Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-06-2024 15:02

General

  • Target

    wzsus53.exe

  • Size

    45.5MB

  • MD5

    9deff019a43346d956d016cd91df342a

  • SHA1

    bc2646503a6e9a0c8a726bdf79a24fceb7e82455

  • SHA256

    fc3e420307b05488b75daf5a1e704018dbcf9ba45bd431eb83f06c937a67d505

  • SHA512

    b6122fc7779d8aafbffaca5bb07ee1142fcfcaf01e007f7aa9e003fb1d25c6b4573002551b5cc1c7a8ce1b2434c6a537d50a91eb91a09c798cff13e14a9230dc

  • SSDEEP

    786432:9VGm8MMKmA+hdUhdVINydDp+W+iAFaCVVsqxIEnABHqkBEzYiyFVx6OBT2oVU:9VGmzMxRhdIbIyQWeFa6VsqxIGAApyzK

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Executes dropped EXE 20 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 64 IoCs
  • Registers COM server for autorun 1 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 59 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\wzsus53.exe
    "C:\Users\Admin\AppData\Local\Temp\wzsus53.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\f4ccee8d-04e9-4fd1-97fb-9bfec8def2c7.exe
      \f4ccee8d-04e9-4fd1-97fb-9bfec8def2c7.exe /OSOURCE="wzss53" /BUILD_ID="53"
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe
        "C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe" -helper -client_id "C7AE5B66-73A5-4D0B-B726-7315457D1E62"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1284
      • C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe
        "C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe" -install -client_id "C7AE5B66-73A5-4D0B-B726-7315457D1E62"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3648
      • C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe
        "C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe" -language=English -client_id "C7AE5B66-73A5-4D0B-B726-7315457D1E62"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2560
      • C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe
        "C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe" -delete_apps_if_needed -client_id "C7AE5B66-73A5-4D0B-B726-7315457D1E62"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:720
      • C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe
        "C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe" -build_id "53" -client_id "C7AE5B66-73A5-4D0B-B726-7315457D1E62"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3216
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\WinZip System Utilities Suite\windowscontextmenuhandler-vc141-mt.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1604
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files\WinZip System Utilities Suite\windowscontextmenuhandler-vc141-mt.dll"
          4⤵
          • Loads dropped DLL
          • Registers COM server for autorun
          • Modifies registry class
          PID:464
      • C:\Users\Admin\AppData\Local\Temp\nsc5892.tmp\WinZipSmartMonitorSetup.exe
        C:\Users\Admin\AppData\Local\Temp\nsc5892.tmp\WinZipSmartMonitorSetup.exe
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4848
        • C:\Program Files\WinZip Smart Monitor\Settings.exe
          "C:\Program Files\WinZip Smart Monitor\Settings.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • Registers COM server for autorun
          • Modifies registry class
          • Modifies system certificate store
          PID:1600
        • C:\Program Files\WinZip Smart Monitor\WinZip Smart Monitor Service.exe
          "C:\Program Files\WinZip Smart Monitor\WinZip Smart Monitor Service.exe" /Service
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          PID:1188
        • C:\Program Files\WinZip Smart Monitor\WinZipSmartMonitor.exe
          "C:\Program Files\WinZip Smart Monitor\WinZipSmartMonitor.exe" -install
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          PID:1284
        • C:\Windows\SysWOW64\sc.exe
          sc start "WinZip Smart Monitor Service"
          4⤵
          • Launches sc.exe
          PID:3312
      • C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe
        "C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe" -osource "wzss53"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1072
      • C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe
        "C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe" -no_update -first_run_after_install -client_id "C7AE5B66-73A5-4D0B-B726-7315457D1E62"
        3⤵
        • Enumerates connected drives
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe
          "C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe" -splash 4840
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:464
      • C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe
        "C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe" -post_install -client_id "C7AE5B66-73A5-4D0B-B726-7315457D1E62"
        3⤵
        • Enumerates connected drives
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://goto.winzip.com/action/?product=SUS&LinkType=Install&Language=en&BuildID=53&OSource=wzss53&t=&UID=91a470ad-95ed6c04-24d0925f-e951bc56&version=4.0.3.4&license=&r=0&dsi=0
          4⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:924
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ff8a1ae46f8,0x7ff8a1ae4708,0x7ff8a1ae4718
            5⤵
              PID:1168
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2384 /prefetch:2
              5⤵
                PID:1400
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:3
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1088
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:8
                5⤵
                  PID:228
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                  5⤵
                    PID:660
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                    5⤵
                      PID:4068
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 /prefetch:8
                      5⤵
                        PID:5012
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 /prefetch:8
                        5⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2392
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:1
                        5⤵
                          PID:2768
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:1
                          5⤵
                            PID:768
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:1
                            5⤵
                              PID:1500
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:1
                              5⤵
                                PID:5012
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:1
                                5⤵
                                  PID:3764
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:1
                                  5⤵
                                    PID:2768
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,12171368954875463281,14609411279678561513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:1
                                    5⤵
                                      PID:2520
                                • C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe
                                  "C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe" -syncSMSettings
                                  3⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4080
                            • C:\Program Files\WinZip Smart Monitor\WinZip Smart Monitor Service.exe
                              "C:\Program Files\WinZip Smart Monitor\WinZip Smart Monitor Service.exe"
                              1⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3688
                            • C:\Program Files\WinZip Smart Monitor\Settings.exe
                              "C:\Program Files\WinZip Smart Monitor\Settings.exe" -Embedding
                              1⤵
                              • Executes dropped EXE
                              PID:1520
                            • C:\Program Files\WinZip Smart Monitor\Settings.exe
                              "C:\Program Files\WinZip Smart Monitor\Settings.exe" -Embedding
                              1⤵
                              • Executes dropped EXE
                              PID:3084
                            • C:\Windows\system32\wbem\unsecapp.exe
                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                              1⤵
                                PID:1812
                              • C:\Program Files\WinZip Smart Monitor\Settings.exe
                                "C:\Program Files\WinZip Smart Monitor\Settings.exe" -Embedding
                                1⤵
                                • Executes dropped EXE
                                PID:4628
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1872
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4296
                                  • C:\Program Files\WinZip Smart Monitor\Settings.exe
                                    "C:\Program Files\WinZip Smart Monitor\Settings.exe" -Embedding
                                    1⤵
                                    • Executes dropped EXE
                                    PID:1296

