Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 05:49
Static task
static1
Behavioral task
behavioral1
Sample
54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe
Resource
win10v2004-20220901-en
General
-
Target
54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe
-
Size
1.6MB
-
MD5
f84e4dd9cddd7925078a10cae8009c31
-
SHA1
97a94ed43ec689934fe7af84f9570194570fc781
-
SHA256
54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2
-
SHA512
3e0d7c91b144ef52ad988e53a80a1b4457d9b77e5350341f4706b2707abc5b416aa761d1c35fdd4c13c5b5bdc935670e2ee957fe62c296c3d6dab8876a2c513b
-
SSDEEP
24576:HNw52RX3IGgsPJnOK5BF6t1poyRBKx3htCYpJ4+I0z1N2V2:HDBhrFulixtC24+RU2
Malware Config
Signatures
-
Processes:
resource yara_rule \Windows\SysWOW64\yyberi.exe aspack_v212_v242 \Windows\SysWOW64\yyberi.exe aspack_v212_v242 C:\Windows\SysWOW64\yyberi.exe aspack_v212_v242 C:\Windows\SysWOW64\yyberi.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
yyberi.exepid process 1232 yyberi.exe -
Processes:
resource yara_rule \Windows\SysWOW64\yyberi.exe vmprotect \Windows\SysWOW64\yyberi.exe vmprotect C:\Windows\SysWOW64\yyberi.exe vmprotect behavioral1/memory/1232-62-0x0000000000400000-0x00000000005A7000-memory.dmp vmprotect behavioral1/memory/1232-63-0x0000000000400000-0x00000000005A7000-memory.dmp vmprotect behavioral1/memory/1232-65-0x0000000000400000-0x00000000005A7000-memory.dmp vmprotect C:\Windows\SysWOW64\yyberi.exe vmprotect behavioral1/memory/1232-81-0x0000000000400000-0x00000000005A7000-memory.dmp vmprotect -
Loads dropped DLL 2 IoCs
Processes:
54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exepid process 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
yyberi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yyberi.exe = "C:\\Windows\\SysWOW64\\yyberi.exe" yyberi.exe -
Drops file in System32 directory 2 IoCs
Processes:
54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exedescription ioc process File created C:\Windows\SysWOW64\yyberi.exe 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe File opened for modification C:\Windows\SysWOW64\yyberi.exe 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
IEXPLORE.EXEiexplore.exeyyberi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "36928" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "109" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "21962" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "25389" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "35726" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "36856" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "36943" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "263" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "26614" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "56" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "23092" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "33442" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "34659" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Play_Background_Sounds = "no" yyberi.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "4955" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "10566" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "19702" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "32312" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "34596" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "12850" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "136" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "189" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "387" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "324" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "12913" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "25547" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "32375" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main yyberi.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\yy.com yyberi.