Analysis

  • max time kernel
    209s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2023 15:02

General

  • Target

    https://dl.pentestcore.com/dl.php?url=up/upload-wp/2020/12/H-Pro-v1.17-PentestCore.rar

Malware Config

Extracted

Path

C:\Program Files\WinRAR\WhatsNew.txt

Ransom Note
WinRAR - What's new in the latest version Version 6.21 1. Both file and folder modification timestamps are restored when unpacking TAR and TAR based archives like tar.gz and tar.bz2. Previously only file modification timestamps were set for these archive formats. 2. Added decompression of .tar.zst archives with dictionary exceeding 128 MB. WinRAR 6.20 allowed such dictionary for .zst, but not for .tar.zst. 3. Switches -ed and -e+d are also supported by ZIP archives. Previously they worked only for RAR archives. 4. Bugs fixed: a) if unencrypted file was stored after encrypted in the same RAR archive and both files had been unpacked in the same extraction command, WinRAR 6.20 failed to unpack the unencrypted file; b) in some cases a wrong detailed reason of file open error could be displayed in the second line of open error message. Version 6.20 1. If "Autodetect passwords" option in "Organizer passwords" dialog is enabled and password matching a processing archive is present among saved passwords, it is applied automatically. This option is applicable only for archives in RAR 5.0 and ZIP formats, which allow to verify the password validity quickly. There is a minor chance of incorrect password detection for ZIP archives if stored passwords do not include a proper one. If encrypted ZIP archive extraction fails, you can try to disable this option, repeat extraction and enter a valid password manually. 2. If extraction command involves only a part of files in RAR archive, the additional archive analysis is performed when starting extraction. It helps to properly unpack file references even if reference source is not selected. It works for most of RAR archives except for volumes on multiple removable media and archives containing a very large number of references. Also in some cases such analysis may help to optimize the amount of processing data when extracting individual files from semi-solid archives created with -s<N> and -se switches. 3. "Save original archive name and time" option on "Options" page of archiving dialog allows to save the original archive name and creation time. If archive includes such saved name and time, they are displayed on "Info" page of "Show information" command and can be restored on "Options" page of same command. Restoring involves renaming an archive to original name and setting the saved time as the archive creation and modification time. Switch -ams or just -am together with archive modification commands can be used to save the archive name and time in the command line mode. These saved parameters are displayed in header of "l" and "v" commands output and can be restored with -amr switch combined with "ch" command, such as "rar ch -amr arc.rar". If -amr is specified, "ch" ignores other archive modification switches. 4. Faster RAR5 compression of poorly compressible data on modern CPUs with 8 or more execution threads. This applies to all methods except "Fastest", which performance remains the same. 5. "Repair" command efficiency is improved for shuffled data blocks in recovery record protected RAR5 archives. 6. If file size has grown after archiving when creating non-solid RAR volumes, such file is stored without compression regardless of volume number, provided that file isn't split between volumes. Previously it worked only for files in the first volume. 7. Added decompression of .zipx archives containing file references, provided that both reference source and target are selected and reference source precedes the target inside of archive. Typically, if .zipx archive includes file references, it is necessary to unpack the entire archive to extract references successfully. 8. Added decompression of .zst long range mode archives with dictionary exceeding 128 MB. Previously it was possible to decompress them only if dictionary was 128 MB or less. 9. If "Turn PC off", "Hibernate", "Sleep" or "Restart PC" archiving options are enabled in WinRAR, a prompt to confirm or cancel such power management action is displayed directly before starting it. If no selection was made by user for 30 seconds, the proposed action is confirmed and started automatically. This prompt is also displayed for -ioff switch in WinRAR command line, but not in console RAR command line. 10. Context menu in WinRAR file list provides "Open in internal viewer" command for archive files. It can be helpful if you wish to view the archive raw data in internal viewer. For example, to read an email archive with UUE attachments included. Usual "View" command always displays the archive contents. If file is recognized as UUE archive, "View" would show UUE attachments. 11. Recovery record size is displayed on "Archive" page of file properties invoked from Explorer context menu for archives in RAR5 format. Previously there was only "Present" instead of exact size for RAR5 archives. 12. When archiving from stdin with -si switch, RAR displays the current amount of read bytes as the progress indicator. 13. If wrong password is specified when adding files to encrypted solid RAR5 archive, a password will be requested again. Previous versions cancelled archiving in this case. 14. If both options "Test archived files" and "Clear attribute "Archive" after compressing" or their command line -t -ac equivalents are enabled when archiving, "Archive" attribute will be cleared only if test was completed successfully. Previously it was cleared even when test reported errors. 15. NoDrives value containing the bit mask to hide drives can be now read from "HKEY_CURRENT_USER\Software\WinRAR\Policy" Registry key, which allows to include it to winrar.ini if necessary. Its "Software\Microsoft\Windows\CurrentVersion\Policies" locations in HKEY_CURRENT_USER and HKEY_LOCAL_MACHINE are also supported. Previously only "Software\Microsoft\Windows\CurrentVersion\Policies" in HKEY_CURRENT_USER was recognized. 16. Bugs fixed: a) archive modification commands could fail for some ZIP archives with file comments; b) fixed a memory leak when reading contents of .tar.bz2 archives; c) if source and resulting archive format is the same, the archive conversion command didn't set the original archive time to a newly created archive even if "Original archive time" option was selected in archiving parameters; d) if "Merge volumes contents" option in "Settings/File list" was turned on, the folder packed size in WinRAR file list could be less than expected when browsing a multivolume archive contents. It didn't include the packed size of file parts continuing from previous volume into calculation; e) even if "Set file security" extraction option was turned off by default, extraction commands in Explorer context menu still attempted to restore NTFS file security data; f) WinRAR could read data beyond the end of buffer and crash when unpacking files from specially crafted ZIP archive. We are thankful to Bakker working with Trend Micro Zero Day Initiative for letting us know about this bug. Version 6.11 1. Added support for Gz archives with large archive comments. Previously the extraction command failed to unpack gz archives if comment size exceeded 16 KB. 2. Archive comments in gz archives are displayed in the comment window and recognized by "Show information" command. Large comments are shown partially. Previous versions didn't display Gzip comments. 