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Program Files\WinZip System Utilities Suite\Qt5Core.dll

                                    Filesize

                                    5.4MB

                                    MD5

                                    b7e7b5e5d423b2f073193a62e7213f25

                                    SHA1

                                    584b146d83236544ec4069a5609852d12d47c231

                                    SHA256

                                    546e44ba74743733573c1a294db63cbb7708c85e4e0fc13049fbed6e82d017d1

                                    SHA512

                                    27ae603e4e51b7dfe5bd4e9c1888213d1fe689eb874baeb4254e6ed8437327d158cb00814e7ba5e2a0fd89a4aa5cc095c81999c1d0ed8b5d46ecafd5604329ca

                                  • C:\Program Files\WinZip System Utilities Suite\Qt5Gui.dll

                                    Filesize

                                    5.6MB

                                    MD5

                                    65288d4c67b9021f14201fb1bfad85f4

                                    SHA1

                                    02604bb89912cb78d33bcc37bd6d41f8d67f57f2

                                    SHA256

                                    40613464bee9c0bf4f1634771f51d10cbbcbd0bdb808b3c607d898ef5d580fcd

                                    SHA512

                                    594be6c8157b5df0ef8248d38e7a72fcff89b3f9fba9990eef35063fb4a5a3afafeca46ae48d2ee09cf4a92e70f0ef8c47b9a71ce3715e8dcbb2d036c807f454

                                  • C:\Program Files\WinZip System Utilities Suite\Qt5Svg.dll

                                    Filesize

                                    330KB

                                    MD5

                                    1edd8377d07ae35d0e0fd23b6d2933fd

                                    SHA1

                                    2d914e224667e1dde0c60fe1eb6033241280fb57

                                    SHA256

                                    e951916e8469848dd80cf5a4aec4ba440e2155b49acb555375cce8a232b21932

                                    SHA512

                                    0538a7f5d1ec9eed6e25a0844a480c2bd38e6b650aa98c916b5b5d3b69baa84a04aee5dd320e098769db0e3941272c0ab1c5a0f432d969f344cacede49338fa2

