrote to memory of 1696 1644 CLIPPER.exe cmd.exe PID 1644 wrote to memory of 1696 1644 CLIPPER.exe cmd.exe PID 1644 wrote to memory of 1696 1644 CLIPPER.exe cmd.exe PID 1644 wrote to memory of 1696 1644 CLIPPER.exe cmd.exe PID 1696 wrote to memory of 1732 1696 cmd.exe icacls.exe PID 1696 wrote to memory of 1732 1696 cmd.exe icacls.exe PID 1696 wrote to memory of 1732 1696 cmd.exe icacls.exe PID 1696 wrote to memory of 1732 1696 cmd.exe icacls.exe PID 1696 wrote to memory of 1980 1696 cmd.exe icacls.exe PID 1696 wrote to memory of 1980 1696 cmd.exe icacls.exe PID 1696 wrote to memory of 1980 1696 cmd.exe icacls.exe PID 1696 wrote to memory of 1980 1696 cmd.exe icacls.exe PID 1696 wrote to memory of 468 1696 cmd.exe icacls.exe PID 1696 wrote to memory of 468 1696 cmd.exe icacls.exe PID 1696 wrote to memory of 468 1696 cmd.exe icacls.exe PID 1696 wrote to memory of 468 1696 cmd.exe icacls.exe PID 1932 wrote to memory of 1788 1932 iexplore.exe IEXPLORE.EXE PID 1932 wrote to memory of 1788 1932 iexplore.exe IEXPLORE.EXE PID 1932 wrote to memory of 1788 1932 iexplore.exe IEXPLORE.EXE PID 1932 wrote to memory of 1788 1932 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe"C:\Users\Admin\AppData\Local\Temp\51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exe"C:\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "Admin:(R,REA,RA,RD)"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"4⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "Admin:(R,REA,RA,RD)"4⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Roaming\Z21754918\hardware.exe"C:\Users\Admin\AppData\Roaming\Z21754918\hardware.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\taskeng.exetaskeng.exe {E6915D9F-9E1E-4F33-9D29-7856677247E2} S-1-5-21-1819626980-2277161760-1023733287-1000:TBHNEBSE\Admin:Interactive:[1]1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A053CFB63FC8E6507871752236B5CCD5_CEC273363E767B922208DE98D79F0556Filesize
1KB
MD5353ea810c544d9b8d2c0abc88e93a655
SHA1eb960990003221fab9efcf67e46732d831f77d39
SHA25625a720f1fb0b266a93f9dc30c307066f9b8dca2bb334c4f0f5e208297eacb6e7
SHA5125a43748ea7e51a0719c9bee698f96b2f03660b11ac839a3b6f8f8c7cd2e69699a1df7382b64e37293c4d98fd42dd9f22e72b4d2254cc2eae2afeb5042e4e3649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96CFilesize
1KB
MD52a9342e928868b3aa3cb44335e149475
SHA14528e096dd8f508a3f47bc98c6fe500be94cab63
SHA25681a11d126e503c3c20af7f8456b464e0396685a9605bce321e68f2beafa05529
SHA5123766a4e288cbb1933ad0586603dae0a24918460d50e9ad7f92df41edb599c1489f9ba2a28b1406709277bb6a446989605a74a6d0b547e5d53686ed51767b87c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57e324aaf51c12f1c37930a2e777b64a5
SHA1ad0fe3a12ea83e363701c1b5fa93e8221ed4f016
SHA256f717891f0627e440d0dfc32f047ab7c8a3591b6095b2bbedd15f68d34bf6b0cd
SHA5123b6b18dcef0fe78c2a585f890acaf8ea1e1c2078cea398f7d77f043614d076e208b584f4fb86815c17a8bd6e552d0ae5028f6d001e3bc7dc8679022ea9a9318a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A053CFB63FC8E6507871752236B5CCD5_CEC273363E767B922208DE98D79F0556Filesize
540B
MD5b53765bc3858cb0b3217058af53bf96d
SHA1cd17af6e1fbba4f18735b7c6275b6ccd86053b39