3. Reserved device names followed by file extension, such as aux.txt, are extracted as is in Windows 11 even without "Allow potentially incompatible names" option or -oni command line switch. Unlike previous Windows versions, Windows 11 treats such names as usual files. Device names without extension, such as aux, still require these options to be unpacked as is regardless of Windows version. 4. Switch -mes can be also used to suppress the password prompt and abort when adding files to encrypted solid archive. 5. Additional measures to prevent extracting insecure links are implemented. 6. Bugs fixed: a) if password exceeding 127 characters was entered when unpacking an encrypted archive with console RAR, text after 127th character could be erroneously recognized as user's input by different prompts issued later; b) wrong archived file time could be displayed in overwrite prompt when extracting a file from ZIP archive. It happened if such archive included extended file times and was created in another time zone. It didn't affect the actual file time, which was set properly upon extraction. Version 6.10 1. WinRAR can unpack contents of .zst and .zipx archives utilizing Zstandard algorithm. 2. Added support of Windows 11 Explorer context menus. Beginning from Windows 11, an application can add only a single top level command or submenu to Explorer context menu. If "Cascaded context menus" in "Integration settings" dialog is on, this single item is a submenu storing all necessary WinRAR commands. If this option is off, only one extraction command for archives and one archiving command for usual files are available. You can select these commands with "Context menu items..." button in "Integration settings" dialog. 3. "Legacy context menus" option in "Settings/Integration" dialog can be used in Windows 11 if WinRAR commands are missing in "Show more options" Windows legacy context menu or in context menus of third party file managers. If WinRAR commands are already present here, keep "Legacy context menus" option turned off to prevent duplicating them. This option is not available in Windows 10 and older. 4. Windows XP is not supported anymore. Minimum required operating system version is Windows Vista. 5. "Close" item is added to "When done" list on "Advanced" page of archiving dialog. It closes WinRAR window, when archiving is done. 6. "When done" list is added to "Options" page of extraction dialog. It allows to select an action like turning a computer off or closing WinRAR after completing extraction. 7. Switch -si can be used when extracting or testing to read archive data from stdin, such as: type docs.rar | rar x -si -o+ -pmypwd dummy docs\ Even though the archive name is ignored with this switch, an arbitrary dummy archive name has to specified in the command line. Operations requiring backward seeks are unavailable in this mode. It includes displaying archive comments, testing the recovery record, utilizing the quick open information, processing multivolume archives. Prompts requiring user interaction are not allowed. Use -o[+|-|r], -p<pwd> or -mes switches to suppress such prompts. 8. New -ep4<path> switch excludes the path prefix when archiving or extracting if this path is found in the beginning of archived name. Path is compared with names already prepared to store in archive, without drive letters and leading path separators. For example: rar a -ep4texts\books archive c:\texts\books\technical removes "text\books" from archived names, so they start from 'technical'. 9. New -mes switch skips encrypted files when extracting or testing. It replaces the former -p- switch. 10. New -op<path> switch sets the destination folder for 'x' and 'e' extraction commands. Unlike <path_to_extract\> command line parameter, this switch also accepts paths without trailing path separator character. 11. If 'p' command is used to print a file to stdout, informational messages are suppressed automatically to prevent them mixing with file data. 12. "Generate archive name by mask" option and switch -ag treat only first two 'M' characters after 'H' as minutes. Previously any amount of such characters was considered as minutes. It makes possible to place the time field before the date, like -agHHMM-DDMMYY. Previous versions considered all 'M' in this string as minutes. 13. Maximum allowed size of RAR5 recovery record is increased to 1000% of protected data size. Maximum number of RAR5 recovery volumes can be 10 times larger than protected RAR volumes. Previous WinRAR versions are not able to use the recovery record to repair broken archives if recovery record size exceeds 99%. Similarly, previous versions cannot use recovery volumes if their number is equal or larger than number of RAR volumes. 14. Warning is issued if entered password exceeds the allowed limit of 127 characters and is truncated. Previously such passwords had been truncated silently. 15. If archive includes reserved device names, the underscore character is inserted in the beginning of such names when extracting. For example, aux.txt is converted to _aux.txt. It is done to prevent compatibility problems with software unable to process such names. You can use "Allow potentially incompatible names" option in "Advanced" part of extraction dialog or command line -oni switch to avoid this conversion. 16. WinRAR attempts to reset the file cache before testing an archive. It helps to verify actual data written to disk instead of reading a cached copy. 17. Multiple -v<size> switches specifying different sizes for different volumes are now allowed also for ZIP archives: WinRAR a -v100k -v200k -v300k arcname.zip Previously multiple -v<size> switches were supported only for RAR archives. 18. Switches -sl<size> and -sm<size> can be used in WinRAR.exe command line mode when extracting archives in any supported formats, provided that such archive includes unpacked file sizes. Previously these switches could filter files by size only in RAR and ZIP archives. 19. Newer folder selection dialog is invoked when pressing "Browse" button in WinRAR "Settings/Paths" page, "Repair" and "Convert" commands, also as in few other similar places. Previously a simpler XP style folder selection dialog was opened. 20. When restoring from tray after completing an operation, WinRAR window is positioned under other opened windows, to not interfere with current user activities. 21. "650 MB CD" is removed and "2 GB volumes" is added to the list of predefined volume sizes in "Define volume sizes" dialog invoked from WinRAR "Settings/Compression". 22. "Rename" command selects the file name part up to the final dot. Previously it selected the entire name. 23. If SFX archive size exceeds 4 GB, an error message is issued during compression, immediately after exceeding this threshold. Previously this error was reported only after completing compression. Executables of such size cannot be started by Windows. 24. Command line -en switch is not supported anymore. It created RAR4 archives without the end of archive record. End of archive record permits to gr
URLs