                                  • C:\Program Files\WinZip System Utilities Suite\Qt5Widgets.dll

                                    Filesize

                                    5.3MB

                                    MD5

                                    a11f79cba9d18f3def970ec213db85d1

                                    SHA1

                                    fd17a735084656aabf78e80bfd72cec5fb33419b

                                    SHA256

                                    dbca173456ccce78483b590895c20a7984d269efea7e88b1e11529a0dbd0abf5

                                    SHA512

                                    b88aae99031a6db628cb00fa707cf85f284da34f9d64877a41f2f5cae20bf3586f1e1c98cd0c4229ad9f6756e22a21c50a7a725265ba54fb1a16dad5d80cbbdb

                                  • C:\Program Files\WinZip System Utilities Suite\Qt5WinExtras.dll

                                    Filesize

                                    297KB

                                    MD5

                                    ddc7849a9ca298fe3bf33062f5ae6973

                                    SHA1

                                    978ea59d4c899fb953ae99ac48acc5b7e3abc7d9

                                    SHA256

                                    f6e3c57165e8e8fee1b09a1d7d3dff454d59dacffec92ea235f54dd596c7d540

                                    SHA512

                                    37f46298e91c2654b2a1d813f8ccb383c867c3916f19e44f5b605f3c6493b910eddcd809ed8660ea1db89b19a77b73fb8389a4524a424b75bd6930f88909aadd

                                  • C:\Program Files\WinZip System Utilities Suite\SystemInfo-vc141-mt.dll

                                    Filesize

                                    2.4MB

                                    MD5

                                    584371d492efb5a4d7556a7bcbb4797f

                                    SHA1

                                    ea411599c463fb19ebe5370a404a769391d5828d

                                    SHA256

                                    000ab5ea46bb8d426603cbbcea8328cf9c93d5827ce2dfb858f2e273fbc5d97d

                                    SHA512

                                    5c77eacc2c33cacd867f41a322c81c714b56f51113b189e871bd25785dff299bf815e50c5d0adccf1703d5ca93321dce520b96a51a445110dc2b418de2d1f2c4

                                  • C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite.exe

                                    Filesize

                                    10.5MB

                                    MD5

                                    a5f021f21447d272181dbe2dce7e70c0

                                    SHA1

                                    7732ac40fa1ae3389562fca2e574d5575dca4a34

                                    SHA256

                                    3a46c2c4f1e126d14bbbefd4e48ef620cc6559537fadab2061224f6f1a04c47f

                                    SHA512

                                    888000bf874d17b0737af2f2b6d060c07db82e42139c6dcc87620a33c81bb4bf1e411cab5b39e0be38f97fbe1bb87841a82ae8f3d837614b847c4a5c1cc733e9

                                  • C:\Program Files\WinZip System Utilities Suite\WinZip System Utilities Suite\English.xml

                                    Filesize

                                    32KB

                                    MD5

                                    8eaf154bcdccce9b2617dc78235cb4e8

                                    SHA1

                                    dfba38f658d0e2fdc5b16511209f5cac9d326a9c

                                    SHA256

                                    17e434026f9ca01f1d56210090ae3f0555a561771c98d8b916fb4dedfc63bfc0

                                    SHA512

                                    53d79f8c36753ae3cbaf0846954ffd4f0d9069683db6d5b4866157f851a3a7afbaa20ab27d52f3353e4a57b9a2bfc80652bd64cecdcc7cb396e157e96e83360e

                                  • C:\Program Files\WinZip System Utilities Suite\apps\WZ_apps

                                    Filesize

                                    3KB

                                    MD5

                                    1292c65360ac8901f339d6b44218bd45

                                    SHA1

                                    065260ec64596f5e91de2306609a92f35f221060

                                    SHA256

                                    44e0e89fecff53e108203b837e80ccc8d2d59e572ccec1c9a712999bb29a3de9

                                    SHA512

                                    3f3f31b0025af10bf48786a3d8c837f36e22261544fe1ce0935bd666830879d7522f3aff5aa6855c8480b0cc0c1aa88542c59a8af0076d55f29d40bdf4206b11