SHA2562fc8915beedd906eb62c009512b1ffac0b2c7959236d0f1b7f65342db4c839dc
SHA5124c17d358e1c4f15d3ce815c785ab4c22aa8cedc8a0653d00dbbc5e33618fd32925b61204e3b24a48501c30f4ec34e944b905cabfcf72185d9416682356c2dc49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96CFilesize
492B
MD53700ac8141e18ffbef5750753d2030cc
SHA18c32b90871321fbd9f421dddcfe574961b17d486
SHA2561baeaa4f0d617595080e3f369fc9d9618fe90e1338b3c0a46b74cdf05a0adaed
SHA51260b50f85c4c3ecd2e5829fa96f0ee0c9135609e97fab7a1a6085a4de792e13ce57855331cd9496867440307feb5ed5b9ccd2359c933eceded01ba689bf2bae80
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ezmz917\imagestore.datFilesize
5KB
MD5d4fdc8b563572df0f7741eaa9d1b066c
SHA1758cc0627f9a17e832ecc22e40536aa7b7c32c2a
SHA256389456804517feffb9675f2fa2d89f7497758263c529857e947561e7a8d8de1d
SHA512da8be00d506568cad0d5aa8fa1ea5ebb0f7da824537175da937a48fc331155f414f6a7f3ddb615e79edf346e762de42ca2312a0bf1e6d2d53b332a52d2c732c8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0T0E51IR.txtFilesize
606B
MD5adbeba648fb1ccd99d5a59b1e0dc649b
SHA1abca80212629e7077b331a12e5481f8f2be98ec1
SHA256972b6d4e1c203ef16f9260be5d70e6b99f11433083b04c424d341beeffe41cd2
SHA512068422d0a9009f314c612631a8827d8195cdbd5c44ee18096d6f63c819f69933b9ed40d6136be0014e7341d6ee09c3dba98f264113ff3758bff16ba98a14ec30
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0V6085XD.txtFilesize
93B
MD5616b8b5c152b5c017759f9cb7cb37918
SHA146d331f410b43541d7d293f0ea60137b7b7cee35
SHA25674180da5e335090b46a41b282f4942f3edd1dc5f9379b951801261c26ea9b155
SHA512f4c1d8a4b8eda5244a367a4f02f3f58b60b64d505e57b884ef4c14d312ecf6f85be5a0894868cbc64d46b54aa9233533a02c442ee6b8e56429a62b18872ebc14
-
C:\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exeFilesize
978KB
MD5c19991ba8335387ae24c6cd7ef25e9d4
SHA16464ef5c79840112e56bd733b2fd6db599f46467
SHA256bca3c1292b0beafbd725258334d59de4c97f4f8aca77bed161da7f1733d1a6fb
SHA512f12d32dd3f2209f4a672b7efd8630f7a92f306a02031714bc3b73bb2ffadf070eb668d2b40b5eb884e67bdfdda256e13db390c7e994465989395fc182a80b2d3
-
C:\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exeFilesize
978KB
MD5c19991ba8335387ae24c6cd7ef25e9d4
SHA16464ef5c79840112e56bd733b2fd6db599f46467
SHA256bca3c1292b0beafbd725258334d59de4c97f4f8aca77bed161da7f1733d1a6fb
SHA512f12d32dd3f2209f4a672b7efd8630f7a92f306a02031714bc3b73bb2ffadf070eb668d2b40b5eb884e67bdfdda256e13db390c7e994465989395fc182a80b2d3
-
C:\Users\Admin\AppData\Roaming\Z21754918\hardware.exeFilesize
2.0MB
MD51c4a6c4af547084522341fd581796e7b
SHA1465609a615eb247b83d011317943f30ceeb46904
SHA256e1ae2039b5fa61865bdd9d46c12b9523ff96b52560d2232a12a36129b5621a1e
SHA512186e80059859f885feb983e6f99c2e4c57fd50d7314716a3b28db31886bc88a583113e2c1ec3a1ec99de8a1fdd085f51492ba35945d852b12bfe90671a349068
-
C:\Users\Admin\AppData\Roaming\Z21754918\hardware.exeFilesize
2.0MB
MD51c4a6c4af547084522341fd581796e7b
SHA1465609a615eb247b83d011317943f30ceeb46904
SHA256e1ae2039b5fa61865bdd9d46c12b9523ff96b52560d2232a12a36129b5621a1e
SHA512186e80059859f885feb983e6f99c2e4c57fd50d7314716a3b28db31886bc88a583113e2c1ec3a1ec99de8a1fdd085f51492ba35945d852b12bfe90671a349068
-
\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exeFilesize
