Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 15:33
Static task
static1
Behavioral task
behavioral1
Sample
321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe
Resource
win7-20231129-en
General
-
Target
321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe
-
Size
4.5MB
-
MD5
edc9881fb8cb97d661a7eacd1e354772
-
SHA1
69c52fac385b6a5022c91ff6f1b43ffa05fc1dbe
-
SHA256
321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18
-
SHA512
73040495547beae4b62078d71642a53b4fb198fdf63511f00d76602e830d4be1248eec93872a5ec3a24e22b0e375c95fc98346c7aa01cfbf31cd1aaa8223d61d
-
SSDEEP
98304:TcLUHGONrwxm2lvozNrxzsW8iJdR2S0wJWSSBOi8zG8b7qlfMJg:TcLUmOxHegzNCW8iJXg587b7qBOg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
xplorer2_setup64_ult.exeLicense.exepid process 2140 xplorer2_setup64_ult.exe 2092 License.exe -
Loads dropped DLL 14 IoCs
Processes:
xplorer2_setup64_ult.exe321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exepid process 2140 xplorer2_setup64_ult.exe 2140 xplorer2_setup64_ult.exe 2140 xplorer2_setup64_ult.exe 2140 xplorer2_setup64_ult.exe 2140 xplorer2_setup64_ult.exe 2140 xplorer2_setup64_ult.exe 2140 xplorer2_setup64_ult.exe 2140 xplorer2_setup64_ult.exe 2140 xplorer2_setup64_ult.exe 1420 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe 1360 1360 1360 1360 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
xplorer2_setup64_ult.exedescription ioc process File created C:\Program Files\zabkat\xplorer2_ult\snap2\desktop.ini xplorer2_setup64_ult.exe -
Drops file in Program Files directory 64 IoCs
Processes:
xplorer2_setup64_ult.exeLicense.exedescription ioc process File created C:\Program Files\zabkat\xplorer2_ult\Uninstall.exe xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\53-x2org.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\commentsd.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\x2tips.txt xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\43-find.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\progress.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\opt-general.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\sendto.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\titlebar.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\group1.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\headersort.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\hierarchy.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\x2menu.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\x2ult.gif xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\sb_status.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\tree-bgm.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\Broker32.exe xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\ed2skin_XL.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\11-columns.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\52-custool.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\daterule.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\renwarning.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\delprogr.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\30-split.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\48-macro.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\47-ucmd.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\miniopt.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\tb_menu.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\X2.LIC License.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\14-preview.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\27-massren.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\icons.png xplorer2_setup64_ult.exe File opened for modification C:\Program Files\zabkat\xplorer2_ult\msimg32.dll License.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\desktop.ini xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\zoomtb.jpg xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\x2skin_XL.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\32-sync.