                                  • C:\Program Files\WinZip System Utilities Suite\msvcp140.dll

                                    Filesize

                                    618KB

                                    MD5

                                    9ff712c25312821b8aec84c4f8782a34

                                    SHA1

                                    1a7a250d92a59c3af72a9573cffec2fcfa525f33

                                    SHA256

                                    517cd3aac2177a357cca6032f07ad7360ee8ca212a02dd6e1301bf6cfade2094

                                    SHA512

                                    5a65da337e64ea42bcc461b411ae622ce4dec1036638b1e5de4757b366875d7f13c1290f2ee345f358994f648c5941db35aa5d2313f547605508fd2bcc047e33

                                  • C:\Program Files\WinZip System Utilities Suite\vcruntime140.dll

                                    Filesize

                                    85KB

                                    MD5

                                    edf9d5c18111d82cf10ec99f6afa6b47

                                    SHA1

                                    d247f5b9d4d3061e3d421e0e623595aa40d9493c

                                    SHA256

                                    d89c7b863fc1ac3a179d45d5fe1b9fd35fb6fbd45171ca68d0d68ab1c1ad04fb

                                    SHA512

                                    bf017aa8275c5b6d064984a606c5d40852aa70047759468395fe520f7f68b5452befc3145efaa7c51f8ec3bf71d9e32dbd5633637f040d58ff9a4b6953bf1cbf

                                  • C:\ProgramData\WinZip\WinZip Smart Monitor\S-1-5-21-3558294865-3673844354-2255444939-1000\smsettings

                                    Filesize

                                    44B

                                    MD5

                                    3da8043732f566e2fa749f6267abcc93

                                    SHA1

                                    5aa6ff1ccce33a5187ed6f7dcfef8d24542cc72b

                                    SHA256

                                    79b18978637868aa31f346c5c628fa95e21a3442a1896aa627c5e4fd21533d04

                                    SHA512

                                    f9c8a8b54f9119340e258a396cd7f05d33e09dfbcfcb4afefb9206296c3c7c6e3fed65370bb624eaf90c97842d9fe6e3fef083e2c90dc83c0a03dbbc472a09d1

                                  • C:\ProgramData\WinZip\WinZip System Utilities Suite\S-1-5-21-3558294865-3673844354-2255444939-1000\Disk Cleaner\scanStatisticInfo.lock

                                    Filesize

                                    44B

                                    MD5

                                    baa5ef7067d2dce28ee251b7fc8c6393

                                    SHA1

                                    d39c3dd6dac1758e6cfea2d2e186e5a7c592c843

                                    SHA256

                                    60afb3cffde303548a8ce91f12fdaf5c23dd6689f1eb0dc3f16ebe68e9c2492c

                                    SHA512

                                    a36d76b4ec7ffc1b976b1591f2ee6bd4b361e2a6bdf187e61202e3d8e2fb47d572a85994c72a935a7c55ee1db77fd555425e320fadb236a478fc6ea0ab220c8f

                                  • C:\ProgramData\WinZip\WinZip System Utilities Suite\S-1-5-21-3558294865-3673844354-2255444939-1000\Disk Cleaner\scanStatisticInfo.lock

                                    Filesize

                                    44B

                                    MD5

                                    6c68d6e74617c7c3d16dd7a7b0ab511f

                                    SHA1

                                    da5514db532b3456c7c2440a51a3f03e122c2f3e

                                    SHA256

                                    96208bfa0d2eef6bd8af404aa63ea497fbd62bc5202812726ab54232b0943a53

                                    SHA512

                                    59254b01ceb3dacf4564b2cf2a3f2073ca389752b8ca85133574ff2c93a3041ebd8e654e5ccea91c6fd1d3ecfa087d4beb60ec97616b159410c68a9b39bb3cb5

                                  • C:\ProgramData\WinZip\WinZip System Utilities Suite\S-1-5-21-3558294865-3673844354-2255444939-1000\Registry Cleaner\scan.ini.Uh2740

