Analysis
-
max time kernel
51s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-09-2022 12:29
Behavioral task
behavioral1
Sample
Suricata-6.0.6-1-64bit.msi
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Suricata-6.0.6-1-64bit.msi
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
Suricata-6.0.6-1-64bit.msi
Resource
win10v2004-20220812-en
General
-
Target
Suricata-6.0.6-1-64bit.msi
-
Size
22.6MB
-
MD5
8b9258c77ca6bebff5a0cbf116c02129
-
SHA1
750ecdf0c3d3b63ae0f5d3f753731345e59caedc
-
SHA256
ce545bb7539dd09990bc9cf9d8a78492124d6a132f9d86d0b5fa60c0ae4186b2
-
SHA512
cd1a0847d70497c4abe2a7d538d0b13461806250340158677c9f5de9258ef99ec625c5366a853a05d8809dcb7c1dd616c2cdcb249a25fb20bfcd995198f69219
-
SSDEEP
393216:Zv+Pjv1e3OWSr1hE0UElR69nfSbkC5ZUnD8+2QZpmRuqzQbtitLPEjTJ1YkfFnJt:ZAsOWn+6UhZM8+Bm4qzQpUbKT6
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
msiexec.exemsiexec.exeflow pid process 2 1988 msiexec.exe 4 1988 msiexec.exe 6 1988 msiexec.exe 8 1988 msiexec.exe 10 1472 msiexec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe -
Drops file in Program Files directory 43 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\Suricata\batch.bat msiexec.exe File created C:\Program Files\Suricata\rules\decoder-events.rules msiexec.exe File created C:\Program Files\Suricata\rules\dhcp-events.rules msiexec.exe File created C:\Program Files\Suricata\zlib1.dll msiexec.exe File created C:\Program Files\Suricata\rules\kerberos-events.rules msiexec.exe File created C:\Program Files\Suricata\libplc4.dll msiexec.exe File created C:\Program Files\Suricata\libssp-0.dll msiexec.exe File created C:\Program Files\Suricata\lua54.dll msiexec.exe File created C:\Program Files\Suricata\rules\mqtt-events.rules msiexec.exe File created C:\Program Files\Suricata\msvcrt.dll msiexec.exe File created C:\Program Files\Suricata\rules\dnp3-events.rules msiexec.exe File created C:\Program Files\Suricata\libmaxminddb-0.dll msiexec.exe File created C:\Program Files\Suricata\nssutil3.dll msiexec.exe File created C:\Program Files\Suricata\rules\smtp-events.rules msiexec.exe File created C:\Program Files\Suricata\rules\tls-events.rules msiexec.exe File created C:\Program Files\Suricata\rules\dns-events.rules msiexec.exe File created C:\Program Files\Suricata\rules\files.rules msiexec.exe File created C:\Program Files\Suricata\HOW_TO_Windows.pdf msiexec.exe File created C:\Program Files\Suricata\rules\http-events.rules msiexec.exe File created C:\Program Files\Suricata\liblzma-5.dll msiexec.exe File created C:\Program Files\Suricata\magic.mgc msiexec.exe File created C:\Program Files\Suricata\rules\ntp-events.rules msiexec.exe File created C:\Program Files\Suricata\rules\smb-events.rules msiexec.exe File created C:\Program Files\Suricata\classification.config msiexec.exe File created C:\Program Files\Suricata\libpcre-1.dll msiexec.exe File created C:\Program Files\Suricata\libplds4.dll msiexec.exe File created C:\Program Files\Suricata\libwinpthread-1.dll msiexec.exe File created C:\Program Files\Suricata\LICENSE msiexec.exe File created C:\Program Files\Suricata\rules\nfs-events.rules msiexec.exe File created C:\Program Files\Suricata\suricata.exe msiexec.exe File created C:\Program Files\Suricata\libjansson-4.dll msiexec.exe File created C:\Program Files\Suricata\rules\modbus-events.rules msiexec.exe File created C:\Program Files\Suricata\rules\stream-events.rules msiexec.exe File created C:\Program Files\Suricata\rules\app-layer-events.rules msiexec.exe File created C:\Program Files\Suricata\rules\http2-events.rules msiexec.exe File created C:\Program Files\Suricata\rules\ipsec-events.rules msiexec.exe File created C:\Program Files\Suricata\libnspr4.dll msiexec.exe File created C:\Program Files\Suricata\suricata.yaml msiexec.exe File created C:\Program Files\Suricata\libGeoIP-1.dll msiexec.exe File created C:\Program Files\Suricata\liblz4.dll msiexec.exe File created C:\Program Files\Suricata\libyaml-0-2.dll msiexec.exe File created C:\Program Files\Suricata\nss3.dll msiexec.exe File created C:\Program Files\Suricata\reference.config msiexec.exe -
