Analysis
-
max time kernel
148s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 02:55
Static task
static1
Behavioral task
behavioral1
Sample
6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe
Resource
win10v2004-20220901-en
General
-
Target
6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe
-
Size
1.4MB
-
MD5
5d93d6b3c7fae90403a91666598d3d9f
-
SHA1
db22b53e6cb625c7cae1befa0655e83176dd9a76
-
SHA256
6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719
-
SHA512
e20334d38b266caa8cf39e06362513d12b73995f9d1f9adbee353b6b58956825e53d146c34dc5c7011881cdab47eba968622c4df7e5474c1963ee59a77c1dd84
-
SSDEEP
24576:JHPn34MhTCilQoR1Ke2xnk6c/gfsGfhyQemrNDgPUzCgnextHWUziJm4IFMesbT7:RP9RbGGc9eTYmEbTrL1OImTyTYhlB7B
Malware Config
Signatures
-
Processes:
6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exedescription ioc process File opened for modification \??\PhysicalDrive0 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exe6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\virtualhardwares.com\NumberOfSubdomains = "1" 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.virtualhardwares.com 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376891197" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\virtualhardwares.com 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\virtualhardwares.com\Total = "63" 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AA8ACDE1-7387-11ED-BB5A-5A9C998014C3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af000000000200000000001066000000010000200000000d746ade746f74fcf9515af6e5956053bdece49f263eb268781480f45ffe9092000000000e8000000002000020000000450774c846af89d7a475bf2daa90ffe9cd8369a28a630619f449bc9ef73fd21d9000000035440b2b76071a35a3fb2f5e45c9d2cfdd55c56237dd45eaa461001fbed2add2dc3534259402a1682ed6044d454a1dacf2c0e218c6ce9acad105f0060baad4ac914108bebe3e1550c58d6c2793d8c568c37d54264292460404605284d191d9eee91c8585e205f2d6f10ea2db4177447b328ca865842c8cf0d5fcf4c052c1567648c89c8e88f1b4960a37e18e8235e62f40000000d1788bc811111df7ce0d45c590393a1700214439e6628e498d9eb1c3d9e5ffdd925ce8a0e1f2708ea4d3b414df09ed1f517ad0d43ea3e80695a0994941a3eabf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\wwa.lanzoui.com\ = "63" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f048447a9407d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.virtualhardwares.com\ = "63" 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\wwa.lanzoui.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af000000000200000000001066000000010000200000001c5455107eb02e500e1cceefc76016134ad7c2067020826eff92a1754077681c000000000e80000000020000200000007831263de44edcf5ee174d3f046544bd95fc85d2583ed7678479934bd600bc1c20000000577c397dde259758d01fadc065d0f33397c49bc906f671b4dd3342216c7c7b6640000000a03e0bd738903bdea153e3b5f48625db5672b618b38f15d69932337631e5db4edb7973b2617805084ea10c76b3e920e7e4ef21632a394c8d8ee4c0529638ddd2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\lanzoui.com\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\lanzoui.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\lanzoui.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exedescription pid process Token: SeDebugPrivilege 1776 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 748 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exeiexplore.exeIEXPLORE.EXEpid process 1776 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe 1776 6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe 748 iexplore.exe 748 iexplore.exe 744 IEXPLORE.EXE 744 IEXPLORE.EXE 744 IEXPLORE.EXE 744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 748 wrote to memory of 744 748 iexplore.exe IEXPLORE.EXE PID 748 wrote to memory of 744 748 iexplore.exe IEXPLORE.EXE PID 748 wrote to memory of 744 748 iexplore.exe IEXPLORE.EXE PID 748 wrote to memory of 744 748 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe"C:\Users\Admin\AppData\Local\Temp\6c42423e18decb610668de1f708a55f80dc7e73b4fbf32c739b9c6d4d4d97719.exe"1⤵
