Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/02/2025, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch.exe
Resource
win7-20240903-en
General
-
Target
2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch.exe
-
Size
6.0MB
-
MD5
a2ab6183df2e5993bd1caabd8738e14a
-
SHA1
c953195e5291954bd6aef6cb89f165387c4895d1
-
SHA256
0c1b2a64482258bc821a9700c2203768b0f7b3eb590e13919d890becf51a8b7a
-
SHA512
7934df07e408eadc49312ae9b2aaee5a64b58649fd47af9718b4cf90e306f49b8c5ac459350444c9afdbda28ff9c6a8ea3170e399defabcbd1686032fc91be0d
-
SSDEEP
49152:YLlt90ZzSvd+rMdmBcHF4mL8jIr1zrAwZK7eFiDrHb2rjPNtBO6NuxpGh5pFN7nO:2lt9b+mV8ju1zJU6NuUpFN7nKGh39LK
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2888 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch.exe 2888 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch.exe -
resource yara_rule behavioral1/files/0x000b0000000120f6-1.dat upx behavioral1/memory/3008-11-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/3008-15-0x0000000000400000-0x000000000045D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6322191-F4D9-11EF-AE85-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "446802005" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B63073E1-F4D9-11EF-AE85-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2904 iexplore.exe 2788 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2788 iexplore.exe 2788 iexplore.exe 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2888 wrote to memory of 3008 2888 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch.exe 30 PID 2888 wrote to memory of 3008 2888 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch.exe 30 PID 2888 wrote to memory of 3008 2888 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch.exe 30 PID 2888 wrote to memory of 3008 2888 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch.exe 30 PID 3008 wrote to memory of 2788 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 31 PID 3008 wrote to memory of 2788 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 31 PID 3008 wrote to memory of 2788 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 31 PID 3008 wrote to memory of 2788 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 31 PID 3008 wrote to memory of 2904 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 32 PID 3008 wrote to memory of 2904 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 32 PID 3008 wrote to memory of 2904 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 32 PID 3008 wrote to memory of 2904 3008 2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe 32 PID 2904 wrote to memory of 2368 2904 iexplore.exe 33 PID 2904 wrote to memory of 2368 2904 iexplore.exe 33 PID 2904 wrote to memory of 2368 2904 iexplore.exe 33 PID 2904 wrote to memory of 2368 2904 iexplore.exe 33 PID 2788 wrote to memory of 1504 2788 iexplore.exe 34 PID 2788 wrote to memory of 1504 2788 iexplore.exe 34 PID 2788 wrote to memory of 1504 2788 iexplore.exe 34 PID 2788 wrote to memory of 1504 2788 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exeC:\Users\Admin\AppData\Local\Temp\2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275458 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cc55ab330354ec35d277b13d6055aa7
SHA15eef5d97fd3940a9ed14c355f0791d790475d8ee
SHA25659baccbc5206253c3f5bb70ff4a428dd689eced0f958539948f9644f324dc193