                                    Filesize

                                    120B

                                    MD5

                                    9d7e18542f23b1c7e89fdb6872656767

                                    SHA1

                                    5a3fed14b25a23fd0b36c3ecc4d9f17f09993bda

                                    SHA256

                                    53272014703845c52a542527a7bb17f93bdf4c243a321292b788a5f14d6779fe

                                    SHA512

                                    d6a6eca1287cd402cedf58a1e137f2195e6b8744af4ed726e5a0cc375023f495847b544a9552206fddce6ff3a33a8cc082ca8b6a859dc90d1d0b2701c6e19eb5

                                  • C:\ProgramData\WinZip\WinZip System Utilities Suite\S-1-5-21-3558294865-3673844354-2255444939-1000\WinZip.ini

                                    Filesize

                                    600B

                                    MD5

                                    7d4d273f72291e78761b586814dba9ab

                                    SHA1

                                    2146b7c3a1dc95a79895266397f4f3811fbd0249

                                    SHA256

                                    5acd793eb247ebe94c2d7ea39ff9e278be6a43042d98770aaadee3855aa35975

                                    SHA512

                                    4a12effb7d36f8b8f7d5abb3c595565c079426dfc4fbca4207bb9d99c0bb597ee4f63403c179c773ea32b7328321f3dec5952db16531c4cc90ce355ccbcb12b1

                                  • C:\ProgramData\WinZip\WinZip System Utilities Suite\S-1-5-21-3558294865-3673844354-2255444939-1000\WinZip.ini

                                    Filesize

                                    604B

                                    MD5

                                    18db2a7ccfdccc5a82adff1082b99398

                                    SHA1

                                    1fa1c50f39f1e49ef3f445305a572c4b041bc72f

                                    SHA256

                                    10bf176f6647c386163f1647f092a4e60c66b450967805d09f171b7bd28565af

                                    SHA512

                                    030934eb28f6127aeebb74929406e6d672e864cca99e11d441064002a36da1c2c9eb74f0f5b4bbd890de1632a28f75bbcce8f56b604e7ba8e5c9d4ce2fb97991

                                  • C:\ProgramData\WinZip\WinZip System Utilities Suite\S-1-5-21-3558294865-3673844354-2255444939-1000\WinZip.ini.lock

                                    Filesize

                                    15B

                                    MD5

                                    423dd1fe3f6d789311268dc1af80d99c

                                    SHA1

                                    e2a3a6632a55985d3af9f4be5a092cc07bbb8a11

                                    SHA256

                                    9e1fb0ae972edc0c7edc36e9dc300af4f08dc1aad106f710503218758b049181

                                    SHA512

                                    a97413c43f539a9cc8ba802a2184242c537cc29b5437645a664d172107750054810fdc0e97cd39892819ae47363245b318dc5b89fc2e0a8aa68e11690c450ebf

                                  • C:\ProgramData\WinZip\WinZip System Utilities Suite\WinZip.ini

                                    Filesize

                                    76B

                                    MD5

                                    16c4bfd6a4b50989d15cf682cf4e5d3b

                                    SHA1

                                    40fd36c157a4fb36e34bc559df4afaccebd70812

                                    SHA256

                                    6ef95775a1dc77f0080b7f1f0e948738f3a181d858160fbc7d32861fcf212617

                                    SHA512

                                    df67b53f13a37bf12418eaebf05bb2f92edfaaacdc796375bf7e70810ee449abbfadda0add8d09ecc000a825451ef7fc42a62fc60904feb32c148052e2f1f7b8

                                  • C:\ProgramData\WinZip\WinZip System Utilities Suite\WinZip.ini

                                    Filesize

                                    75B

                                    MD5

                                    47de29a1ac76f987ee79a2ca329c5c44

                                    SHA1

                                    fa96d7a396993c1ca390508099179ef7c7a1c58b

                                    SHA256

                                    c07222ceeae2fa1d57cbb8511835c4bdd53c1d880b41333133001a75dd94bc3e

                                    SHA512

                                    bd087dd9f2a380a2c1f106c40dc592de57845912c424956ae54c33edb0aac9361029a171f27dd66f76d711982482b1b8aa67839614cd21b34dcf5857263b08d1