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\additional.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\45-msdos.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\add2index.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\scrap-header.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\sendtoscrap.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\xls.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\x2tips.rtf xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\filtermenu.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\x2skin_48.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\autohide.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\drag-ani.gif xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\error.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\10-modes.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\44-fastfind.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\41-fuzzy.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\Editor2.txt xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\31-comments.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\export2.png xplorer2_setup64_ult.exe File opened for modification C:\Program Files\zabkat\xplorer2_ult\xplorer2_64.exe.manifest xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\copypaste.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\zipinfo.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\16-grep.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\datefmt.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\textrule.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\box_bs.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\licerr.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\unblacklist.png xplorer2_setup64_ult.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412358685" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ac8cf2a34fda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C41B4A1-BB97-11EE-B9A1-EE87AAC3DDB6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\cybermania.ws IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\cybermania.ws\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000f0d749697ae427fa0aa513ca7b92ca13d8db5e5bbc117bdc85c87093892e4011000000000e8000000002000020000000d0f9928dee3202c21a03683205a47b9be1c4237c7214f214f357c78432270c28200000009addbb1042c8615b4a840a73a82f524b9ed801037a4537873f4e6e1dd880dbf8400000008b170389c1af7171453c1e820ff89c10a8632a8bec095c30ff73270600c5d9a128d14c42f50628019217f628721395ec37b0dd89d4c07f93dcf829f9424709d4 iexplore.exe -
Modifies registry class 33 IoCs
Processes:
xplorer2_setup64_ult.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\shell\open\command xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\shell\open\command\ = "\"C:\\Program Files\\zabkat\\xplorer2_ult\\xplorer2_64.exe\" /F:1 /M \"%1\"" xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\DefaultIcon\ = "C:\\Program Files\\zabkat\\xplorer2_ult\\xplorer2_64.exe,-270" xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\DefaultIcon\ = "C:\\Program Files\\zabkat\\xplorer2_ult\\xplorer2_64.exe,-360" xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open_x2\ddeexec\NoActivateHandler xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.x2fnd\ = "xpl2.Search" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\shell\open\command xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\shell xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open_x2\ = "Open with xplorer²" xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open_x2\ddeexec\application\ = "Folders_X2" xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cida\ = "x2scrap.Document" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shell\open_x2\ddeexec xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open_x2\ddeexec\ = "[ViewFolder_X2(\"%L\", %I)]" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shell\open_x2\ddeexec\application xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\ = "xplorer² saved search" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shell\open_x2\command xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open_x2\ddeexec\topic\ = "AppProperties" xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ColumnHandlers\ xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\shell\open xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.x2fnd xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\shell\open xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\shell\open\command\ = "\"C:\\Program Files\\zabkat\\xplorer2_ult\\xplorer2_64.exe\" /F:1 /M \"/L:%1\"" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cida xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\ = "xplorer² scrap document" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ColumnHandlers xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open_x2\command\ = "\"C:\\Program Files\\zabkat\\xplorer2_ult\\xplorer2_64.exe\" /M /E \"%1\"" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shell\open_x2\ddeexec\topic xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shell\open_x2 xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\shell xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\DefaultIcon xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\DefaultIcon xplorer2_setup64_ult.exe -
NTFS ADS 2 IoCs
Processes:
IEXPLORE.EXEdescription ioc process File created C:\Users\Admin\AppData\Local\Temp\RarSFX0\CyberMania.URL:favicon IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\www22BC.tmp\:favicon:$DATA IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 352 iexplore.exe 352 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exeiexplore.exedescription pid process target process PID 1420 wrote to memory of 2140 1420 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe xplorer2_setup64_ult.exe PID 1420 wrote to memory of 2140 1420 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe xplorer2_setup64_ult.exe PID 1420 wrote to memory of 2140 1420 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe xplorer2_setup64_ult.exe PID 1420 wrote to memory of 2140 1420 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe xplorer2_setup64_ult.exe PID 1420 wrote to memory of 2140 1420 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe xplorer2_setup64_ult.exe PID 1420 wrote to memory of 2140 1420 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe xplorer2_setup64_ult.exe PID 1420 wrote to memory of 2140 1420 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe xplorer2_setup64_ult.exe PID 1420 wrote to memory of 2092 1420 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe License.exe PID 1420 wrote to memory of 2092 1420 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe License.exe PID 1420 wrote to memory of 2092 1420 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe License.exe PID 352 wrote to memory of 1092 352 iexplore.exe IEXPLORE.EXE PID 352 wrote to memory of 1092 352 iexplore.exe IEXPLORE.EXE PID 352 wrote to memory of 1092 352 iexplore.exe IEXPLORE.EXE PID 352 wrote to memory of 1092 352 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe"C:\Users\Admin\AppData\Local\Temp\321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xplorer2_setup64_ult.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\xplorer2_setup64_ult.exe" /S2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\License.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\License.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2092
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:1092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\zabkat\xplorer2_ult\xplorer2_64.exeFilesize
307KB
MD5bd8214eb60201ebe3295670010c3f699
SHA1cd377e2918fab5fae1a054530842d023b7bdaea1
SHA2568a303005ad7eed130f202f621e928468a02b3a6e55198f325fd7e12e4d3b990d
SHA512db01f01a48033738b69d109423a648ee05427ad6c01a550cc7ffecd05e2b24ab06d209325e05eb2bac016f51fd17c2ca0c0e93c4da08e04e76050ea2e62c372c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_1362B7791428C28A832A1F1A09A6ACBBFilesize