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "1478" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "37348" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "263" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "1478" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "9436" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "36865" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000d2d7134be12d8cfd0a9636b55eab557feb1a8e56f05c2c836c029de89d36650a000000000e800000000200002000000075bd3232f006aa6f9163fee094eebcdaa6e29490650475d3e7753d1a109cb0d090000000b6838f2a2ec64e39c99d10449539fdea8762d10b5d62e6105b287d51fe92a9f0cb0ec65d67bb697d59a2fbb5dda64d6924f19b57db03142d866c18848439382dd78c18e2937c5af12d7138c537c1b54fcfb4007ae9f674874cc1ab3f87bd7ade40e41c50a1caf94eabe078a55af7525747986a479c3b810eb62d1a5738ca9495b8145a34ad61d26a0aed762c2b22c7984000000037d2696d0dc2cd9103a49d70cb3f582354bc576c7a6a45ad4135fe911bccfdbf2757594b6da14508f75e2f67591883673a39f8dd32a50ab0640409688c9b3660 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "38" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "16264" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "28874" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "31158" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "33442" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67435A31-6DB9-11ED-B7CC-CE23F931F8E9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "109" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "152" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "219" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "11720" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "15134" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "30091" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "109" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "2671" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "17394" IEXPLORE.EXE -
Processes:
yyberi.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 yyberi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 yyberi.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 568 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exeyyberi.exeiexplore.exeIEXPLORE.EXEpid process 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe 1232 yyberi.exe 1232 yyberi.exe 1232 yyberi.exe 1232 yyberi.exe 568 iexplore.exe 568 iexplore.exe 968 IEXPLORE.EXE 968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exeiexplore.exedescription pid process target process PID 1652 wrote to memory of 1232 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe yyberi.exe PID 1652 wrote to memory of 1232 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe yyberi.exe PID 1652 wrote to memory of 1232 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe yyberi.exe PID 1652 wrote to memory of 1232 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe yyberi.exe PID 1652 wrote to memory of 568 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe iexplore.exe PID 1652 wrote to memory of 568 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe iexplore.exe PID 1652 wrote to memory of 568 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe iexplore.exe PID 1652 wrote to memory of 568 1652 54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe iexplore.exe PID 568 wrote to memory of 968 568 iexplore.exe IEXPLORE.EXE PID 568 wrote to memory of 968 568 iexplore.exe IEXPLORE.EXE PID 568 wrote to memory of 968 568 iexplore.exe IEXPLORE.EXE PID 568 wrote to memory of 968 568 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe"C:\Users\Admin\AppData\Local\Temp\54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\yyberi.exeC:\Windows\System32\/yyberi.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:1232 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.2345.com/?kduowanyy2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
1KB
MD584ad40b5a681063674d53ff51082dffe
SHA10cc0fb07c307a74ca042fb2aa2b84f3f60df023d
SHA256cb70ebb217c8756966fb6a2f60e1de8466dd3b7af45097eb0c1d49b98d927098
SHA512ff60bcbe233a01acbc64c5fdc8a1e13d45a27e356f5f4391fa65e44dfd0419585efd7991ec20d9968b512245f2e850d7e6cfbcd9c1ac4e2c44abbd61611fec88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80BFilesize
1KB
MD5731b8f0570b938ddfd449cde23f77558
SHA13edd9f9e4ec3a4a99afe08f071b29f91cfddf9f4
SHA2567d938895d153ec61371388c58a96eedfec9a06050020ce6a46e3da9f0dac0bbb
SHA512857b3c28249de00a5805b462cb4bbf8d6238c9a90ccde7c88462157295a295a22b07c920bb560ef2445fa657a56a077d019861f9f94574025c4c467c0b27731c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
1KB
MD5be7f433ade87cec7931780324c837792
SHA1aad8dd8211712f62c08328b7819832bc6c12a465
SHA2562e888b8d71793c9edc666474ee4e8da1d3f4150b5ee919027e857168740aebbb
SHA51282f2a27aa271179cebb83e25982ae41b5e0b6b74d3127065239e2e91ff21c0566be35cd421487e50d9963039bde0f814e132854c7093dd386cf585afd866192e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
508B
MD5b473c7879812813b08d3b1026c7f007a
SHA10a90495c19f2ae43ffe1ba188387cd9e26f901bc
SHA2562a202769b3ba026bc70e8bc40c8b5dbb3c78a1245cf7e993e24b2988e7a8a79c