SHA512b24abb22bb7bbea876b2a814a6005f304d88ae389cb38c67e3d189141697331cfe429d47d2ee07296119fe0538779e3e6c48dcb183d6c04af7cb0766b221de42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e50fcef14417cb462662e1d6a23db85
SHA115570318013c94205ea22114979d9bb13e4dd6a9
SHA25633ee817bc0471e69e7e84fcf503809f16e1079e2b81e422e95255c1ab3896167
SHA5124252d5b6a3834b1064093a35ae99194a54fcd40bf3a6194ddb9afac52d80273c1228917fdf4e8e56922168f15dc95950f21aa14a46f7cd84f0a8267ae30625e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54328ea4e7909457469a34893abc35890
SHA1fb1e6851ef58191e8df80f2fa98f217e8a64e103
SHA256eff511e77e469f63100a6ca182b98ae66d1bb177e645d4ca76f311b80b0e5c35
SHA512ad014c778cd41052068506d7234c3c1278d2349a1193a990ec49b01e04ce4542cd8b565c4bd681944a8f5ebf13c58ebdb8adc7a88edfa3cfa1ac9f4b5e9ca3dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c1395edc3bb581842e286a20a006bd9
SHA13300b34ef215e7ad99cc3cf9719482094905a631
SHA256bfa7a56c06aec15ff088327a5d150e3b6d2f55df55b2d6a8dc7e61458adeefd9
SHA512cad604854cc1804480261180c2cfeebc379922bc86a13ac1bca85acd96ff2352e29dfb0e226040ffdcc8cb11399fdbe7b46b9883b95a68ea7bb12073bc4e5e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5123bd7704480cd2c93e81fc51967081c
SHA1b9581b57f1fb0a063f403425c111bba109923196
SHA25691b99a385a92ea9f2a28668461ce83b7a37b25894a9b121b0adcf8b48215832c
SHA51234068ed152f4fc56758ac72c590d24444ba95c4b8b46299bf8050207028a930967b01fe65564b9d32616f214567b81755dee9e6caf27cb569f52156fe925db42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517851ff0277de175f58e8592f5b51add
SHA1eda63847f8c80b12c29452775d04466b7c9f3da3
SHA256ce4ca799c775d336ceceef61652c853418588619b05db5117d6fa6f8767e1c89
SHA512f0fbd090f5fb8d05cea123d7fdca3c6bbf301491e677e00e3d11bbde63892f05df01bc929f3c1fafec41e617820fedab5acf91b5a03a1cdf11557f2e38578f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51313024ad82611ddb8c9db8ea908d57e
SHA1904e46addc295f2a6889e6226f1f8759c32d86fc
SHA256b0a51493cd0843790158a15b2d28f5f33f0f41d7c65dea629038ebf245f847e0
SHA5122fc0fd72c03aeed1bf9d4655583f621b1e5ba1f84bc2ae563438dae72312dfe09b7957238f2acb4bccf4b43e5b66487e579e27348cb9a3e505230120b21c7dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5859c1399517ba53a79744a3949688d0d
SHA12457b4aae46848f56180dedfe73230e69e017346
SHA256368ff0fca13e83c3b0c4d7e80cfe24ac992ec0aafac4d5eb79730f631e3433cf
SHA512870d5c3b95d82b33bcb21569dbb65717642b000408c73bb9cf8405c48eaf87ea8ef7f23a52a7266cbbfc25d3b520c4ec4fd231bfc5ffff19cfcca9d03dc86747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ead3410475f205f5bee2529b1497f160
SHA1dc608cb704ea14ca3cafce7cef0255cae7aa964e
SHA25662dc2a8bc5520216394691f4b4b3289f955a3cf7dfa592c09b05e44bb4defd6f
SHA512efed30558741d833e13724744e7e88a212c1a1d9040c38907f787ba6c1e0ce3bb59c79602339e65ae0eadde830480905cd37d552cd6b59af58d2441b5b00b2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eae4b8f6d676d714213263e24ebc120f
SHA111219c14c4acbd394e72b39a3815b09a86dc4c36
SHA256691d14fa0ab1418c26bee633a58f7e6b1b1f28cc76e470f5e0736709005ba165
SHA512d0ef9e5a0447248d6e34051ef95463cb5717a2f4c964b5983a9a9245e41c9a0a37a045deac6c0f18388aea94afb79fdbf6bc5aba7ee5fa8e9da20b68d8143fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5560ab7f78e8c44666f05663cc92bec8c
SHA10b525fac97303342ffa5020f5ba20ae84fedf80f
SHA2564543e2928678cfac66b865c516f491f59472e6190092b98f2755c26a812c2748