https

http

http://weirdsgn.com

http://icondesignlab.com

https://rarlab.com/themes/WinRAR_Classic_48x36.theme.rar

https://technet.microsoft.com/en-us/library/security/ms14-064.aspx

http://rarlab.com/vuln_sfx_html2.htm

https://blake2.net

Extracted

Path

C:\Program Files\WinRAR\Rar.txt

Ransom Note
User's Manual ~~~~~~~~~~~~~ RAR 6.21 console version ~~~~~~~~~~~~~~~~~~~~~~~~ =-=-=-=-=-=-=-=-=-=-=-=-=-=- Welcome to the RAR Archiver! -=-=-=-=-=-=-=-=-=-=-=-=-=-= Introduction ~~~~~~~~~~~~ RAR is a console application allowing to manage archive files in command line mode. RAR provides compression, encryption, data recovery and many other functions described in this manual. RAR supports only RAR format archives, which have .rar file name extension by default. ZIP and other formats are not supported. Even if you specify .zip extension when creating an archive, it will still be in RAR format. Windows users may install WinRAR, which supports more archive types including RAR and ZIP formats. WinRAR provides both graphical user interface and command line mode. While console RAR and GUI WinRAR have the similar command line syntax, some differences exist. So it is recommended to use this rar.txt manual for console RAR (rar.exe in case of Windows version) and winrar.chm WinRAR help file for GUI WinRAR (winrar.exe). Configuration file ~~~~~~~~~~~~~~~~~~ RAR and UnRAR for Unix read configuration information from .rarrc file in a user's home directory (stored in HOME environment variable) or in /etc directory. RAR and UnRAR for Windows read configuration information from rar.ini file, placed in the same directory as the rar.exe file. This file can contain the following string: switches=<any RAR switches separated by spaces> For example: switches=-m5 -s It is also possible to specify separate switch sets for individual RAR commands using the following syntax: switches_<command>=<any RAR switches separated by spaces> For example: switches_a=-m5 -s switches_x=-o+ Environment variable ~~~~~~~~~~~~~~~~~~~~ Default parameters may be added to the RAR command line by establishing an environment variable "RAR". For instance, in Unix following lines may be added to your profile: RAR='-s -md1024' export RAR RAR will use this string as default parameters in the command line and will create "solid" archives with 1024 MB sliding dictionary size. RAR handles options with priority as following: command line switches highest priority switches in the RAR variable lower priority switches saved in configuration file lowest priority Log file ~~~~~~~~ If switch -ilog is specified in the command line or configuration file, RAR will write informational messages about errors encountered while processing archives into a log file. Read the switch -ilog description for more details. The file order list for solid archiving - rarfiles.lst ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ rarfiles.lst contains a user-defined file list, which tells RAR the order in which to add files to a solid archive. It may contain file names, wildcards and special entry - $default. The default entry defines the place in order list for files not matched with other entries in this file. The comment character is ';'. In Windows this file should be placed in the same directory as RAR or in %APPDATA%\WinRAR directory, in Unix - to the user's home directory or in /etc. Tips to provide improved compression and speed of operation: - similar files should be grouped together in the archive; - frequently accessed files should be placed at the beginning. Normally masks placed nearer to the top of list have a higher priority, but there is an exception from this rule. If rarfiles.lst contains such two masks that all files matched by one mask are also matched by another, that mask which matches a smaller subset of file names will have higher priority regardless of its position in the list. For example, if you have *.cpp and f*.cpp masks, f*.cpp has a higher priority, so the position of 'filename.cpp' will be chosen according to 'f*.cpp', not '*.cpp'. RAR command line syntax ~~~~~~~~~~~~~~~~~~~~~~~ Syntax RAR <command> [ -<switches> ] <archive> [ <@listfiles...> ] [ <files...> ] [ <path_to_extract\> ] Description Command is a single character or string specifying an action to be performed by RAR. Switches are designed to modify the way RAR performs such action. Other parameters are archive name and files to be archived or extracted. Listfiles are plain text files containing names of files to process. File names must start at the first column. It is possible to put comments to the listfile after // characters. For example, you can create backup.lst containing the following strings: c:\work\doc\*.txt //backup text documents c:\work\image\*.bmp //backup pictures c:\work\misc and then run: rar a backup @backup.lst If you wish to read file names from stdin (standard input), specify the empty listfile name (just @). By default, console RAR uses the single byte encoding in list files, but it can be redefined with -sc<charset>l switch. You can specify both usual file names and list files in the same command line. If neither files nor listfiles are specified, then *.* is implied and RAR will process all files. path_to_extract includes the destination directory name followed by a path separator character. For example, it can be c:\dest\ in Windows or data/ in Unix. It specifies the directory to place extracted files in 'x' and 'e' commands. This directory is created by RAR if it does not exist yet. Alternatively it can be set with -op<path> switch. Many RAR commands, such as extraction, test or list, allow to use wildcards in archive name. If no extension is specified in archive mask, RAR assumes .rar, so * means all archives with .rar extension. If you need to process all archives without extension, use *. mask. *.* mask selects all files. Wildcards in archive name are not allowed when archiving and deleting. In Unix you need to enclose RAR command line parameters containing wildcards in single or double quotes to prevent their expansion by Unix shell. For example, this command will extract *.asm files from all *.rar archives in current directory: rar e '*.rar' '*.asm' Command could be any of the following: a Add files to archive. Examples: 1) add all *.hlp files from the current directory to the archive help.rar: rar a help *.hlp 2) archive all files from the current directory and subdirectories to 362000 bytes size solid, self-extracting volumes and add the recovery record to each volume: rar a -r -v362 -s -sfx -rr save Because no file names are specified, all files (*) are assumed. 3) as a special exception, if directory name is specified as an argument and if directory name does not include file masks and trailing path separator, the entire contents of the directory and all subdirectories will be added to the archive even if switch -r is not specified. The following command will add all files from the directory Bitmaps and its subdirectories to the RAR archive Pictures.rar: rar a Pictures.rar Bitmaps 4) if directory name includes the trailing path separator, normal rules apply and you need to specify switch -r to process its subdirectories. The following command will add all files from directory Bitmaps, but not from its subdirectories, because switch -r is not specified: rar a Pictures.rar Bitmaps\* c Add archive comment. Comments are displayed while the archive is being processed. Comment length is limited to 256 KB. Examples: rar c distrib.rar Also comments may be added from a file using -z[file] switch. The following command adds a comment from info.txt file: rar c -zinfo.txt dummy ch Change archive parameters. This command can be used with most of archive modification switches to modify archive parameters. It is especially convenient for switches like -cl, -cu, -tl, which do not have a dedicated command. It is not able to recompress, encrypt or decrypt archive data and it cannot merge or create volumes. If no switches are specified, 'ch' command just copies the archive data without modification. If used with -amr switch to restore the saved archive name and time, other archive modification switches are ignored. Example: Set archive time to latest file: rar ch -tl files.rar cw Write archive comment to specified file. Format of output file depends on -sc switch. If output file name is not specified, comment data will be sent to stdout. Examples: 1) rar cw arc comment.txt 2) rar cw -scuc arc unicode.txt 3) rar cw arc d Delete files from archive. If this command removes all files from archive, the empty archive is removed. e Extract files without archived paths. Extract files excluding their path component, so all files are created in the same destination directory. Use 'x' command if you wish to extract full pathnames. Example: rar e -or html.rar *.css css\ extract all *.css files from html.rar archive to 'css' directory excluding archived paths. Rename extracted files automatically in case several files have the same name. f Freshen files in archive. Updates archived files older than files to add. This command will not add new files to the archive. i[i|c|h|t]=<string> Find string in archives. Supports following optional parameters: i - case insensitive search (default); c - case sensitive search; h - hexadecimal search; t - use ANSI, UTF-8, UTF-16 and OEM (Windows only) character tables; If no parameters are specified, it is possible to use the simplified command syntax i<string> instead of i=<string> It is allowed to specify 't' modifier with other parameters, for example, ict=string performs case sensitive search using all mentioned above character tables. Examples: 1) rar "ic=first level" -r c:\*.rar *.txt Perform case sensitive search of "first level" string in *.txt files in *.rar archives on the disk c: 2) rar ih=f0e0aeaeab2d83e3a9 -r e:\texts\*.rar Search for hex string f0 e0 ae ae ab 2d 83 e3 a9 in rar archives in e:\texts directory. k Lock archive. RAR cannot modify locked archives, so locking important archives prevents their accidental modification by RAR. Such protection might be especially useful in case of RAR commands processing archives in groups. This command is not intended or able to prevent modification by other tools or willful third party. It implements a safety measure only for accidental data change by RAR. Example: rar k final.rar l[t[a],b] List archive contents [technical [all], bare]. 'l' command lists archived file attributes, size, date, time and name, one file per line. If file is encrypted, line starts from '*' character. 'lt' displays the detailed file information in multiline mode. This information includes file checksum value, host OS, compression options and other parameters. 'lta' provide the detailed information not only for files, but also for service headers like NTFS streams or file security data. 'lb' lists bare file names with path, one per line, without any additional information. You can use -v switch to list contents of all volumes in volume set: rar l -v vol.part1.rar Commands 'lt', 'lta' and 'lb' are equal to 'vt', 'vta' and 'vb' correspondingly. m[f] Move to archive [files only]. Moving files and directories results in the files and directories being erased upon successful completion of the packing operation. Directories will not be removed if 'f' modifier is used and/or '-ed' switch is applied. p Print file to stdout. Send unpacked file data to stdout. Informational messages are suppressed with this command, so they are not mixed with file data. r Repair archive. Archive repairing is performed in two stages. First, the damaged archive is searched for a recovery record (see 'rr' command). If archive contains the previously added recovery record and if damaged data area is continuous and smaller than error correction code size in recovery record, chance of successful archive reconstruction is high. When this stage has been completed, a new archive is created, named as fixed.arcname.rar, where 'arcname' is the original (damaged) archive name. If broken archive does not contain a recovery record or if archive is not completely recovered due to major damage, second stage is performed. During this stage only the archive structure is reconstructed and it is impossible to recover files which fail checksum validation, it is still possible, however, to recover undamaged files, which were inaccessible due to the broken archive structure. Mostly this is useful for non-solid archives. This stage is never efficient for archives with encrypted file headers, which can be repaired only if recovery record is present. When the second stage is completed, the reconstructed archive is saved as rebuilt.arcname.rar, where 'arcname' is the original archive name. By default, repaired archives are created in the current directory, but you can append an optional destpath\ parameter to specify another destination directory. Example: rar r buggy.rar c:\fixed\ repair buggy.rar and place the result to 'c:\fixed' directory. rc Reconstruct missing and damaged volumes using recovery volumes (.rev files). You need to specify any existing .rar or .rev volume as the archive name. Example: rar rc backup.part03.rar Read 'rv' command description for information about recovery volumes. rn Rename archived files. The command syntax is: rar rn <arcname> <srcname1> <destname1> ... <srcnameN> <destnameN> For example, the following command: rar rn data.rar readme.txt readme.bak info.txt info.bak will rename readme.txt to readme.bak and info.txt to info.bak in the