SHA51251b94a71c2cdf1b51b272b09ecadfd817b8800688543677b94264a66dc0e97301e2d5ffc6703a78d79dfa3245271bf4ac2d643f95b44f9b2e4f7afbc6cb2111a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80BFilesize
532B
MD534512369c961cb7f8138c1ec4cc28d72
SHA1938f498a2a764d50753230b49948d3c25bfd2641
SHA2568753fcc62f9a1571c3ccc25edc40228ee5b18495c0851ebc749cd68f322acacf
SHA5128b5d7d3ac4b74552dc83a924b9c10997281cd196c21207b4e3bed53eb9a0cb9d4f5c957c4a34ffa80f86db8ed17294e567f8868200fc342e5b1608268731a7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5da44ae7302af55ad63dd08fb3a9e8bef
SHA14d67a3dfa48ca750d60b68ff1ef7fddb1bc15ee5
SHA256248d6e4fcddab93be8999bb741538baf7365aa2dde60122a537eb94afdd6fcd1
SHA51237483c71b7453b03e1745068aa9fd0fcb70f51787f22ea39dc9d821fd76308bdf0289725f5c3c59d18b82d634883d34e3ef5184724a1c3dca0181ab24d0dfa0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5eecf82ec92e1329290e0ded5283fa52c
SHA1f0f6eb0edcfd31afe1ee09bcfd95e6b976210730
SHA2561e5b7e056826b16e789d218c299fcf50e79a8f863578e870e94d5b80e0286cfc
SHA51249afccaced4686beede008e044aa140f0a73afb06640f89add24419b63bf154eececae4013ec19c03ffc40710420e87d3b340a7e5bc51ecf804cea22cf3dc037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
506B
MD5877a8d7b017944983b79cc5caad13b08
SHA176cf83dd25b7436e851945315b30ff960b566610
SHA256e15ca6dbbff4b9c42c9ca19d22e934a647d88aaed627563329004fa9ac063c12
SHA51240e2c34478d0ae1c82e27098e62018ceb87b0e37cd535027dc1eb46e28da1a2ab72b39871faa45608571b98acbd1fb7bbae331c1cb0820ee773f60469d192276
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.datFilesize
4KB
MD51be704ec14f7761cdf57de3605b12b30
SHA1f163e949e511090d5e42323006f5db3ffada977d
SHA2567276387aa429534e4cfc61f7966eaec02d14634f23ee15912075c2d3dbd89859
SHA512e8de7fd393232244aed41bee430ad327f12f9374553f6409e26432b6e0ab9d8f9e9fb4804d8d5ab3d422cb2d0ee759e6424577bc3a441b16f59f97c5901e7d31
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\08QETNV8.txtFilesize
108B
MD5001c6c74e965633cb51fc8e0b4600d25
SHA13c37a2a116ea822b11daf295551030e03c33cd12
SHA25624f4ab75beb7da9c0d3777da1549f33f92976be4ddd3bf79c94811249c42b823
SHA512ac05dd1432cc912b6c369fafb9889c65fb2c1cc506945a873eec93eea803d22f0dbb73f7c06b78f4d3976b06a7ea40c8de0c0361b29d5b7d9dfba36643fb0ccf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\L7JWKC4P.txtFilesize
608B
MD5a730b7d1925f357b2784af4fdce73221
SHA16c5ad04c9a60d523267d59172feedbc57f6dd671
SHA25664e681d9411556f3f45592751b72d3ff30248c0dc4af9a2f57fbc9887da68d78
SHA512c7a189890f7b71647e4915bb0f7fbe7416ad5ed44a58d2ebf808d999963f6cb5a02e814efb8adf7b7cf27bbdcabf6acaa21e4eb4aff04a9e66e868e8ff36beca
-
C:\Windows\SysWOW64\yyberi.exeFilesize
476KB
MD5262c5d4706f08de4ee40cfd533f0c3d6
SHA13150ca9f7b477d1403bf3a4af73ee712cc8797f1
SHA25681bdb4e664879104d8754aad80bfc7f189450da3ea000198960fbd0c2c98ae67
SHA5121b72667b8428437ba68d994ff5b5918fed58d143f486b64089675d1bdca5afdfe4871df519082e7b26ac480b3d488c4a98abcf8375dcb4cdd8a2c57fe99b3a51
-
C:\Windows\SysWOW64\yyberi.exeFilesize
476KB
MD5262c5d4706f08de4ee40cfd533f0c3d6
SHA13150ca9f7b477d1403bf3a4af73ee712cc8797f1
SHA25681bdb4e664879104d8754aad80bfc7f189450da3ea000198960fbd0c2c98ae67
SHA5121b72667b8428437ba68d994ff5b5918fed58d143f486b64089675d1bdca5afdfe4871df519082e7b26ac480b3d488c4a98abcf8375dcb4cdd8a2c57fe99b3a51
-
\Windows\SysWOW64\yyberi.exeFilesize
476KB
MD5262c5d4706f08de4ee40cfd533f0c3d6
SHA13150ca9f7b477d1403bf3a4af73ee712cc8797f1
SHA25681bdb4e664879104d8754aad80bfc7f189450da3ea000198960fbd0c2c98ae67
SHA5121b72667b8428437ba68d994ff5b5918fed58d143f486b64089675d1bdca5afdfe4871df519082e7b26ac480b3d488c4a98abcf8375dcb4cdd8a2c57fe99b3a51
-
\Windows\SysWOW64\yyberi.exeFilesize
476KB
MD5262c5d4706f08de4ee40cfd533f0c3d6
SHA13150ca9f7b477d1403bf3a4af73ee712cc8797f1
SHA25681bdb4e664879104d8754aad80bfc7f189450da3ea000198960fbd0c2c98ae67
SHA5121b72667b8428437ba68d994ff5b5918fed58d143f486b64089675d1bdca5afdfe4871df519082e7b26ac480b3d488c4a98abcf8375dcb4cdd8a2c57fe99b3a51
-
memory/1232-57-0x0000000000000000-mapping.dmp
-
memory/1232-65-0x0000000000400000-0x00000000005A7000-memory.dmpFilesize
1.7MB
-
memory/1232-62-0x0000000000400000-0x00000000005A7000-memory.dmpFilesize
1.7MB
-
memory/1232-63-0x0000000000400000-0x00000000005A7000-memory.dmpFilesize
1.7MB
-
memory/1232-81-0x0000000000400000-0x00000000005A7000-memory.dmpFilesize
1.7MB
-
memory/1652-59-0x00000000033B0000-0x0000000003557000-memory.dmpFilesize
1.7MB
-
memory/1652-54-0x00000000757A1000-0x00000000757A3000-memory.dmpFilesize
8KB
-
memory/1652-61-0x00000000033B0000-0x0000000003557000-memory.dmpFilesize
1.7MB