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5741⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:748 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
1KB
MD50339b8dc921fec5a91b0a54ab2c51553
SHA1444e54c0bb3295912b71a9781ebc94ec8a8e1c6f
SHA256c932b5ca8cc6db0baea3ba0bc2c942dd7ebb4e5b876a4912ce43fc76bd8b4f71
SHA51245191cb3148e05b286383b7580101484232f7e7e73c1ddc610b53c8cdaa7f988f90908c7906ffc3a23f74fc104f3dbac3461eed67ee1143d767e765d2e10d6da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80BFilesize
1KB
MD50b79e1bd9f1d76b5c103ec4a616d79f4
SHA105fb002a96bfc2f0c17ddce7e39f413dfab6a072
SHA2563f21740ba2ec28d48d240dbdb73ce8bd069d05a09b32be0f2f82cf782e2201db
SHA51240cc59f003fa1deca9a69b5d6f80e33b6740d471c13a436e358f5dd94deb8f40da0b75f7db68532eee28d7eb28941ac5472a2e4756f3c0e8ca7c896623de0881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
1KB
MD5a97577190572ad816e8df77e38998767
SHA1cb64dc82fcad123ad60979c9037d098ebb2f9671
SHA2565f0b0e3afa8203e0f2c6260723ab56a89ff6b629b7718e9e5071f7d6f3c7e6eb
SHA512b27175604139942b7bd140ed89befd3c1833ba1b3f48c9860fb005b1e5c8cb8622594c5da91613443f840e868b44f94e5dc8ee39b95f50485c251a07188c834f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
508B
MD5dcf0d4513fa52579cc71529af5ebccf7
SHA134d2a68e681c31e0bd3052f7b96d7e9630bd8a6d
SHA256777804f300ae127d2c181916fc39ac856ec385145eb4e5d78d27a2770125fcb0
SHA5123420e1ae614a588c228eda87858c946def784039c4303d9c6a9cc633c61feed0ef13d30027a4a383d261263bb77b650ac76919a09d169d5889824e8f54f219a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80BFilesize
532B
MD5cb50890168cc0b87b98977716dfa6b64
SHA1ec44c68f040f1281ed543b388da435b7ab5c0d02
SHA256213636eba82a5c15d8ce39b7e0a38f37c48f2a35cb3b4f37e1054bf55e499477
SHA5125a01452bcf2449ce984b6a431cb65a1981af534ae97fdd10872020fc713e9d380c28adb72cf3e0d2731195f6a62e1be99d967cc212c564363227efda9709ad1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c7f0f0af25ce882bc6f147108c77e92c
SHA158a6dc551451e54b1d6decef496f51e234d55b24
SHA2560d840c87dd953ebec69ebca431a40029f6716b99c49f9996994e5bf8eb4951ca
SHA5129012c8e0740997f3dfe6272cb1c9d5942b7fe962eec418af98154131ac7ba0323837af5a245d237018afe38b05edc943674e055ef5ee594af3d1876df8c8d03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
506B
MD5b3be76553a33740b715bddb0fae6e9e2
SHA11c0b44ffca40ccc4b49507fc005039f2c10f193e
SHA256e296583bac29ecaa2abb66595842e6990350559af59b9e62c4829ca705574941
SHA51222487027011139d43000819e6edf5eb5348b108b08006735b21e3a921ee5dcaf9fd1ebd2608bae40ab0afb965cf5d62f466ce5b98f2584360d513064f126f0fc
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.datFilesize
1KB
MD58196eeccd2e9d3baa3d2b3fef1a3a611
SHA1cca3a9dcc5718eb1aeaa2a875dea88573d20469d
SHA256020f8fd982ffc19de4d4e42b741eebe28a2d2ab96376caa14e1b6fdf738ae475
SHA512821e1555fe80f5a19801fa224e198ea8890b1ce597e5afe4adfe78a4ad735ce0b071c62bd1b8f85310633286d65aed595cc2ef0ad98aa33f1e5b0362a8c1042c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4NES7UYJ.txtFilesize
539B
MD5905960dc1a83dbd901d68f18a9167414
SHA191cb306e068e74d178cc54525dcd0e5fad0b00d4
SHA256d0aac615ce93f6f2e751aa8af0e941b75c721d602e205f2bd4d3e4f540762014
SHA512849503085e9784020d35cbf2073a5c20cefbca687a522293ba14ebae6bb2983388c0aea6c126bfd15ac05a8dee9dad7a85de13167394460d4b0d6351968bfb3e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6OV27LEH.txtFilesize
94B
MD509970c90d4bf9727fbdc9743f1d3f58f
SHA1d33fe905bb985e35320857150bb88b9d5a8dca37
SHA2564e7ae339af1e1cd2fd0d7cd63ffe948fea5cb97abd9c1b24e47ad8ee88280501
SHA512bf8e7263f1fcf5d9895c475fbc954ccd7864ec603713d836dc5dfeda6e9ffff6e8b2827d1f9b9c19ebf68a7f1c9f971dcf35b67543fb155b6bc16eed0d6d5ef6
-
memory/1776-54-0x0000000074DA1000-0x0000000074DA3000-memory.dmpFilesize
8KB