472B
MD584d6a8cd93b7cd798f43c7a955c4dc2b
SHA1e70d411496fb1a421737487d5435261d28df79d4
SHA2565f4b051fde29b44164017bc0dae0dbe943125aae0d1fce673bf9f6046ae88eb6
SHA512136ba322cf16ed9132607d99c830a1dd8278329c43818dd5b39fafc558757f1b05100d6e4ffd1943092e5caf1e4f11754ac26eb30d249cffb88beac6e86dc2e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15AFilesize
893B
MD5d4ae187b4574036c2d76b6df8a8c1a30
SHA1b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
SHA5121f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
252B
MD5379075bd2aa578baabff5aed835ca0b6
SHA1afa7d39de6bbccdc0683a129c9197af0aff28190
SHA256c0a0123b6031539ba6bc3d20dba16debfc684a8c24972334f2e8998ead79e2bc
SHA5121c30e0815c3ba41a8544243833ae8e35244d9204b704d3cee729e533daa4d13fc68a952336dd6b8dbc3213e6da51b401ec195d96e3d77950733337ef23dcf86b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
408B
MD58b9a0d4df013cce87069fb6e24c1b7fc
SHA1502217d1cc89a7713fa0d7c72066a675385643fa
SHA2560cc9fb3f208ceb010e21d6d1af4ecd888cd95383a22b1872ad43075d180c3421
SHA512e5f0f154df5ff2d80bd0adf5ba32621aca6a8b959194a821e9eafadf668d9dd335d2c2d2f713f07ee78cb442c8b9bd8144a16f1682d6b828a765159cd1092cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b8c1b0d4569a6cf6c03f178076a24335
SHA15b9ec52c02539c335a735dc63c22047e208c0a68
SHA2562a77858a77da27a577fddbd87231d7e5e04914748eae5fb3feb0922886360e68
SHA5126800fb845f19b94b2c322356cd663a990046489ddda8d148d2c622e13220687bfa987b60e25c8209391ffa26d3bb19712474c1e512b0a0d19204d08e88119cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD581384dc2611a4940032c17c7e4c7036b
SHA10f934e10ac3c04f8d3101500e255518e9c74a6cc
SHA25654821aeb2dc26a0cdcd7e85c7f42251f5bf7d122c19631caa9859b7e1eddcd1f
SHA51267473e159a7c3509ad371305c1f41a4c004491b1490fd0b8f60e115746a7750e7a5c59cebdba154cd14f6f69459efdd8369d0f83c6a0d0c135d53f98c7ccbd10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD505a2d48b88f7dcffb13ee21a69deda89
SHA1fdd957c658d58b5e18a6819884608d5de25d1de9
SHA256290ac2635958f0a7d863e1c5db76b3a4e997ce220453181e3055d55528c4527d
SHA512da81cc81d5714139dbe8426c24ac03f8e754fad53c953ef25278740ea08cd6ea7385687f1fcef7f52046091684a008828aa16cb717e3ac576457750b1e8db640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a34992c0ec3cec4a48b95688cf89e8e1
SHA126e9211095fce5e53f37bb7fb470d5b8df16766e
SHA256fc857ffb69dbd445ada7098387bbfd4499185050b74765aa9f02e1c590d45743
SHA512d199661764212efad8472ec7a8f2299c1df3df58f119d5fbf0dbd59aa2333a5ce0cbf5a1f495986c33abeaab4bef47dbebebebac3d72250f177facad419db892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5433fc4abc993786a940a7bd846165ee2
SHA1fedb0a57ac967012c8cdded81ad6b8ac95860706
SHA256ebfe78b32ecb13c2180849bcf034e414e62cf0d3758515df35d59d504943a98a
SHA512f14c7bc811647ef2d133126360a8fb9e61d2f0a8691c91f26cd6601b670bd16987092e060703e22c793e856b46f793ebe9cdfa882d3f35b6dd46722388987ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51af282c15fc3a50f4627d315f89c621f
SHA1f63d0ebf4a9eb7e0f65ca00231e394f0c8c4e820
SHA256c16a251355851d6d23192112543947b05337caaeb37e85d0b6f54a33db1b8e8c
SHA51223809ffb0ba62b91bb44d85c60a06f0dc3c950ef5b7776483c51e505aa68ab0a2bb9fe641a7b3087adc83a66711d7e08988bce6dd4efdd79a8a40e66b18c6bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b9c196d64b94bac81b658516adef3005
SHA121aafcb795d2a6adf6697e0e2522928907e29a23
SHA25615f3549e9762a06bb2b4292ed835a6d6c62c6c726b7e6c1425c327c66514cbe0
SHA512dd6a5d17040f09ff2338f9a3ffcf4864a6313d1c7690403927523609ad310219b49af343802351e9cf95369fcf85561e8f3ecd339bf346abe01b2481a860bd72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59f119a1ee09c7a9d6b413376ee5af2b6
SHA15875aaf5461d1f4dcc42480ddeb179f21e24e6f1
SHA256eb206ca02614f0c86f3f8d3ebbe4448a1102775f8060acc0ff1070432dbbb3a6
SHA51210ee3278b689bcc9dded2d5263b359d3e08f6ace3b8217bd441108c5dcc40de562298ca1f1877e2c3307ef2f4c5f991d0b4233264a44fb97cb29327cf64d7a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d8c6e4b3f270108b122a9d84e94e5769
SHA15649a259d1e0c712bb5f4ad02f136f3f941b01d7
SHA256bf01972409e25cc1896d5ec107b534542e6981baf6f7d7701338f58bb2ac5fad
