Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3db402b152a...69.exe
windows7-x64
10db402b152a...69.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3HelpButton.dll
windows7-x64
3HelpButton.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
HelpButton.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
HelpButton.dll
Resource
win10v2004-20250217-en
General
-
Target
db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe
-
Size
261KB
-
MD5
927635549829f48f929ead0fc59dcb84
-
SHA1
7c21f900ac8c3ca5311a77a591f002494ad7d85b
-
SHA256
db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669
-
SHA512
db1672765f4cdb8faa6bfd7ae993ad27e8b4f25a894d9883624aae80bd33ae2bcb3c8d91e91961f10c8f714e2507766586759362e292b4a6e6f1ade6cf485c0a
-
SSDEEP
6144:hwHysO+xpuZUVW3CHI4eHKerKFY/pavGOX3MCefFIu:KO+xpBVgeeHKerTRavfXcJfR
Malware Config
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.txt
http://bqyjebfh25oellur.onion.to/D692-738D-BB43-0072-C1D5
http://bqyjebfh25oellur.onion.cab/D692-738D-BB43-0072-C1D5
http://bqyjebfh25oellur.onion.nu/D692-738D-BB43-0072-C1D5
http://bqyjebfh25oellur.onion.link/D692-738D-BB43-0072-C1D5
http://bqyjebfh25oellur.tor2web.org/D692-738D-BB43-0072-C1D5
http://bqyjebfh25oellur.onion/D692-738D-BB43-0072-C1D5
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.html
Signatures
-
Cerber 3 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc pid Process 2868 taskkill.exe Mutant opened shell.{E385D267-F6A9-1D3E-E203-B9E38A459CB6} db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe Mutant created shell.{E385D267-F6A9-1D3E-E203-B9E38A459CB6} ReAgentc.exe -
Cerber family
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ReAgentc.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1096 bcdedit.exe 1868 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\\ReAgentc.exe\"" db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\\ReAgentc.exe\"" ReAgentc.exe -
Contacts a large (524) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 2896 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ReAgentc.lnk db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ReAgentc.lnk ReAgentc.exe -
Executes dropped EXE 2 IoCs
pid Process 2804 ReAgentc.exe 552 ReAgentc.exe -
Loads dropped DLL 5 IoCs
pid Process 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 2944 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 2804 ReAgentc.exe 2804 ReAgentc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\ReAgentc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\\ReAgentc.exe\"" db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ReAgentc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\\ReAgentc.exe\"" db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\ReAgentc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\\ReAgentc.exe\"" ReAgentc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ReAgentc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\\ReAgentc.exe\"" ReAgentc.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ReAgentc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp97BD.bmp" ReAgentc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1996 set thread context of 2944 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 28 PID 2804 set thread context of 552 2804 ReAgentc.exe 38 -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.txt ReAgentc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BUSINESS.ONE ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.html ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.url ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.txt ReAgentc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote.ini ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.vbs ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.html ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.vbs ReAgentc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\DESIGNER.ONE ReAgentc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE ReAgentc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BLANK.ONE ReAgentc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote-PipelineConfig.xml ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.url ReAgentc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReAgentc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReAgentc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2596 cmd.exe 2688 PING.EXE 2540 PING.EXE 2896 cmd.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x00060000000162e4-46.dat nsis_installer_1 behavioral1/files/0x00060000000162e4-46.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 812 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2868 taskkill.exe 304 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\\ReAgentc.exe\"" db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop ReAgentc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\\ReAgentc.exe\"" ReAgentc.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009edc20d0327b864a953bbac8fd6d328d000000000200000000001066000000010000200000006b10cf5c623d181035609a8c07cd4ae2e901c570c770a7898687259f067f2343000000000e800000000200002000000064490663ddaf00f64e116cc896c5bd96fbe4d64f00d489ac7a6f8c4f58fc650920000000b49305e2354440ee8805a81d55b316e1daa3e2268b1897e5b96c7a3c767767bb40000000caa259bc1b231e74124ee033256bf1911f9e935d78fe41ca91abe754244efc15e3e8ab2a9601f151a9044228cc7d18ab12e26e6f38b47918dad056ad0117f197 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1D62F91-F33D-11EF-B594-F245C6AC432F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1E21671-F33D-11EF-B594-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7043b1644a87db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2540 PING.EXE 2688 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe 552 ReAgentc.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 2944 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe Token: SeDebugPrivilege 2868 taskkill.exe Token: SeDebugPrivilege 552 ReAgentc.exe Token: SeBackupPrivilege 2028 vssvc.exe Token: SeRestorePrivilege 2028 vssvc.exe Token: SeAuditPrivilege 2028 vssvc.exe Token: SeIncreaseQuotaPrivilege 2864 wmic.exe Token: SeSecurityPrivilege 2864 wmic.exe Token: SeTakeOwnershipPrivilege 2864 wmic.exe Token: SeLoadDriverPrivilege 2864 wmic.exe Token: SeSystemProfilePrivilege 2864 wmic.exe Token: SeSystemtimePrivilege 2864 wmic.exe Token: SeProfSingleProcessPrivilege 2864 wmic.exe Token: SeIncBasePriorityPrivilege 2864 wmic.exe Token: SeCreatePagefilePrivilege 2864 wmic.exe Token: SeBackupPrivilege 2864 wmic.exe Token: SeRestorePrivilege 2864 wmic.exe Token: SeShutdownPrivilege 2864 wmic.exe Token: SeDebugPrivilege 2864 wmic.exe Token: SeSystemEnvironmentPrivilege 2864 wmic.exe Token: SeRemoteShutdownPrivilege 2864 wmic.exe Token: SeUndockPrivilege 2864 wmic.exe Token: SeManageVolumePrivilege 2864 wmic.exe Token: 33 2864 wmic.exe Token: 34 2864 wmic.exe Token: 35 2864 wmic.exe Token: SeIncreaseQuotaPrivilege 2864 wmic.exe Token: SeSecurityPrivilege 2864 wmic.exe Token: SeTakeOwnershipPrivilege 2864 wmic.exe Token: SeLoadDriverPrivilege 2864 wmic.exe Token: SeSystemProfilePrivilege 2864 wmic.exe Token: SeSystemtimePrivilege 2864 wmic.exe Token: SeProfSingleProcessPrivilege 2864 wmic.exe Token: SeIncBasePriorityPrivilege 2864 wmic.exe Token: SeCreatePagefilePrivilege 2864 wmic.exe Token: SeBackupPrivilege 2864 wmic.exe Token: SeRestorePrivilege 2864 wmic.exe Token: SeShutdownPrivilege 2864 wmic.exe Token: SeDebugPrivilege 2864 