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 7 IoCs
  • Modifies system executable filetype association 2 TTPs 8 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 56 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://dl.pentestcore.com/dl.php?url=up/upload-wp/2020/12/H-Pro-v1.17-PentestCore.rar
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcec559758,0x7ffcec559768,0x7ffcec559778
      2⤵
        PID:2032
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:2
        2⤵
          PID:3716
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
          2⤵
            PID:4236
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
            2⤵
              PID:2700
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:1
              2⤵
                PID:3132
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3196 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:1
                2⤵
                  PID:432
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4520 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:1
                  2⤵
                    PID:1116
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5176 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:1
                    2⤵
                      PID:4140
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                      2⤵
                        PID:688
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5408 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                        2⤵
                          PID:1644
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                          2⤵
                            PID:1180
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                            2⤵
                              PID:936
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                              2⤵
                                PID:1172
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                                2⤵
                                  PID:1304
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4064 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:1
                                  2⤵
                                    PID:4060
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5548 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:1
                                    2⤵
                                      PID:3940
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5364 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                                      2⤵
                                        PID:4776
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6116 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                                        2⤵
                                          PID:4464
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=6076 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:1
                                          2⤵
                                            PID:3336
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5200 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:1
                                            2⤵
                                              PID:988
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3392 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:1
                                              2⤵
                                                PID:4432
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5468 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                                                2⤵
                                                  PID:2880
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5456 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                                                  2⤵
                                                    PID:2940
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6256 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                                                    2⤵
                                                      PID:620
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=820 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                                                      2⤵
                                                        PID:5016
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3372 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                                                        2⤵
                                                          PID:1828
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                                                          2⤵
                                                            PID:3880
                                                          • C:\Users\Admin\Downloads\winrar-x64-621.exe
                                                            "C:\Users\Admin\Downloads\winrar-x64-621.exe"
                                                            2⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Drops file in Program Files directory
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2948
                                                            • C:\Program Files\WinRAR\uninstall.exe
                                                              "C:\Program Files\WinRAR\uninstall.exe" /setup
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Modifies system executable filetype association
                                                              • Registers COM server for autorun
                                                              • Drops file in Program Files directory
                                                              • Modifies registry class
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2940
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=4920 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:1
                                                            2⤵
                                                              PID:2624
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=6056 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:1
                                                              2⤵
                                                                PID:4760
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6188 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                                                                2⤵
                                                                  PID:4372
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4880 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:8
                                                                  2⤵
                                                                    PID:3552
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=6032 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:1
                                                                    2⤵
                                                                      PID:4908
                                                                    • C:\Program Files\WinRAR\WinRAR.exe
                                                                      "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\Admin\Downloads\H-Pro-v1.17-PentestCore.rar"
                                                                      2⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Modifies Internet Explorer settings
                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1088
                                                                      • C:\Users\Admin\AppData\Local\Temp\Rar$EXb1088.5386\Havij-Pro-v1.17-PentestCore\Havij 1.17 Pro.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Rar$EXb1088.5386\Havij-Pro-v1.17-PentestCore\Havij 1.17 Pro.exe"
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        PID:3840
                                                                        • C:\Users\Admin\AppData\Local\Temp\is-UJ7MS.tmp\Havij 1.17 Pro.tmp
                                                                          "C:\Users\Admin\AppData\Local\Temp\is-UJ7MS.tmp\Havij 1.17 Pro.tmp" /SL5="$B0208,6394355,53248,C:\Users\Admin\AppData\Local\Temp\Rar$EXb1088.5386\Havij-Pro-v1.17-PentestCore\Havij 1.17 Pro.exe"
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Drops file in Program Files directory
                                                                          • Modifies registry class
                                                                          PID:4276
                                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                                            "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\RICHTX32.ocx"
                                                                            5⤵
                                                                            • Loads dropped DLL
                                                                            • Modifies registry class
                                                                            PID:1184
                                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                                            "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\Mscomctl.ocx"
                                                                            5⤵
                                                                            • Loads dropped DLL
                                                                            • Modifies registry class
                                                                            PID:4144
                                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                                            "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\Mswinsck.ocx"
                                                                            5⤵
                                                                            • Loads dropped DLL
                                                                            • Modifies registry class
                                                                            PID:1180
                                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                                            "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\comdlg32.ocx"
                                                                            5⤵
                                                                            • Loads dropped DLL
                                                                            • Modifies registry class
                                                                            PID:4800
                                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                                            "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\MSInet.ocx"
                                                                            5⤵
                                                                            • Loads dropped DLL
                                                                            • Modifies registry class
                                                                            PID:4852
                                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                                            "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\tabctl32.ocx"
                                                                            5⤵
                                                                            • Loads dropped DLL
                                                                            • Modifies registry class
                                                                            PID:4900
                                                                          • C:\Program Files (x86)\ITSecTeam\Havij Pro\Havij.exe
                                                                            "C:\Program Files (x86)\ITSecTeam\Havij Pro\Havij.exe"
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            • Writes to the Master Boot Record (MBR)
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:2888
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5544 --field-trial-handle=1788,i,11041085097321809728,121993268048030212,131072 /prefetch:2
                                                                      2⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:1768
                                                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                    1⤵
                                                                      PID:3416
                                                                    • C:\Windows\system32\OpenWith.exe
                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                      1⤵
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1892
                                                                    • C:\Windows\System32\rundll32.exe
                                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                      1⤵
                                                                        PID:2468