SHA5125a76cf796dd61ced03e96b7a140abc5da64ff1849897aed81ac88a0cba00fd6b098a33316f9e255af9f25ca7c0f0f76539367436f479a9a21c3542accac4574b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5545667fcae3ed09e722ac761be6da79c
SHA1c527dd5e3d3a2e8de0c78c85ad1d0063bbf763ad
SHA256402cd7cb1f124259f2c8769d78e24fccd93bd7350becd59c2b4107df9f9eccca
SHA512b171ba42fac4260651d8245eb9574940a0870e0b8265355e2cc444d10e50bf99a279e4914f6df17b37f3cb9a0db89628130ffe1313efe9698e6b3112de883067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD573c49d0bc583e8f6ab21cccc19ff5c42
SHA18b0fc04ea8534aa9f12ab105410d6be8a18fcc54
SHA25691f0d79ef884a142c5613a95fa6e74a632c21a5e060417ff76dc84f9af3b8ca7
SHA5129af5eb89e96a62baa50eda5347ba578c7403775e9b78e6547d5bd620528868c18a204d61a4efa0f21901ead062576ed59c2ff47b7e0c0017d67ad82145cdbe7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5857eea3121d7a72b93ab83315843ebc7
SHA187539d5819ac0f52545910f3c2df4ddbd31be2a3
SHA2561bb8c4002ba371875c8ad425d981139e6db5290f88d48414fadb2896b62affe2
SHA51240c57c9c47a506e0bd55848a7d4a90a44ba1bc0be19523755f4c615d06020171558210d0bc0b08a2fe3d3e5f4d21edeb3b2b098a2271cb2b5a7d5e85e2adde02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f14cec8d515c58d49cb23650f0205c58
SHA1aca54467676a9a188c90926233742d6f49abb085
SHA2567a21ba252021dea76e2599b30787cd9fb25478c5e1234106037dd451f408c6c1
SHA512d8fc83d9a6a3241e3f39ebd97bc08d61df833bb9ff82ed93545dc33d01775d7c5dbb1e24e953deb805e1db2c37c1bcf7488fc08acf9511589a9206a2a3536402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD598ebce9e16b90386d2334f7fc722f715
SHA13f98b49574289d74cc6116eed24055a99e3c7d88
SHA25675b56bb4e32e1456744a6c64bce627548dbb87a7f408c4398b972896314c1d08
SHA5122327cafc08b6617e30842558e93be6c50f71ae3b2b38f05b013412731e40439c3e302894aff7765c9f8939a62eaceb2e8ea4a64dcfe8396ad473c43ae1df25ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d4bd476029193eb73dcfab1ba61ee635
SHA1bd65b9f71cb9874ac38895ebf3fe6511f568f617
SHA256d62711a9d9af73171d405549d08300bdd1571ad512d1d379d66802457ce682fa
SHA512031af870f4815851a147f60877ad51c37b69d00d7352e7157d02a6e3f0d62707d748c45d312fd5b98b4bb56ce07d391d9eeb9f770b8e3047b3089854fc3c0078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b92d7b8add10314d951ed7812b0f44a3
SHA1b7462710bf3d27dcdcc9fef5653bb2bd910f9fa3
SHA256cb36827238fef8f7b383ba3ff252857c52bb81305fa8c64c68a79360dde3aa1f
SHA5128cc53176da3da86e04de5776dee405b472da13bee4208c9487797c08c98d902b59c45701e242f920c7340d95e606d3b5b9780d273d4e0b8a93246233cd0b5f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a32979885508eb6dfca2e92beb4887d8
SHA10ba44524eff7f73f3bf62ca4adec731d00c24929
SHA25606cc9577c4d9e3adc8a845c0a460f4718a4d01958a2968bb79cbfbb6113f9b6c
SHA512e9120676709894f0e1a87a8dab3257206ce339176a4217640cb5567e320ec35baf12cd077f2bcc93af088b192a181f77a31f7c1b53aab685406ed6fb15343055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55906c9e04b21c31ce7c7853df1b9aee4
SHA13d2ec6247acd21e789182520f78dbc29da411108
SHA25606fc58f4ed25b9fe7dd219801414ceea10970291f05c9b0621b367afa01bebbc
SHA512efbe396000da325cb1978ebda3a4de3cb28242ecf8f5879dbc9ce80920b9bb09a1690230eb4cdef7f104af551afab3bf84494b2c7dd54ace2260ee924e9f28c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51f778c808c70dd2f3fcc1f6146261115
SHA1134b4536bd482864a2bc0a6cc8cf0c019b8a04eb
SHA2568e1208eff88c466995b1bbb42b6c6a22c7179c3f29790725197bb039628dfff1
SHA512eb778aea291fdac8b97fa192d8de50324d3ebfe4190b51b1fe5e4898484807589fc4c8c6b18caa74bc14580c8bd3a0df634d18849003e723c666a32247b1fbaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51330e6a061fa263461ba77d1ea004277
SHA1f5014e651f1de9c7d08c2103ceaabaa5a68f9197
SHA2560e3edd1b4f1fc083e80c6a72c0d27318f00ae1a0b54e6d9b213e7771c80c8ad5
SHA5122f93ee11e7767fb33bddcd801842476e0c46815c62e311ce4dae07fbdd6c6b10dbed0d661b277723f4778f20d2aa52053a6af534d4e60bd4aa82080f42552f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD512e1c68c8460bac2866a17a4c679629a
SHA1d80f7cbebb17cfa9ed820b589b0c597a54acc508
SHA256074eb69a96b35988a3cb02688afb57ebb4a0ab518cb3c823eca0d5e1efb767ef