978KB
MD5c19991ba8335387ae24c6cd7ef25e9d4
SHA16464ef5c79840112e56bd733b2fd6db599f46467
SHA256bca3c1292b0beafbd725258334d59de4c97f4f8aca77bed161da7f1733d1a6fb
SHA512f12d32dd3f2209f4a672b7efd8630f7a92f306a02031714bc3b73bb2ffadf070eb668d2b40b5eb884e67bdfdda256e13db390c7e994465989395fc182a80b2d3
-
\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exeFilesize
978KB
MD5c19991ba8335387ae24c6cd7ef25e9d4
SHA16464ef5c79840112e56bd733b2fd6db599f46467
SHA256bca3c1292b0beafbd725258334d59de4c97f4f8aca77bed161da7f1733d1a6fb
SHA512f12d32dd3f2209f4a672b7efd8630f7a92f306a02031714bc3b73bb2ffadf070eb668d2b40b5eb884e67bdfdda256e13db390c7e994465989395fc182a80b2d3
-
\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exeFilesize
978KB
MD5c19991ba8335387ae24c6cd7ef25e9d4
SHA16464ef5c79840112e56bd733b2fd6db599f46467
SHA256bca3c1292b0beafbd725258334d59de4c97f4f8aca77bed161da7f1733d1a6fb
SHA512f12d32dd3f2209f4a672b7efd8630f7a92f306a02031714bc3b73bb2ffadf070eb668d2b40b5eb884e67bdfdda256e13db390c7e994465989395fc182a80b2d3
-
\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exeFilesize
978KB
MD5c19991ba8335387ae24c6cd7ef25e9d4
SHA16464ef5c79840112e56bd733b2fd6db599f46467
SHA256bca3c1292b0beafbd725258334d59de4c97f4f8aca77bed161da7f1733d1a6fb
SHA512f12d32dd3f2209f4a672b7efd8630f7a92f306a02031714bc3b73bb2ffadf070eb668d2b40b5eb884e67bdfdda256e13db390c7e994465989395fc182a80b2d3
-
\Users\Admin\AppData\Roaming\Z21754918\hardware.exeFilesize
2.0MB
MD51c4a6c4af547084522341fd581796e7b
SHA1465609a615eb247b83d011317943f30ceeb46904
SHA256e1ae2039b5fa61865bdd9d46c12b9523ff96b52560d2232a12a36129b5621a1e
SHA512186e80059859f885feb983e6f99c2e4c57fd50d7314716a3b28db31886bc88a583113e2c1ec3a1ec99de8a1fdd085f51492ba35945d852b12bfe90671a349068
-
\Users\Admin\AppData\Roaming\Z21754918\hardware.exeFilesize
2.0MB
MD51c4a6c4af547084522341fd581796e7b
SHA1465609a615eb247b83d011317943f30ceeb46904
SHA256e1ae2039b5fa61865bdd9d46c12b9523ff96b52560d2232a12a36129b5621a1e
SHA512186e80059859f885feb983e6f99c2e4c57fd50d7314716a3b28db31886bc88a583113e2c1ec3a1ec99de8a1fdd085f51492ba35945d852b12bfe90671a349068
-
\Users\Admin\AppData\Roaming\Z21754918\hardware.exeFilesize
2.0MB
MD51c4a6c4af547084522341fd581796e7b
SHA1465609a615eb247b83d011317943f30ceeb46904
SHA256e1ae2039b5fa61865bdd9d46c12b9523ff96b52560d2232a12a36129b5621a1e
SHA512186e80059859f885feb983e6f99c2e4c57fd50d7314716a3b28db31886bc88a583113e2c1ec3a1ec99de8a1fdd085f51492ba35945d852b12bfe90671a349068
-
\Users\Admin\AppData\Roaming\Z21754918\hardware.exeFilesize
2.0MB
MD51c4a6c4af547084522341fd581796e7b
SHA1465609a615eb247b83d011317943f30ceeb46904
SHA256e1ae2039b5fa61865bdd9d46c12b9523ff96b52560d2232a12a36129b5621a1e
SHA512186e80059859f885feb983e6f99c2e4c57fd50d7314716a3b28db31886bc88a583113e2c1ec3a1ec99de8a1fdd085f51492ba35945d852b12bfe90671a349068
-
memory/468-73-0x0000000000000000-mapping.dmp
-
memory/536-54-0x0000000075B61000-0x0000000075B63000-memory.dmpFilesize
8KB
-
memory/1644-59-0x0000000000000000-mapping.dmp
-
memory/1696-70-0x0000000000000000-mapping.dmp
-
memory/1716-67-0x0000000000000000-mapping.dmp
-
memory/1732-71-0x0000000000000000-mapping.dmp
-
memory/1980-72-0x0000000000000000-mapping.dmp