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    87f7abeb82600e1e640b843ad50fe0a1

                                    SHA1

                                    045bbada3f23fc59941bf7d0210fb160cb78ae87

                                    SHA256

                                    b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262

                                    SHA512

                                    ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    f61fa5143fe872d1d8f1e9f8dc6544f9

                                    SHA1

                                    df44bab94d7388fb38c63085ec4db80cfc5eb009

                                    SHA256

                                    284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64

                                    SHA512

                                    971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    bbc427e9691da217cf2c64e960bbb3af

                                    SHA1

                                    24e182f118c6ea09734c48da2a4bbab441a9fe9b

                                    SHA256

                                    8f8254740dba65439aa37bda1f81f0d7a3dc53da4cf33e18a17b3b8f30ef18fc

                                    SHA512

                                    c046750cfbfbf8bd050f4a4e56b206016b761656af07988e4d7c34f284b02689b0469787cfffcc7a280c72a5f5b9d5bc8bb76099c1a1887aa8f500fcb94ab4eb

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    206702161f94c5cd39fadd03f4014d98

                                    SHA1

                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                    SHA256

                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                    SHA512

                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    8KB

                                    MD5

                                    70fba443d83e1d9c17c3e7315a332e88

                                    SHA1

                                    95650d1663489d08679b997dd11cfefda6ee7c98

                                    SHA256

                                    79aeec8088d716981c2c8a4465957b4451ecb2db60097d16c651810c197f4657

                                    SHA512

                                    313a48fcca32b82dc0d692e17b5c23caf47e7d6c2631fbb0ea4f0c4448143582189372ed8a4225b6bc120179ed8ee3b1248bc5bae374730225ab63f911e65d42

                                  • C:\Users\Admin\AppData\Local\Temp\nsc5892.tmp\InstallOptions.dll

                                    Filesize

                                    15KB

                                    MD5

                                    67d8f4d5acdb722e9cb7a99570b3ded1

                                    SHA1

                                    f4a729ba77332325ea4dbdeea98b579f501fd26f

                                    SHA256

                                    fa8de036b1d9bb06be383a82041966c73473fc8382d041fb5c1758f991afeae7

                                    SHA512

                                    03999cc26a76b0de6f7e4e8a45137ee4d9c250366ac5a458110f00f7962158311eea5f22d3ee4f32f85aa6969eb143bdb8f03ca989568764ed2bc488c89b4b7f

                                  • C:\Users\Admin\AppData\Local\Temp\nsc5892.tmp\System.dll

                                    Filesize

                                    11KB

                                    MD5

                                    959ea64598b9a3e494c00e8fa793be7e

                                    SHA1

                                    40f284a3b92c2f04b1038def79579d4b3d066ee0

                                    SHA256

                                    03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

                                    SHA512

                                    5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

                                  • C:\Users\Admin\AppData\Local\Temp\nsc5892.tmp\ioSpecial.ini

                                    Filesize

                                    1KB

                                    MD5

                                    3754de1d6b6b20979206896803049096

                                    SHA1

                                    0f77bf586849c7beecb644b9c54afdb8b146d172

                                    SHA256

                                    7f8c0561865baf16141d2a59c617255add724dd3055a4408504a44a26a81ad1f

                                    SHA512

                                    924277f2f880ef3e856a85d2d5439db2beff40aad4a4048c299a84f554f09701ef04e8fc12a576fd45df50f080980ecde98b9b01e37db0803871f0dde8805002

                                  • C:\Users\Admin\AppData\Local\Temp\nsc5892.tmp\linker.dll

                                    Filesize

                                    7KB

                                    MD5

                                    0d5cf965fafcb11f8744d0dc729339da

                                    SHA1

                                    ccfeb09534dce671a3fcd216606d7ee572a0341e

                                    SHA256

                                    02ee7e90b9379827cb186df48db5b412aaf800196d6967762fb513b9143cd1ef

                                    SHA512

                                    993a598e3c46a4544ee0011a94fd9a4df66131b1526744db31faf8c5bfba4b5695a096d787555a9807d8bfd3e09bebfa73df97db83b144990c84cb14a000ba56