                                                                      Network

                                                                      MITRE ATT&CK Matrix ATT&CK v6

                                                                      Persistence

                                                                      Change Default File Association

                                                                      1
                                                                      T1042

                                                                      Registry Run Keys / Startup Folder

                                                                      1
                                                                      T1060

                                                                      Bootkit

                                                                      1
                                                                      T1067

                                                                      Defense Evasion

                                                                      Modify Registry

                                                                      2
                                                                      T1112

                                                                      Discovery

                                                                      Query Registry

                                                                      3
                                                                      T1012

                                                                      System Information Discovery

                                                                      3
                                                                      T1082

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Program Files (x86)\ITSecTeam\Havij Pro\Havij.exe
                                                                        Filesize

                                                                        719KB

                                                                        MD5

                                                                        9283a910bbf58a143ca8376eadfd1baa

                                                                        SHA1

                                                                        5000d77563417977a2559085fb8d62ddcfe18708

                                                                        SHA256

                                                                        5608c4b096dc812d9bb714e89421f54ed9559bd319224efeb55f7f10b80e60be

                                                                        SHA512

                                                                        eb7f0323b440211a47a41e9d6f293c8e10fcfffa84a8a1fa2ba0b6083f801d7394ebcbfbd949d5f378672d5d9b54dada6186ef59f8804f3969504e262f55b0fa

                                                                      • C:\Program Files (x86)\ITSecTeam\Havij Pro\Havij.exe
                                                                        Filesize