SHA512e3eec7d7ba7b7cef5e7c0bce3e3c2fe270135ac5bafb25010975d03a0798c47117605831b683e398bcc5687a4b9e6aafd5c895588a9a5cfa0bf3b693b21cda27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59b0f8c7b7402586a1f25a406fa52a12a
SHA10f0402b81a0ce075ef8368acb049ef3a309429d6
SHA256a68d13a25ee1ecee56bdac4dac58e94c0c568f781d4b53f5aa7a33666adea310
SHA512124f85031fd18e01a0193f617cc9e37e3db82cfe8295d631ebd58c4ebe6c00815b4b59f872e1c1e5705b7a033bc50a45e7779134bd655a4dacf4c4690be3caeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54c3934ce6203a6da186cd6d4d7a1bfeb
SHA1a8c27afda672aa599b8558abf01baad17c5340d6
SHA2568b6eb002b90389c0c00d2618c6d8205b9b782db72b7aa0794d5d4eb0485c4129
SHA512a2cabcd664c982bbad14ac81e5f27ae57fde299f851a0650a8149a0ce102316cba6d167d8583e88e754d65b5717fe6020805d014c8baec59ae5e0ae8d1b5848c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b770b4882852607ea9d5e116e63d023b
SHA131ea8796c0379d2226e6f1e5eae1d37c9c36460e
SHA256e09fb0ee7d55038d21e85bd736b1beb3f08211d90c4b1a962a71ce5c3e71dbce
SHA512999486ec24890884ee0ede315256bd1dea9ff40f2bd66aa131d8dc66a553aaefbacc36862e7f42fbd612e0e4534807042c62bd940bff825c57d88d59086b860a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57f66bef16d1f9673205d9ffbff6b2e89
SHA1fccdc76ed73c7b383bd43a6678b786030ef24820
SHA256d53d7773a6f3637b6d927338bc32cda7a592194cd2df8b74af2cd3387a681e5d
SHA51291bd2d98410fdb9dcc20a2b8d935a981785b490bfc26e8f779b28a3645b6ed14d77423d4a7c38ff5d47c1d9d9fb6f192e54668160211192b23f9d53fdb80b2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5069577fba3d6a016b2f2295bed6ea224
SHA1566328ee1d0510091f617a26a87c96e5f73a837f
SHA25600def53d7862ccc1aba36ff32d5d2b0adb96005a3e9a7bec887996931414aeaa
SHA512a2b97b7d13c412c6abbdb3bd85a94526062766878d51f4112222ea90e863221898a4799beec3e598c7f996434e2a9c08736b451df348e4f68eec65a102aa5be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_1362B7791428C28A832A1F1A09A6ACBBFilesize
402B
MD5955c4b2f4f7721a1836e5cbcca2a24c0
SHA1733ffe04bffd1ead4df2c3aaded25e1251e5c701
SHA25625ebd85294279c841add5ab671b9ba013386e98c406b18d2894de496a6d7174d
SHA512fdb25769254bdafa9ba39b4a9a0b35fe3cf09ae6538645921cc7f93dd4ea253495d2e0b9eb2bc564c9f20d49f3017d68d21149dc489d13ac6676592831507fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_1362B7791428C28A832A1F1A09A6ACBBFilesize
402B
MD53d22be3de4e00745c6320ebfc0c9b57f
SHA1463f3c221d1b5045253a3831ab71f38c534b346c
SHA2566819dd9f2afd663beeebea86370ca09a6b1eabe8312b58d78712b1e57519401f
SHA512febf0cbb04d49f21e04567b74cea40e36e3a94536abef15cfe47051e44c5f753dd5a1f0cf104786489d6ac5d9d2686d298f70035932a0eabdee854163a4cebcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15AFilesize
252B
MD5ffd65c0cf85ec5a75bda81102147b974
SHA1a4a0ab3d98c2463c831acdba8f71b50ac4e39d31
SHA256f19f2827e40123de649e505a47efd91150fa7db79471a47b7d91db6d0138af28
SHA512fc4c701c711953454c6e6eb05adde0519bae8283915f50aaac6be340bec947adad10c58bd1551b9b1e1ca7b72932653e8d3be489b24cbd872c941c4cd6058fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD57c210f95f74994d5ce392a22e0a00c25
SHA1d8fe6b192a7b2567381fff6efd0373871985c59c
SHA2567db7e25b38b93aa6c94afd6063bf70043ab2baa975d24bd56f73ea828a4b706e
SHA5126c2216688940a3c4436840915ece25713b290d3a4cb882ce2a723adee538ce5781372d2066f509043399d2a48605fcea5d605b90044b3e6e4387d34dfd91e780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.icoFilesize
4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\s8rbov0\imagestore.datFilesize
46KB
MD5dd96dde1582dd1bff6508fc52b7d1aed
SHA1603bacb5c4831b565821afa836b19efaa690c83f
SHA2569cb8641cb6945160c60d4a918f104fcb29cc5116547aa527ed3a80a43b5e1eef
SHA5122cf687825db677e3ece168a393185901753a0ed9c57a6d4d7c033203f26f76b24c7d36dc98c5e55a6e4dff4617f8eb45b100b512d7eed66a58baa7ce861b291a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GSFN5K7X\CM-150x150[1].pngFilesize
46KB
MD531db7220cba8c01f89b5bcf0f3dc34de
SHA1bf1a95415b419f94908982822ae421d4a2a9b7f2
SHA256c052478b6204bc11443987e036d70d51e0f22186b7bd6c9616b794ccbcd44dd0
SHA512771725dd0fa07ca6e26df2cbe155f5c39fb803ae47b9ae3b1d0cf24778c78578e1f31ac687291946a905890239fada09d58b38c80526de86d02133c230948adc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NJFC93IF\f[1].txtFilesize