wmic.exe Token: SeSystemEnvironmentPrivilege 2864 wmic.exe Token: SeRemoteShutdownPrivilege 2864 wmic.exe Token: SeUndockPrivilege 2864 wmic.exe Token: SeManageVolumePrivilege 2864 wmic.exe Token: 33 2864 wmic.exe Token: 34 2864 wmic.exe Token: 35 2864 wmic.exe Token: SeDebugPrivilege 304 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2992 iexplore.exe 2868 iexplore.exe 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2992 iexplore.exe 2992 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 2868 iexplore.exe 2868 iexplore.exe 484 IEXPLORE.EXE 484 IEXPLORE.EXE 484 IEXPLORE.EXE 484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2944 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 28 PID 1996 wrote to memory of 2944 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 28 PID 1996 wrote to memory of 2944 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 28 PID 1996 wrote to memory of 2944 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 28 PID 1996 wrote to memory of 2944 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 28 PID 1996 wrote to memory of 2944 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 28 PID 1996 wrote to memory of 2944 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 28 PID 1996 wrote to memory of 2944 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 28 PID 1996 wrote to memory of 2944 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 28 PID 1996 wrote to memory of 2944 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 28 PID 1996 wrote to memory of 2944 1996 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 28 PID 2944 wrote to memory of 2804 2944 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 32 PID 2944 wrote to memory of 2804 2944 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 32 PID 2944 wrote to memory of 2804 2944 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 32 PID 2944 wrote to memory of 2804 2944 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 32 PID 2944 wrote to memory of 2896 2944 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 33 PID 2944 wrote to memory of 2896 2944 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 33 PID 2944 wrote to memory of 2896 2944 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 33 PID 2944 wrote to memory of 2896 2944 db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe 33 PID 2896 wrote to memory of 2868 2896 cmd.exe 35 PID 2896 wrote to memory of 2868 2896 cmd.exe 35 PID 2896 wrote to memory of 2868 2896 cmd.exe 35 PID 2896 wrote to memory of 2868 2896 cmd.exe 35 PID 2896 wrote to memory of 2540 2896 cmd.exe 37 PID 2896 wrote to memory of 2540 2896 cmd.exe 37 PID 2896 wrote to memory of 2540 2896 cmd.exe 37 PID 2896 wrote to memory of 2540 2896 cmd.exe 37 PID 2804 wrote to memory of 552 2804 ReAgentc.exe 38 PID 2804 wrote to memory of 552 2804 ReAgentc.exe 38 PID 2804 wrote to memory of 552 2804 ReAgentc.exe 38 PID 2804 wrote to memory of 552 2804 ReAgentc.exe 38 PID 2804 wrote to memory of 552 2804 ReAgentc.exe 38 PID 2804 wrote to memory of 552 2804 ReAgentc.exe 38 PID 2804 wrote to memory of 552 2804 ReAgentc.exe 38 PID 2804 wrote to memory of 552 2804 ReAgentc.exe 38 PID 2804 wrote to memory of 552 2804 ReAgentc.exe 38 PID 2804 wrote to memory of 552 2804 ReAgentc.exe 38 PID 2804 wrote to memory of 552 2804 ReAgentc.exe 38 PID 552 wrote to memory of 812 552 ReAgentc.exe 39 PID 552 wrote to memory of 812 552 ReAgentc.exe 39 PID 552 wrote to memory of 812 552 ReAgentc.exe 39 PID 552 wrote to memory of 812 552 ReAgentc.exe 39 PID 552 wrote to memory of 2864 552 ReAgentc.exe 44 PID 552 wrote to memory of 2864 552 ReAgentc.exe 44 PID 552 wrote to memory of 2864 552 ReAgentc.exe 44 PID 552 wrote to memory