Drops file in Windows directory 10 IoCs
Processes:
msiexec.exeDrvInst.exedescription ioc process File created C:\Windows\Installer\6c866f.msi msiexec.exe File opened for modification C:\Windows\Installer\6c866f.msi msiexec.exe File opened for modification C:\Windows\Installer\6c8670.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI8B23.tmp msiexec.exe File created C:\Windows\Installer\6c8672.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\6c8670.ipi msiexec.exe -
Modifies data under HKEY_USERS 43 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msiexec.exepid process 1472 msiexec.exe 1472 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exedescription pid process Token: SeShutdownPrivilege 1988 msiexec.exe Token: SeIncreaseQuotaPrivilege 1988 msiexec.exe Token: SeRestorePrivilege 1472 msiexec.exe Token: SeTakeOwnershipPrivilege 1472 msiexec.exe Token: SeSecurityPrivilege 1472 msiexec.exe Token: SeCreateTokenPrivilege 1988 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1988 msiexec.exe Token: SeLockMemoryPrivilege 1988 msiexec.exe Token: SeIncreaseQuotaPrivilege 1988 msiexec.exe Token: SeMachineAccountPrivilege 1988 msiexec.exe Token: SeTcbPrivilege 1988 msiexec.exe Token: SeSecurityPrivilege 1988 msiexec.exe Token: SeTakeOwnershipPrivilege 1988 msiexec.exe Token: SeLoadDriverPrivilege 1988 msiexec.exe Token: SeSystemProfilePrivilege 1988 msiexec.exe Token: SeSystemtimePrivilege 1988 msiexec.exe Token: SeProfSingleProcessPrivilege 1988 msiexec.exe Token: SeIncBasePriorityPrivilege 1988 msiexec.exe Token: SeCreatePagefilePrivilege 1988 msiexec.exe Token: SeCreatePermanentPrivilege 1988 msiexec.exe Token: SeBackupPrivilege 1988 msiexec.exe Token: SeRestorePrivilege 1988 msiexec.exe Token: SeShutdownPrivilege 1988 msiexec.exe Token: SeDebugPrivilege 1988 msiexec.exe Token: SeAuditPrivilege 1988 msiexec.exe Token: SeSystemEnvironmentPrivilege 1988 msiexec.exe Token: SeChangeNotifyPrivilege 1988 msiexec.exe Token: SeRemoteShutdownPrivilege 1988 msiexec.exe Token: SeUndockPrivilege 1988 msiexec.exe Token: SeSyncAgentPrivilege 1988 msiexec.exe Token: SeEnableDelegationPrivilege 1988 msiexec.exe Token: SeManageVolumePrivilege 1988 msiexec.exe Token: SeImpersonatePrivilege 1988 msiexec.exe Token: SeCreateGlobalPrivilege 1988 msiexec.exe Token: SeBackupPrivilege 692 vssvc.exe Token: SeRestorePrivilege 692 vssvc.exe Token: SeAuditPrivilege 692 vssvc.exe Token: SeBackupPrivilege 1472 msiexec.exe Token: SeRestorePrivilege 1472 msiexec.exe Token: SeRestorePrivilege 708 DrvInst.exe Token: SeRestorePrivilege 708 DrvInst.exe Token: SeRestorePrivilege 708 DrvInst.exe Token: SeRestorePrivilege 708 DrvInst.exe Token: SeRestorePrivilege 708 DrvInst.exe Token: SeRestorePrivilege 708 DrvInst.exe Token: SeRestorePrivilege 708 DrvInst.exe Token: SeLoadDriverPrivilege 708 DrvInst.exe Token: SeLoadDriverPrivilege 708 DrvInst.exe Token: SeLoadDriverPrivilege 708 DrvInst.exe Token: SeRestorePrivilege 1472 msiexec.exe Token: SeTakeOwnershipPrivilege 1472 msiexec.exe Token: SeRestorePrivilege 1472 msiexec.exe Token: SeTakeOwnershipPrivilege 1472 msiexec.exe Token: SeRestorePrivilege 