176KB
MD51adb814c5c17dd55144430f06337d4be
SHA1feb0bdb36d72b5524182e479db29c87383fe48c3
SHA2561d532dcfc510854b0bae4e0c73223586d24a7ba90e646da3e1620b3907bca1db
SHA5122312d0ccf91f21ad5b63c0eb2c6d9a14a39b6114ac112d50dccbad66a081cd2111fc23c77faab966e3c181f6107b3b17dd9da30c6cc7f65b9a6e45f0f2a28d03
-
C:\Users\Admin\AppData\Local\Temp\Cab1861.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\CyberMania.urlFilesize
4KB
MD5f89e823b83f9edc863ae9e35ea0a5949
SHA112db7e3d70e47bd97df335c74cd7323dc48a778d
SHA2567fba1e8849a88298272be247c2b22ef4a50ac1bc4c83a4c02848bc131e622088
SHA512d3e297af4eeeb3b8201381fddc426c33ab543db80c0da2ef7ee000ad773cf6895d7221ec17b95806377ea74488f8db7354e23d13c43d87599f6b02631e379d35
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\License.exeFilesize
448KB
MD54bb8675dc95fcb0301f6e18c721ae4e4
SHA10a432ee297202346c91ff55b67476cbd68c11431
SHA2562b5dfcc3f035877a7de48aeb63950a99d3a7084372a0bb56c37908f02db99d28
SHA512e5fccad2df8a321de1986fb8463c3c6bcfb38cf9dec21f0cb5e880af6f1ee6b642d7c2a73ebc82a4332c67850135895250ef9cfde9262358d5d7b8933fad51c4
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\License.exeFilesize
435KB
MD509a4a12aef1956578725e98c8be30ded
SHA1aababfe57ad73738061dee31a98737d72e558ec0
SHA2561ceb35c15a08ff06a2ec70fdd5fee6305a6f22280459692d3c4ae2bb9480fb26
SHA512df8199032afc9f833f6dcfc54e51dfc61d7e712250bfbfd203ed68feb1f4856ad231d711bef2b1962e63836afb7d3f108e8365cd06bd8518f5fac286801c6d21
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\License.exeFilesize
266KB
MD5a8f0182a6bd95d90ff09fd3cc5432312
SHA14461ce2125cef90ea8c96896965e32c66bf5f973
SHA2561b5e487dbe08fa4e02c113870f354c8f9aa08e4d56662c8612f5380a61933718
SHA512ca984d3b2bfb52ac750cc0bc2221f7bf8a9f65a4cfd858d09af5744b035c1f247ec48d0580076e852ba077388e1af449ee5e7057aed7ea2511d1b062771e099d
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xplorer2_setup64_ult.exeFilesize
1.8MB
MD5774a3f003525c57d471a2e8d31d17013
SHA12cfd926d6ed81e7572d741cdb678d78ab4899dde
SHA256450c93fcf4c438b9eeb92eeee37afbce7298ec88fc771d5b77cc6ff395143529
SHA51293303248c1851414bd1f82bdfdf0b59ad8ac88bb8636138840ccf024c30878344623ed8cc2abf11fe1bdf28894972d68b4bb25b33b02a4697d5b1357e4027397
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xplorer2_setup64_ult.exeFilesize
755KB
MD52e3b7f568921ab6c5f33c20b15761806
SHA15910fb0dd52e76cf0776c04abcdda3c755e2a797
SHA2560883a0aa0e3d82f92a2c523be75822d00f353bbcda939b85bf9fe25106b80c96
SHA512bc172ca2c9b69ea023175643d1480da4ab4d504ce1c4782f3c3b1b04df732548d598878d4718922700e73739d3a22bf4f0001a12e776c7cde183817f630ac123
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xplorer2_setup64_ult.exeFilesize
761KB
MD5696607162a0847e068d23b29f2e56397
SHA163a1eed7db21f221bb753596265f3526b0f8c7eb
SHA256c0e7af0684b36412e89ba127c7d7be04a3b24d8e70f935da5e8b6fb1e1212bb9
SHA512facfcd25b895550feb5d160e71b2e630f01565da2e3360791a1e090bead242954c7897b6cc69ca3f657c2b81d46fa91ddead391e7b91583c82b0e25f4fed18b1
-
C:\Users\Admin\AppData\Local\Temp\Tar1A78.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
C:\Users\Admin\AppData\Local\Temp\nsy11CE.tmp\x2.iniFilesize
3KB
MD5dcb49302dc7f091a672798d262ffc1ff
SHA13d1c00355392482066e844ca07742890245e644b
SHA256265528bb583808d162e30c9dfc424ce2cc77faf8a51b112205c3f796de11ca3b
SHA5120e57f07b1a4302c28e953c2a3b268b6e3732dc8cd87ce473ec0ebc363c6399a05def65fa2ce0ad84672546bc47202d195314d268c9e090a0c4a91919ba226a58
-
\Program Files\zabkat\xplorer2_ult\Uninstall.exeFilesize
108KB
MD586ccedeb03a02d1bbfd7d2994b863a29
SHA16f41053a12bcc84fe68da4e4cc974a99b898dea3
SHA256553ddfc4397a8fae0e52470192c8e69a6c64a3296870d72ea6023eb54077052d
SHA512f62dff0c190aabeee82bb82095d2514ca45584aa90140b47b07b2a4c2bdf980f05c4e184f7b2d66d3f8476aa00d8fdc8c85d6ccfc1280a5f6ff0acfc72afd5f1
-
\Program Files\zabkat\xplorer2_ult\editor2_64.exeFilesize
406KB
MD5f3449ab167a5842653bbdbeea74cade6
SHA16c238bfd179233ee8b08a888e0ad7bb6344f54e5
SHA2569f70d9331d238737e5cba1f87e5b3ef34d11fdbcb1196bf8c15b94e5e15b6263