of 2864 552 ReAgentc.exe 44 PID 552 wrote to memory of 1868 552 ReAgentc.exe 46 PID 552 wrote to memory of 1868 552 ReAgentc.exe 46 PID 552 wrote to memory of 1868 552 ReAgentc.exe 46 PID 552 wrote to memory of 1868 552 ReAgentc.exe 46 PID 552 wrote to memory of 1096 552 ReAgentc.exe 48 PID 552 wrote to memory of 1096 552 ReAgentc.exe 48 PID 552 wrote to memory of 1096 552 ReAgentc.exe 48 PID 552 wrote to memory of 1096 552 ReAgentc.exe 48 PID 552 wrote to memory of 2868 552 ReAgentc.exe 51 PID 552 wrote to memory of 2868 552 ReAgentc.exe 51 PID 552 wrote to memory of 2868 552 ReAgentc.exe 51 PID 552 wrote to memory of 2868 552 ReAgentc.exe 51 PID 552 wrote to memory of 2556 552 ReAgentc.exe 52 PID 552 wrote to memory of 2556 552 ReAgentc.exe 52 PID 552 wrote to memory of 2556 552 ReAgentc.exe 52 PID 552 wrote to memory of 2556 552 ReAgentc.exe 52 PID 2868 wrote to memory of 3040 2868 iexplore.exe 54 PID 2868 wrote to memory of 3040 2868 iexplore.exe 54 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe"C:\Users\Admin\AppData\Local\Temp\db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe"C:\Users\Admin\AppData\Local\Temp\db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe"2⤵
- Cerber
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\ReAgentc.exe"C:\Users\Admin\AppData\Roaming\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\ReAgentc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\ReAgentc.exe"C:\Users\Admin\AppData\Roaming\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\ReAgentc.exe"4⤵
- Cerber
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:812
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:1868
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:1096
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:472065 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:484
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:2556
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:2772
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /f /im "ReAgentc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{33D7A01A-D90D-3DE7-A628-AFB91CA5B4EB}\ReAgentc.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2596 -
C:\Windows\system32\taskkill.exetaskkill /f /im "ReAgentc.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:304
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2688
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /f /im "db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe" > NUL3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe"4⤵
- Cerber
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2540
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2828
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad0f3491ce5b9d76f7fae91dd165a679
SHA134b15783695728f58e66d2438d16c771a03d3d43
SHA256953763b1fcd81c55da915a5e4a44795cf300239885ee20271edf1dace22bb6c0
SHA5120ce458503353e7eb1c451b7489ff09fca6a51976e46b9dd0b8055b39d8b53ee4be433bd25639bd0c02729c8b9e896458ec440d46c1fb4135e820c14e2b33b449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab31a0352e90f6ba2ff921da905f211
SHA18bcc195bd210a7a3e2ce1f9d68e1cd8e3dc654a4
SHA25608ffbe983fd7935d5c69261b59a44ede0d207c8512b6422cff69345daefcee2f
SHA512b7ee9b3cf323574849a116159982048768d987b90e78eb56f97f699d42f29c0cf89c4286ff9c9a0f0c3ea98fd872f036d7d697dd155cb96f6339f3da91627ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0032e05ac5fe146ad9f383610395b1d
SHA1dd2dc1bd0096133fe877f6382cbea34f07aa3767
SHA2567612a30e4d264312cbc89b7cd0e94db55ee82fea24e634dc55983c3d6665bb45
SHA512efbd3ef56a225700ab6c62dec1785304036dced6f732286c6992e8b2628056547abf926c73cc47cf18e7b0931295f5c43db5052125c5ea1538f982cca5738c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570050574e910a56d4c05bce5353a3561