1472 msiexec.exe Token: SeTakeOwnershipPrivilege 1472 msiexec.exe Token: SeRestorePrivilege 1472 msiexec.exe Token: SeTakeOwnershipPrivilege 1472 msiexec.exe Token: SeRestorePrivilege 1472 msiexec.exe Token: SeTakeOwnershipPrivilege 1472 msiexec.exe Token: SeRestorePrivilege 1472 msiexec.exe Token: SeTakeOwnershipPrivilege 1472 msiexec.exe Token: SeRestorePrivilege 1472 msiexec.exe Token: SeTakeOwnershipPrivilege 1472 msiexec.exe Token: SeRestorePrivilege 1472 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 1988 msiexec.exe 1988 msiexec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Suricata-6.0.6-1-64bit.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000570" "00000000000005D4"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_E6095CD2AECC9011BCD0D7B421356B17Filesize
2KB
MD59b6aa6b016605338fb3cd2008b29ba2f
SHA1d25f576eb5ff15f96689fc7895cef0381ba2a765
SHA2568be33bfe5ed298c9b38c4c38d3995465d303b8c987d6744b4c41857872471d72
SHA512bb2a63d9332033b31940368876d30096786b5c487716693e89ed188f9c0676eb23b3440b4f7bca4c35cb51774e21df7bd2c4e8b136e2ea8bb5d3b145c78e595b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
60KB
MD5d15aaa7c9be910a9898260767e2490e1
SHA12090c53f8d9fc3fbdbafd3a1e4dc25520eb74388
SHA256f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e
SHA5127e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD5edcd4c783b2b2c906602519bd8f697f4
SHA1fc56fded4065d6960c6507cac4264dfd2b038004
SHA256367e0ac4e24f1d1530de05a6abf81d6b572c0546b5aa134c246fa1514582fd90
SHA512cb23a82c06211121e39ed0dbec5928b1a85aca7c25f2c060d609350e3a94bf82e9159a2a4d5e67295fc29bac22c95d525ea2461a0000d24c6c4cb630520f68d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D7833C286363AD25C70511661A83D581_5A754446CB863DF3C298CB4E94FD802EFilesize
510B
MD5b19ef5487c354b415d4ebaf3d57908fb
SHA1997e76d19fb386dac3d16aeab96cabdb9a07952f
SHA256dfb737aafdf4d1fd4484cf6c83cf72a242d15650e792258de22c16df5dc453fa
SHA5127fb06d23e0063c2c658ddb0cd5c50518b93e814c50839da5f4adb4e26b628be677402ebcd9e25576df2a927f233dbb1a244398f4683421d2fa3044dae85aa9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_E6095CD2AECC9011BCD0D7B421356B17Filesize
488B
MD5c5fed5fbcc0afbd9d71aab0cb278cea0
SHA14caa951f9778abe0dc70bfad0ae3db7e2065cd4a
SHA2562309bb2a15e795ff915e274771efbcd56112a5c8c83a5f61cb71f9ea96b23631
SHA512ff4c8e2643133dddfd9b340e19ff0e0b5a830bf40e2c368ff8759e15c011096874c5f0f4bd80f77c3e5b62f2179f30300c65f1b27221a9fd12aca2951e393aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53fb1f802b9ce6c67996c4a84cf7d0d51
SHA18382d82fa1a886c20302121a1755fb2e2f5fc2d5
SHA256144095341af83ce5f53473aa9f77a8d0ddbd2c0375e26cd5642980bb03399ddc
SHA51222ae20b7632526463233f47c4ea8162716c8346672bd83078aed3f0cfba4a8c47c34c2d7b5fbf38877ab561ab89623e8031824694b3393ef76b8da4e71d70d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD5fdc24d9206064357dc5368f60a441a40
SHA139f2a86f921ad4410b5dd31f988b86c471874bbd
SHA2567b2f02ebcc7f0c6c943bf4408afa42f76f9b84a66ea2ad3e20791ecb06517bdb
SHA51285134af85a6d6505fa0a689031bd31188987688ac5bfa3214e6daccd16c92ee2914bb174f0e68699cf15e2eee04624adbfe7f57e8705c6bb9eb6a5970b77f301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D7833C286363AD25C70511661A83D581_5A754446CB863DF3C298CB4E94FD802EFilesize
484B
MD5817efbf919b6abb01f483f7a1e28cbaa
SHA1f536b447a48eb4843aa123ae940425d6b37ceec3
SHA25685fe97e9f486d2b2f204bbd0c56de69d5d7f029b8e3d5f29322af8926a4a803f
SHA51207bf67fb4e9f5b716c5bc0536e105e22ece686a8557a523d041da55be73e39e1a7d6dfa81e1c6f6c8002ca4de7065ea4717f9c2ed917a0caf61a744d645fb2f2
-
memory/1988-54-0x000007FEFBF41000-0x000007FEFBF43000-memory.dmpFilesize
8KB