                                  • C:\Users\Admin\AppData\Local\Temp\nsc5892.tmp\nsEnvVariables.dll

                                    Filesize

                                    41KB

                                    MD5

                                    29924ed9ad063b5fda86aaf08dd3227f

                                    SHA1

                                    f2628d325dd17c1dcc8edd167e2417d7c582f5c5

                                    SHA256

                                    083cbb8fdd692134bb80b6d12c0fcd71ede5444064d226b6d747e3227995e045

                                    SHA512

                                    7909415f5efbd12d4cb152e44222f3564178cc242809909fe094f6d5e2578634ed07f7d71aa9cd2e31cc3371a5e7875bd4691a2d85f7041ebb1c4e2bca978549

                                  • C:\Users\Admin\AppData\Local\Temp\nsc5892.tmp\nsProcess.dll

                                    Filesize

                                    7KB

                                    MD5

                                    6e2a127c517f04c7bf22cf392e0a836b

                                    SHA1

                                    e92fe193de327b15a762fe727798d351d30adf34

                                    SHA256

                                    102c22f492c3d31f99e43143218ca64592a2f3bb6933f743d8826075ab9b7ad2

                                    SHA512

                                    ba8f4aca1f430de89bb17fa0fa5e221cdcead7793ecb0fa8a24bd600bbdb84c7cbd1a58a7970bec0e941db7f4d4b6b545e49fe6240545470b9cede8b83b71670

                                  • C:\f4ccee8d-04e9-4fd1-97fb-9bfec8def2c7.exe

                                    Filesize

                                    45.3MB

                                    MD5

                                    e2fdd689cf1c4432b7035a4ef6bc634a

                                    SHA1

                                    59358a207b1babdf402da1da161f962146c32e38

                                    SHA256

                                    0cd05ca009c01746a05f782ba032af73c3269d736b1e0bab7327b9a2252a4d4d

                                    SHA512

                                    6073db8923b2bd0a390b8cadacd59f762d32a177e3ff77a4ce2334ba8b11f35f152006bb06274664aba3622162ddc9dd6ef1ec3125d53589a1fe677865822388

                                  • memory/464-1052-0x0000000069C90000-0x000000006A1D6000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/464-1051-0x00007FF62C0E0000-0x00007FF62CB70000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/720-600-0x00007FF62C0E0000-0x00007FF62CB70000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/720-599-0x0000000069C90000-0x000000006A1D6000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/1072-662-0x0000000069C90000-0x000000006A1D6000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/1072-663-0x00007FF62C0E0000-0x00007FF62CB70000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/1284-540-0x00007FF62C0E0000-0x00007FF62CB70000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/1284-541-0x0000000069C90000-0x000000006A1D6000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/2016-18-0x0000000006B80000-0x0000000006B8E000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/2560-578-0x00007FF62C0E0000-0x00007FF62CB70000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/2560-577-0x0000000069C90000-0x000000006A1D6000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/2740-1016-0x00007FF62C0E0000-0x00007FF62CB70000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/2740-1017-0x0000000069C90000-0x000000006A1D6000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/2740-1041-0x000002CA9A0B0000-0x000002CA9A0C6000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/2740-1050-0x000002CA9A2A0000-0x000002CA9A2E6000-memory.dmp

                                    Filesize

                                    280KB

                                  • memory/2740-1042-0x00007FF8C2560000-0x00007FF8C2576000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3216-607-0x00007FF62C0E0000-0x00007FF62CB70000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/3216-606-0x0000000069C90000-0x000000006A1D6000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/3648-555-0x00007FF62C0E0000-0x00007FF62CB70000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/3648-554-0x0000000069C90000-0x000000006A1D6000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/4080-1410-0x00007FF62C0E0000-0x00007FF62CB70000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/4080-1411-0x0000000069C90000-0x000000006A1D6000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/4840-1015-0x00007FF62C0E0000-0x00007FF62CB70000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/4840-1014-0x0000000069C90000-0x000000006A1D6000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/4840-1065-0x00007FF8C2560000-0x00007FF8C2576000-memory.dmp

                                    Filesize

                                    88KB