SHA1cc8bb6a382f841bc0a1a0c2d3821e512a7b8839b
SHA2567ecc95281fe6058cf656e19c6a724f3c0ed78bc9ca927df635b521c199f33bbc
SHA51213762d118182adac643433ac7e3732798be78449df5d5c12fe993891efefeafbc5d731d7df049eb639d4ebd2ee9899405d16ecb6d31bfa21ae0b007539d42c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5932579d0210ae64458e50220c60aab76
SHA1003a49cac4ddcc789301d29e05b4f3a99c5fcb2b
SHA256ef6a24acaeeede349b652c6f58fe570cc4499d01376617291ee3198345a9de66
SHA51250120d67eb3e8bcbe0a73c81872c732a05690fb69909ab0d83c9c86575ebe48bd63baed7f9fe3d91006593bac5086fe8e3c292cf6a20239f9a3a61169acd9641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504cdebdbb0dba91886cbb89c3e2020b2
SHA15e39a57b5b9065eb9fa3fd019865754482ee4364
SHA256462c41c313c46c7ec5099afe742004d73abac8c591b201c020252675a942b64e
SHA512225ab5d7fae50a41383ad689f798edca05df8cd758dc306fd811da5548d3e24e37aa900534ba0fa2b6f6e04746df13e438e1210a481fd231b7b6ee0a093a63c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac96fbe247ccf48e58d6c573521247d
SHA1c8a7abd86b6c993efa5b2c4a1cdf3e82696dee86
SHA256a31647faee7fa301b613a5e282a2ac6d39f7270dc0fa7f3ab4e8a295cf82d4d1
SHA512d20ae4028a200f4e2952d6047b7148d508772baba941b6fcc845e52da715054dcb1b01c8cc80e34191bec2dd05af75faab7a05e2977e6c3088697783f800229f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b28a34a7bd8442225bde0946f863507
SHA197f3413528ee45ad04fb501b95145339333e6250
SHA2561377f84deadbbee64432928c83095a68c51679c2b77ec7c3ed8b8a0e8a81194c
SHA5127fc5c81a642036817f0bf85aa5aed9e936a4e42d4373da49df8a18e21eabbb57c67c31ce019d54f3814f571a3e9f057505aed81cd470fa201b9c92b4f7a943bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a0d09268246f1fdd93fb5b42146d4b
SHA1dc8629f43e8ca39f4592c3ca1f81a2d95240bcdc
SHA25616a45e0424d7dd2be531b5c3159dfb97855fb23714fd203c0dad21810e74de7e
SHA512179e7a7f440394b563305c5cce05fafbe687f7845e2553bb3b01d85d4841b70940ab803def4bd2d4fee8f4b46248fb2c9c225981f6673aeca55caa79f9f189a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc0eefae4b5b1dd74ff5717fea712b26
SHA1dc8f52845400b231806935f409ae62d2f3e47ffd
SHA256f6299a84187bdeaae4fe21f4db2843a280c9c39522832782d72e218836b2105a
SHA5123154ce697aaba2373a63e1c031211598b264fa2924c2585ed3c97628efa1209577a5c26a837788cdab56f1e2d4bba8c915dbf39cd7410f59674cda8a4a247a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c767335cd341a5a037fb52ca0ce915e
SHA1210a0213087f735fdcac3603f9a6a3b0a7f7fa03
SHA2562f2b6ca6fac6c97ea96e575242500115397b49d76ad1fdfa7ae7eca3cd04909c
SHA512d2089b30c7afd1f6830d9326534c00c4f8d316802eb84da6268a47fd0067a5126b3cd9d9d9a7b48273854552ce4d07c33319d8beb42d290bf4069fbc178b704d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A1D62F91-F33D-11EF-B594-F245C6AC432F}.dat
Filesize5KB
MD594a911d69db0f176aeafe45a72312caa
SHA16f9e0a65bb4b82edea69532d311d2209124fb9e4
SHA2563b86a5fccb7e8a07323a4bbef4192f7c3ce6260ff3f843ea5ad4e669372ae789
SHA512f70beb2a7694aaac62fd6b65cd6d8a065979b2d893f42f10ecf06ae777a1a9d4e96814e986c39b129a70eaf529a5538effd3ad5380d98c68b817098e1ddc4d80
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A1E21671-F33D-11EF-B594-F245C6AC432F}.dat
Filesize4KB
MD57edfd90ef7c04bbd1470a7d3de321ba6
SHA1206750d1fb7beae0282c8a458abae295b5265fc2
SHA256cbecf05d61d0cb1173b7400abe37a645a6003c33291c162d163ceda6b115e710
SHA5128837fcfb9a8143a888a7829c703f1d730dcdccd88cc7e51f5ffb1ce527dce2e52c58045c749a4aee9f0847225a745a94a16a86a4eb2b662eef8b6ec50d4338b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\json[1].json
Filesize288B
MD51666bd5cb1768674d456702d7c10b1ca
SHA1912f8c8182ec88e75ca0a4ca351b8c4c736ede10
SHA25686f2793420d5cb9b2d2937e774810a406fc626f13183423665987f505d88c75b
SHA5126053af897c7bb0cb237b86fbe202dc217d1d4f5ab3de27e9f8f64ebae4099543e9632d35eea17a7f0219b034c76206a96c5813735d7eb089f42e7c26300c532a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