SHA512d9ed638c2a908dc2c82688ae9712ef196487da998e304061c7ab0b476d3a45652afd51f6cbf542d8c1e32aec8b34c903374263fdfb8786f8b8e4dde680757e29
-
\Program Files\zabkat\xplorer2_ult\x2SettingsEditor.exeFilesize
297KB
MD5aa7cda7ec5f62c73c3354252f3cf28ae
SHA156bbd42131368fceb2c852dddc973cbd5ac022e2
SHA2565b2daf824c86adf3b05668ff082786c4b0c87af2acc16954369c75616d88145f
SHA51261b69e14f35ba215e3456956146fd8a2be6f69595249c9919328efb0f06c9f390071f097f64045d1c1ae4ae8d73105c2c0de68bb2f7902a95f9ec2b89db3ef43
-
\Program Files\zabkat\xplorer2_ult\xplorer2_64.exeFilesize
188KB
MD521dcc2d34791e4df708a71ba5e6018bc
SHA1e58820c7f58945542214059d6842257d9afb328f
SHA25672d00e4352d993c98eaefd8e82895865fc99e0f04cd4a9e2c9433ebce0d5a883
SHA5120460a1ec2e180c6d82238fc6bd574ac8cb681c7443b3b0b5c784f8b552e566f1ab70c62c73cc3bc7b1a4ea7f159845c6f39631e3dbf78b08b8ce13c8056e7e2b
-
\Program Files\zabkat\xplorer2_ult\xplorer2_64.exeFilesize
243KB
MD563254e2ab087b354ceace0dae98ab83b
SHA11bc7f6419b0614943da7c7d721807733fc68a87c
SHA256436e2e0fc526d3513eaf37a79c08977bd7e9f2c226de8609f9bdd55ce6914f72
SHA512b6caea55ebd986a02e831ec403ea07f91b820870684860efd83df8a8981f17b615981467a4151296f6bfc7451d6589cdf76c2f1dc7f363962b5dd1db591bef80
-
\Program Files\zabkat\xplorer2_ult\xplorer2_64.exeFilesize
252KB
MD5a8d54c202825d7013096fbbfdca67a4d
SHA127b4e31097ac2499a80d1e050c1bc808fca5a1d6
SHA256f8440a0a8397af6c40b9dd3eab224979130b03460f509e19b8d37600efd4441e
SHA512b3e46243986717a945582bf3d28ddd94f90293069fb8432dfb02d67f63e44bead7560d08ac6283843003c52e67fdd215ae6247f858ad9b3c81a59233b5eed611
-
\Program Files\zabkat\xplorer2_ult\xplorer2_64.exeFilesize
445KB
MD5362dedf76b229e5a8efa1a8b738a972b
SHA11ffbd9baaf541272114af1e40a5b82873dec1dac
SHA256cc5914398e7428358cad3c3cbdfc9ab4c337e28cb6840617ef84f8895623a04b
SHA51215ae769bf22056494f022ec3767c4832e58e90759c77bed9c77d7c86161c95bad52a3a574562cd55f13db0d6f567bbbdbc328a1eabfff3be72bdb8e3070214c8
-
\Program Files\zabkat\xplorer2_ult\xplorer2_64.exeFilesize
384KB
MD52d2026451d01bbca77cdbefa0ec6abf6
SHA1ab670285d0311fc876d97452de2a711bc687fa3a
SHA2566d7d63958303e6fb213ae54eb134326071f14fab68a6cfa1ad81827e22ccbec1
SHA5124349849e5b0469a1ef1ecee4fba6b3079002b6fedf6d876f7d4421df7fbc6faaa746502e34d7d8a794fdb8825c9998b17822db41375f4cf6c16eb8413fa91ec4
-
\Program Files\zabkat\xplorer2_ult\xplorer2_64.exeFilesize
423KB
MD52b29967037d38441efa04ebcaebe14c4
SHA1c27a6d9800719184d5824532b572b0e08ecec8aa
SHA25618d98e970cd8890d7f68abfad77fe439ed5989ef605821fa773a9ee1644fc8d9
SHA512f9998eb5b03c446fca5551b8a130ccc9f6b541b96c6503034cd5aecd4fce6c98346a2e0f58de8e930bd1baab0a999706d0929588e6035c05e6016080410cbbbf
-
\Users\Admin\AppData\Local\Temp\RarSFX0\License.exeFilesize
455KB
MD528e0d959261703b0fa6e0b3e520b1242
SHA1e843ffd9872db8e71577945f101c8cbcfc1ec90f
SHA2569d8d6e0ec4d18f702533e5777e028cd6c017577938c52f047ec605b3053f67f7
SHA51206a51340911dc881f4baa96bcef8ea23b72bdcdd22b2b316318173466a680353992b612cf1e33793667b6707c5bbb3ad45db3763b226819119ff6e03392eef87
-
\Users\Admin\AppData\Local\Temp\nsy11CE.tmp\InstallOptions.dllFilesize
15KB
MD50a9fb96a7579b685ec36b17fc354e6a3
SHA1355754104dd47d5fcf8918dee0dc2e2ee53390a6
SHA256b34fb342f21d690aac024b6f48a597e78d15791ef480ac55159cd585d0f64af7
SHA51267870206fa7f1e7df45c8c1bc2f51fb430f0a048a2bdb55a4a41525388ca3b50203784537f139169705a03db4bb13b591162a79a5d2df81a4d11fd849615c86b
-
\Users\Admin\AppData\Local\Temp\nsy11CE.tmp\System.dllFilesize
12KB
MD5564bb0373067e1785cba7e4c24aab4bf
SHA17c9416a01d821b10b2eef97b80899d24014d6fc1
SHA2567a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5
SHA51222c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472
-
\Users\Admin\AppData\Local\Temp\nsy11CE.tmp\UserInfo.dllFilesize
4KB
MD598ff85b635d9114a9f6a0cd7b9b649d0
SHA17a51b13aa86a445a2161fa1a567cdaecaa5c97c4
SHA256933f93a30ce44df96cbc4ac0b56a8b02ee01da27e4ea665d1d846357a8fca8de
SHA512562342532c437236d56054278d27195e5f8c7e59911fc006964149fc0420b1f9963d72a71ebf1cd3dfee42d991a4049a382f7e669863504c16f0fe7097a07a0a
-
memory/1420-294-0x00000000035D0000-0x00000000035E0000-memory.dmpFilesize
64KB