                                                                        719KB

                                                                        MD5

                                                                        9283a910bbf58a143ca8376eadfd1baa

                                                                        SHA1

                                                                        5000d77563417977a2559085fb8d62ddcfe18708

                                                                        SHA256

                                                                        5608c4b096dc812d9bb714e89421f54ed9559bd319224efeb55f7f10b80e60be

                                                                        SHA512

                                                                        eb7f0323b440211a47a41e9d6f293c8e10fcfffa84a8a1fa2ba0b6083f801d7394ebcbfbd949d5f378672d5d9b54dada6186ef59f8804f3969504e262f55b0fa

                                                                      • C:\Program Files (x86)\ITSecTeam\Havij Pro\Havij.exe
                                                                        Filesize

                                                                        719KB

                                                                        MD5

                                                                        9283a910bbf58a143ca8376eadfd1baa

                                                                        SHA1

                                                                        5000d77563417977a2559085fb8d62ddcfe18708

                                                                        SHA256

                                                                        5608c4b096dc812d9bb714e89421f54ed9559bd319224efeb55f7f10b80e60be

                                                                        SHA512

                                                                        eb7f0323b440211a47a41e9d6f293c8e10fcfffa84a8a1fa2ba0b6083f801d7394ebcbfbd949d5f378672d5d9b54dada6186ef59f8804f3969504e262f55b0fa

                                                                      • C:\Program Files\WinRAR\Rar.txt
                                                                        Filesize

                                                                        109KB

                                                                        MD5

                                                                        e51d9ff73c65b76ccd7cd09aeea99c3c

                                                                        SHA1

                                                                        d4789310e9b7a4628154f21af9803e88e89e9b1b

                                                                        SHA256

                                                                        7456f489100ec876062d68d152081167ac00d45194b17af4a8dd53680acfc9bd

                                                                        SHA512

                                                                        57ab82d4a95d3b5d181c0ec1a1a1de56a4d6c83af5644032ff3af71e9bd8e13051ae274609bda8b336d70a99f2fba17331773694d7e98d4a7635f7b59651b77c

                                                                      • C:\Program Files\WinRAR\Uninstall.exe
                                                                        Filesize

                                                                        437KB

                                                                        MD5

                                                                        cac9723066062383778f37e9d64fd94e

                                                                        SHA1

                                                                        1cd78fc041d733f7eacdd447371c9dec25c7ef2c

                                                                        SHA256

                                                                        e187e1119350caa3aec9d531989f60452d0198368f19cf65ffd2194a8a4003ad

                                                                        SHA512

                                                                        2b3dc50fb5006f1f3beec1774d0927a0533b49d20122e49a0b4b41840f83c494376c8e61da735aa58d27453c44450203d5c2bb4f03fdd37b648ee0f51f925c59

                                                                      • C:\Program Files\WinRAR\Uninstall.exe
                                                                        Filesize

                                                                        437KB

                                                                        MD5

                                                                        cac9723066062383778f37e9d64fd94e

                                                                        SHA1

                                                                        1cd78fc041d733f7eacdd447371c9dec25c7ef2c

                                                                        SHA256

                                                                        e187e1119350caa3aec9d531989f60452d0198368f19cf65ffd2194a8a4003ad

                                                                        SHA512

                                                                        2b3dc50fb5006f1f3beec1774d0927a0533b49d20122e49a0b4b41840f83c494376c8e61da735aa58d27453c44450203d5c2bb4f03fdd37b648ee0f51f925c59

                                                                      • C:\Program Files\WinRAR\WhatsNew.txt
                                                                        Filesize

                                                                        103KB

                                                                        MD5

                                                                        4c88a040b31c4d144b44b0dc68fb2cc8

                                                                        SHA1

                                                                        bf473f5a5d3d8be6e5870a398212450580f8b37b

                                                                        SHA256

                                                                        6f1a005a0e5c765fcc68fe15f7ccd18667a6e583980e001ba7181aaaeed442b8

                                                                        SHA512

                                                                        e7f224a21d7c111b83775c778e6d9fa447e53809e0efd4f3ba99c7d6206036aa3dde9484248b244fb26789467559a40516c8e163d379e84dcf31ac84b4c5d2a8

                                                                      • C:\Program Files\WinRAR\WinRAR.chm
                                                                        Filesize

                                                                        317KB

                                                                        MD5

                                                                        381eae01a2241b8a4738b3c64649fbc0

                                                                        SHA1

                                                                        cc5944fde68ed622ebee2da9412534e5a44a7c9a

                                                                        SHA256

                                                                        ad58f39f5d429b5a3726c4a8ee5ccada86d24273eebf2f6072ad1fb61ea82d6e

                                                                        SHA512

                                                                        f7a8903ea38f2b62d6fa2cc755e0d972a14d00a2e1047e6e983902eff1d3a6bca98327c2b8ed47e46435d1156816e4b0d494726fce87b6cbe7722f5249889b88

                                                                      • C:\Program Files\WinRAR\WinRAR.exe
                                                                        Filesize

                                                                        2.4MB

                                                                        MD5

                                                                        46d15a70619d5e68415c8f22d5c81555

                                                                        SHA1

                                                                        12ec96e89b0fd38c469546042e30452b070e337f

                                                                        SHA256

                                                                        2e503ad5a9c800f2dac2fed2b3e8698d96d25b219ed86ed1a54896232cbe4781

                                                                        SHA512

                                                                        09446dc9d0c768844213f7f71ba65ee4e86b61d7a61610b63892d1b142952bdd346d14d27d878c026362e012e22fcb49c6746912d5e02db6b40223cafa6d01fb

                                                                      • C:\Program Files\WinRAR\WinRAR.exe
                                                                        Filesize

                                                                        2.4MB

                                                                        MD5

                                                                        46d15a70619d5e68415c8f22d5c81555

                                                                        SHA1

                                                                        12ec96e89b0fd38c469546042e30452b070e337f

                                                                        SHA256

                                                                        2e503ad5a9c800f2dac2fed2b3e8698d96d25b219ed86ed1a54896232cbe4781

                                                                        SHA512

                                                                        09446dc9d0c768844213f7f71ba65ee4e86b61d7a61610b63892d1b142952bdd346d14d27d878c026362e012e22fcb49c6746912d5e02db6b40223cafa6d01fb