85B
MD5313a92eb9dc6f52cf9368d7bdb49f636
SHA1119974836f996a58a14584497d853e3f24b68057
SHA256cde9b6a758da6349dc02027cc178ff4dd2b51676844935d134456bc814b74bdc
SHA51215a851200cea62c693f3ceb03d56e77147aaea7d1019da66ea8cafca627a1316115a523c8f4f2aba9f4869d7e2cceb1e72bd328b7cdb7a11aa3f3f9a7b336d21
-
Filesize
207KB
MD5c652bcadb640fd573f27f20e2a92330c
SHA157e3fa935f034f36144bf88cf68e466e2a0cbf78
SHA256a0434610e8b106c95e6c1e38ab97b7de469c6aba822a10099abbed9676cdb7e9
SHA512beb110c1bb8292f05ce39cba8277696e77d1e416f0b875cc56f8903fd4e0234088998076d9722511ee18f2b72002da2d8553886d13595218bc0b5fe90d50a5cf
-
Filesize
5KB
MD590f6028a0ece910589440536a2b2e4c2
SHA15d74232f79f3edf9cf3bf75f6136d6562ac717b8
SHA2562969857ca0d0a8643a00b3cdd166dbb6e92f138181d4445b2a331b025b1b325f
SHA512ff6565953a336b01487c7e34513e69b20b0352b66d64246e5a0655c62ce35c1a5de06c01478363419bc1ec0a21c2260d2da2bb91f32aaf5617241b2252301ca4
-
Filesize
1KB
MD52541a5d1b4256dfc6591c96caa599e20
SHA19e250083606b9737505f68d2a24d780ab7b2d846
SHA2564d5d9bc4cf37d7f519a42f91c95bd8c12baa03aa644486410ef579fb393aca7b
SHA512543edd59677645636e04c9b5d3b5fdeab434d8da5366c668181b2e595a92cc24bf71c1791ef5b7c31ff42ed5c332f2659b48191898b8dd22b9a484d20ca2451a
-
Filesize
2KB
MD57b2d4de6a17e9764343f9c1fa6c0ea82
SHA168ae38eeabd6f86f55c848bc0e936b85a1329794
SHA256b0b48755492cd53fcc87cf3c93213d7553c10f1fab16ad1dec673bbc7c49470e
SHA5129219ba9b2855e877ad26844130aac28046d9f1cc5223c9aeb8769209cb2471f792c3f32cb92d7467e640f249bf6959976d0c1ed85cee55cf89d3b6f2a0a585e8
-
Filesize
1KB
MD5ed204821db6fb0df953ab86f430dfc45
SHA14ff856384d2b8e7c736b305e42594238e4ff6a27
SHA2568c3cd13d1dfc7cbf60442b1e8f4b8f829f87601028a75618979b01bfe69487e5
SHA51284ff9a460a7014a7c18e60156ed2cb57ba69297244fd6ad2ea57731a459cd84dbb5cb4103f4b383f4d3d4cb0da2728335625077d1932c58489c5bf9388f94684
-
Filesize
261KB
MD5927635549829f48f929ead0fc59dcb84
SHA17c21f900ac8c3ca5311a77a591f002494ad7d85b
SHA256db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669
SHA512db1672765f4cdb8faa6bfd7ae993ad27e8b4f25a894d9883624aae80bd33ae2bcb3c8d91e91961f10c8f714e2507766586759362e292b4a6e6f1ade6cf485c0a
-
Filesize
19KB
MD5c1b2117e7dda98218e26d530ee04a083
SHA1aec97dc373a588793470cc953d3edb4512008ced
SHA256e284d53e5f606a2bd6cd4d40b9c854332b3898f2f7991ae556c176fe81c6a990
SHA5126b578ea0fdf85afb87a756386d025b4c0d889c26aeb4b624f706b8e8bb7eb894ea24c9db4a8c9c855d1d33a30103f0151c56af6c13a7b38fe308f88b29156487
-
Filesize
10KB
MD5fbdd21323a20520dee6bcddf2c883207
SHA1a8279b4c5cbd6cd0c570d546d951ad65ef42f373
SHA256206c560b177cd0812dafcf7592947bb010d0c18c2773eb6264d6100e61da6306
SHA5125cd7afa6d0d16f1c382a0a5acbf7f10dd8ef56e17780e3390c09a262acbb0bcdc629b96aceb80892fbe343776229d76495f6cdd66a01039624d0ef30e9518cc6
-
Filesize
88B
MD5cde38e2bdeb93f280cbb9a7ca18f991e
SHA1940f546738749a167219cfa71f8aec78597590f5
SHA256fd09952731ffe7e317ed727601aa65db9cd80d873b4fbde76014f24417490f38
SHA512c1be98106a897373649b8082ca48b9e642690ef59828dd8c02a3fe952f64ef60c81646cd2a1c2a9ea613fb483e76149a9ddc3b6aea8f634e9b1a7cdb30fefc65
-
Filesize
252B
MD518d46f5d8ebd3c7d6df0c7a8fd1bd64d
SHA1aeb8407457434aabce2a4c2f95fe305c5303f929
SHA256ceb35b75d397b07c84dfab3a28189e9431bdf80ec99ab65f9ccf01986bd4a8e9
SHA51235fc759be0dee77eb9e39350873c24d9693cf6f370f171814e2ce6250ea814fea8a0887442ebae9077d6e9ff81ae7034faa0afcb080401a7d4ac384d2ba42d65
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
76KB
MD5e87d836a5094e4720b19e8124b2d76d8
SHA1da920dc64ba4368036311404b2ae1893e7053a05
SHA256ce32626ed09ea15d255a8f2bb01e0c7665d2b83dd3d6ebc2c5d1d18dc35b4c30
SHA51299e57fedf614b061f83454349c3491006b4edafcd830de1502fcad866e5f8d3495b849851078510c65b545030869d3dcddb3784f79316770756fb52553264aa1