SHA512f54245baa804abe7b009df71c8a7a29051eeb63873ff6f85c1299c2d9c2c4f8a75afca27a25c974dfadadd75133e214b40c5b2359312da2bd549d0f5a1309493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa1ceb54aef88a8cf81a59782dde8634
SHA13f9a7b7b381583f1935587e5dcc8e1eec2c4814a
SHA256a4d794fa8de0ec3536202e01088a980c9fa755fa7a5b2a5d11a8aa9fc7cdcc0d
SHA512ee1db9a1c61bae4f6a7026187725713406ff86c94b6189fc15d1fc0682e03ff3c1fcac023e658c20661cf7487e403fd058b8c8bcf3f06a0a5ced67f12ca6578b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dfc34db89d72f8f0cfe0e2af6160a72
SHA1cee2243257c75d6fcc4be8426157f0ee18899b2d
SHA2563e4b68e4e6d10075622d2db5df2319899870c0ab142f6a91488443b50c11da5b
SHA512923960a169bfeccb2bac37467aa3d47b7e8b828fd5e7b0301836d149c00ac7ebb3bdc4167350ab39d4bc926860bceedef46414658b5a047d14368c6f4665729a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5676d0f7f36511fe52468e86b4f79b082
SHA1c5071aab313efc2dc95931d6cec14c751c5372cd
SHA2568f7882064f743a7c6f5ec087921a2f7f4a77126483b8ce45c4bf8e1cc04c8987
SHA51221190925b3d138126e2e3d71e31ebff865ba5029881a9e91f415e54923201170fc9c80cd3e470bc9933b218ec0093d2b45953418be2006a08e6173ed4335f79e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e195b529b4eb88301282d967d9f8667
SHA12f303cfdfc229bb6c4a4d6b76df3706f4730e4f2
SHA25647d9af5edd08291eb96401d6ba0735eb9ae7284cdce88ac24aac349d967fd612
SHA512afa9b54e005909cfe621ee44c0ef588126f18b8aaba6f3d8f6792257881b41cc82444d8c22d5ed98ccb3b2f75128a6a0f48575c882f22bb7969ff4fac5ea66a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ebdc6aa60bc0a3c8ac9cee73c990980
SHA18639c399cbc8e89832c87ebce12634038d3e47bf
SHA256e27383f033bb4871fdfc602d267c8a34ab05f7b065cc15a1e9629a84269e5461
SHA512ff5876e75099fe4e1ab30584d188933a0d94e3816bf420179e8ceb719d322897000e17903368fcda6d0618a0c9841f40991b9038f416c75e1e955c428f7befbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce619de9bffbf4cfc3a9e9d841c2ee05
SHA1032ca68fe2b5b2a6b5bb96d3125a6977e04b6bc3
SHA25664818b6ae3dcd4958ed7fc2e6f23ab4cb0955e4417836dd2f79403a791a36ade
SHA51221bc466bc18414ee32b0bcd08b8b23df08672a06cdc232a95fdbd0df8df281e84586925af249843c7d7ce838378114faaa2a7f0fc07ef0c583d620c4b8e8c808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a6a59aaceb611acfd20c9837c567cb
SHA1fdb8cbf244ba1ad1eaa9749eb3e9f8909d9c5050
SHA25624ea4c8c174083e36c8d46b285437e8179d1d0575d1fffc5d6d8be9f1e6ac794
SHA51200896cdc366155200f91a48ad03da622fdc4d661954bb2dd6a744461852489a79165c44c6f786744d48dad27bc74faa39692706e87a8d023f1acf21b0fe0655c
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B63073E1-F4D9-11EF-AE85-F245C6AC432F}.dat
Filesize5KB
MD52cf617d8e3d6a55e89bf7b61058883c2
SHA1046226a2215c95e7673369da1e7390acaeeb6c36
SHA2560beaac31c2c9360c2b84b2826f3a18bd27ff31ec2a9692b76b0c6ca49c8b9e23
SHA512575a351ece7f60bffaf2df90f7ed95784b7690aee94b7c1b5872a1d72abdc66a52989651eb7a33ff00b53aa13572dea367000759832a21bc5694fbbdf9e265ee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
\Users\Admin\AppData\Local\Temp\2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatchmgr.exe
Filesize105KB
MD5d5ca6e1f080abc64bbb11e098acbeabb
SHA11849634bf5a65e1baddddd4452c99dfa003e2647
SHA25630193b5ccf8a1834eac3502ef165350ab74b107451145f3d2937fdf24b9eceae
SHA512aa57ce51de38af6212d7339c4baac543a54b0f527621b0ef9e78eca5e5699e8508a154f54f8ac04135527d8417275eeee72a502a362547575699330cc756b161