                                                                      • C:\Program Files\WinRAR\uninstall.exe
                                                                        Filesize

                                                                        437KB

                                                                        MD5

                                                                        cac9723066062383778f37e9d64fd94e

                                                                        SHA1

                                                                        1cd78fc041d733f7eacdd447371c9dec25c7ef2c

                                                                        SHA256

                                                                        e187e1119350caa3aec9d531989f60452d0198368f19cf65ffd2194a8a4003ad

                                                                        SHA512

                                                                        2b3dc50fb5006f1f3beec1774d0927a0533b49d20122e49a0b4b41840f83c494376c8e61da735aa58d27453c44450203d5c2bb4f03fdd37b648ee0f51f925c59

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\768444b1-d991-4aea-be8b-3ae34a5c4dcb.tmp
                                                                        Filesize

                                                                        176KB

                                                                        MD5

                                                                        e6068d0dfe2722c41c7459b3a39bbf29

                                                                        SHA1

                                                                        14ebb26a13a22582f8e467107d7fafc2a5a67d8a

                                                                        SHA256

                                                                        eb347cd4bcf00fd4c0c0a373fec28174bc73c6bf8006841f33b3a45b7548b216

                                                                        SHA512

                                                                        2a1b56ed8530fce551191a7d50d801a28b8fa9181779ba1c67a60c10cb5fe1493f76a4960f3ac2986035691ebc1d59800bde74722f4eb091a0fb1710b0b3ecf8

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
                                                                        Filesize

                                                                        120B

                                                                        MD5

                                                                        9637c2950c10d0c9cb319e55ca44dde6

                                                                        SHA1

                                                                        7b5aae9ff3ac01d71753164b5138a426ee5e3dd4

                                                                        SHA256

                                                                        474b277d3b07a83422c042cae62e1335e1c8900bdaabc32206a034c313e4518a

                                                                        SHA512

                                                                        06bd14588f6250ae63e331aa8dfc500910b7d5505f93b7ec847c42826850a174b2d2f8f6d8a8625160de7c5e8c5e9b4ac7cacd42a2fbd151b5c785491b1d5bf2

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
                                                                        Filesize

                                                                        312B

                                                                        MD5

                                                                        95947f9cd8a189345fdba47c8a538fd7

                                                                        SHA1

                                                                        b7523343af04bf9dd9c333f270e0ed84b2235bb9

                                                                        SHA256

                                                                        f5a10f5e6268b83d8d4f5973b47e62362733ebfb9cf7f1b1e6e028803965c324

                                                                        SHA512

                                                                        8b16b47eda95b4b05f0c47b76b085fd32f6ed8ee09851ef7a06170830f2158d378a854349865b0b57941b5f70bda561168ac77e1e7b867061fcb963007d740ed

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        1ddbcb6a1d2f7f0ff6d78f60002ad77b

                                                                        SHA1

                                                                        c9ade0239e3fcfc07d57d55e676ddde2edb9d84f

                                                                        SHA256

                                                                        05ebd1dfbf5971d701628683668eef351f37f3215bbac9d9c3a0d7c5b7881770

                                                                        SHA512

                                                                        dd86bc2328bd6b05a44f7c2296bb88260d1f6a7604b78f9ad44a79989122b3529cc218c9918f62a4d107e562d9bed1067a84c6aa2a724057a28172ecc386307a

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        6b7ad8813cf635f627b400c3bb5f2a41

                                                                        SHA1

                                                                        a473861c8c6821a02f96dc7320ad669a40405d3c

                                                                        SHA256

                                                                        1595c5eb9b2df23faf01d4777ca8b59c69cdec10e1e21f71e976ab98b6da4caf

                                                                        SHA512

                                                                        e75323c4bad571ea50e3f4decf9aefe2cdeaa96e3ed25de94bb659d8f1d6bebd1ec58e98b6b1039e98daf0258aa078ddd7caa560181ec61a4ff4f079a31a13f3

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        f028d372ecdce4e88812deb986ca6f7c

                                                                        SHA1

                                                                        b990d877880d17deaa02aa11887ac6419f85c7d9

                                                                        SHA256

                                                                        7a851d5d08288a791e50c649c6d882d3ecb447c1283dbcc27d636fbf8481eec3

                                                                        SHA512

                                                                        28e8b80aa8cde3adb89e797ec034cea7e01c27adc3adaa5684bcef39f12da308c767fee9de24372ebde61718c37fa6ece44ba2d7a59074722d9e0600b7a2e590

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                                                        Filesize

                                                                        872B

                                                                        MD5

                                                                        e955b8143156f1ab427d170b2cfe64b5

                                                                        SHA1

                                                                        081a882f1e6f96c61b02915d3053d3380ae0bc62

                                                                        SHA256

                                                                        c642552d04782fe287e149703ec3f2dc61fc2facc7c5de860309d68963851719

                                                                        SHA512

                                                                        e7f04e88d79b76ccad52c3837f043c40771f54bcc0928d18254daccfd444d2c4ccec9e6cfb9f29bdade50aaf932cff50ab155a0c48bd36f72dffb44cf4720a52

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                                                        Filesize

                                                                        872B

                                                                        MD5

                                                                        8940c38df62c6ce4a4e96423c8595694

                                                                        SHA1

                                                                        bfb0c587b4af203ac5d5767305b040719e048492

                                                                        SHA256

                                                                        1c9eec913585170f3e01417d0e3a4207a5c70174a13323f579108d44899ad05c

                                                                        SHA512

                                                                        836b89c8e7d7431a105789967497e45221a09bcbe2c557eca66b5989d0399770fd7b69e98dd487cad52498585d950d53e889b57710cd3ee3705f652a32838530

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                                                        Filesize

                                                                        872B

                                                                        MD5

                                                                        ba4a62e7959718ef5f680eb015e8ddf3

                                                                        SHA1

                                                                        0414a01c366c8e47a66515e8ec770f4fbff04370

                                                                        SHA256

                                                                        2cde89c97d3edcc3c2e49805789d9592eed2c245ada41f3cc93cd0f532bf6aca

                                                                        SHA512

                                                                        d187fba0895aeea35d4f9e41f450c5b49adad8329c593db6228d21d77a023405da3799fafbbf7545f2eaefb0a613784cbc6c0ce03248201370327658e10afe30

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                                                        Filesize

                                                                        872B

                                                                        MD5

                                                                        483335b79a90ff10aa412e212a9c755e

                                                                        SHA1

                                                                        c87bad5ba9aa13a0e1a12201b46a3b3197af5ec3

                                                                        SHA256

                                                                        b68ee90833fa8578c6127e2f136d648d295062dd37e569ba22879742a0b34442

                                                                        SHA512

                                                                        d412a1947b06734fd9944fa4344dec0882e7d2a825f68f1a3dada4e86bfc5da0414790552766671ee1837e1a63480a7f30441891171ad03e221398f252d9ed89

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                                        Filesize

                                                                        7KB

                                                                        MD5

                                                                        0cfb2ccf95850d5beec12349493d5aaf

                                                                        SHA1

                                                                        89cfa8b7571ad04c907b1ceb62ee50c931f2f23b

                                                                        SHA256

                                                                        2810ee3992f0d9cb4825c07ebc43f4babb90481276849ae55a1d4ab83516a97e

                                                                        SHA512

                                                                        76c1bc6327432a25b5bbe73efc8b9410adbb857b69976540626dcd2ec89acf3b7f87634208b0306c1bcaacacbf3049f55b96e3f384ef98ed48bee85a3aa0402c

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                                        Filesize

                                                                        7KB

                                                                        MD5

                                                                        8e3883eb6747aeb8b5952b5c174b0e94

                                                                        SHA1

                                                                        9ab899b14ee68367a9b181e95c85cd5de061ada3

                                                                        SHA256

                                                                        b41e40a323a7b6dcfd4114c70e80404e8730137b482fa4a2d757b9f748c44ba3

                                                                        SHA512

                                                                        c5ea8ec2b2784096e937d3bdf4c282c938f261339f8114d6fe6f8dcc462b604f33946e49d928cb7218d56848e161d711cd678cdea727987844af0185b1324e22

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        3d17ca57a4861bd5528c73331f765adf

                                                                        SHA1

                                                                        292fa610b40e5c01143ceccff80f817f5ac82d3d

                                                                        SHA256

                                                                        383280cf6e4e7395c2463fa1e6498870559b3a142a2571fc9ea9b438e282eea4

                                                                        SHA512

                                                                        0e8d8c9a05c88630b4e99293481d82092a1490a5228d2fa62327898d2de65485eac38e925b3e4ea714a7cedd2274a0250effc1562c2433fa7fa009dcfd2f0b12

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                                        Filesize

                                                                        7KB

                                                                        MD5

                                                                        65e6d671bcf0bb2bb349515174700ec3

                                                                        SHA1

                                                                        014230c2d23e8ea808a3e3b9ab892c5b78066127

                                                                        SHA256

                                                                        48e33d974ed44446018bd086c2eb4dee5dab32faf85daba91383a1e555062e94

                                                                        SHA512

                                                                        d76a812fb4af8315b4d4760aa6445985f560251ca155cb6ed087a851eaf21c65fce17cffe24dccb09aa7f28b2376b29da77e5bce6ee69f947a8914ff8daeabb9

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                                        Filesize

                                                                        7KB

                                                                        MD5

                                                                        9eeb5735ed2fd2e57e59c79dcad6fd1d

                                                                        SHA1

                                                                        6707ce0bce8f33ff2d7ebe75da86dbd2f81d40ca

                                                                        SHA256

                                                                        83b4b99ea1a87407cb40baa97290953d8bf4f79604ec7e19a7b7579b1561a30b

                                                                        SHA512

                                                                        db59156caa0d22249165201043f635733a0231e8e4555bef7f637cd19f9f8a5ac5d2afea956f9461262da8dce3aea303bf4f2da80b0055207e0913e6703c4765

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        13d8a758e86e4db947742a57cfd809e3

                                                                        SHA1

                                                                        aee79feedf8267af5654e9613caf5b41ee48f914

                                                                        SHA256

                                                                        e930ab26d6e0894197cc0716bffca24519edd9800f31561b47865d2fab0c0c3f

                                                                        SHA512

                                                                        a2986a5b2300f4aa48bd90c261c24607b4df0c0bca3e24480f7e661a885346857e86af400d8cc37bb467486476143b2573e9fbcba3a1ab249c2930f1ce1404bc

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
                                                                        Filesize

                                                                        15KB

                                                                        MD5

                                                                        163313bb8fc3f0679005f0a0926da75f

                                                                        SHA1

                                                                        4dd986d1c6ed83a6b46f0fe29ec7bf27d7b86f80

                                                                        SHA256

                                                                        e50837d52b861c95f7f0c38ea410bf0f330b6353d152f64d7306b4e28f1c8ef4

                                                                        SHA512

                                                                        192a25d48d2bd98ec0df92eb90cdff1b244697f07e1726656186046c89b76b545a1a8cfddd51b5fb68193b7905574c9c73d962e2cb2d997a13bfb5c5d232beac

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
                                                                        Filesize

                                                                        15KB

                                                                        MD5

                                                                        e6dc2d66dde8685a2a66d8e190518080

                                                                        SHA1

                                                                        86579c93f38adcb5056182684aea5bf8d84d2134

                                                                        SHA256

                                                                        e42f1b517ce0d497a5fd6603469f743d10897bfbf32a51da5f518db205faa68a

                                                                        SHA512

                                                                        4ecc2277cb437121653ef8cb663b49a9f832e7f173e2cdaf4239ff24a7f30a0aa0169bdc13487dbace1c6a7e5473758e3c75795778831e262c38f2437f99407a

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                                        Filesize

                                                                        72KB

                                                                        MD5

                                                                        ae6d58ce63cbb06959e0e89bcd72cc64

                                                                        SHA1

                                                                        0c02f3dff42012ca26fdfe710e6d5199437be242

                                                                        SHA256

                                                                        a7cb0b3a71a05f88a025b4dcce1e1eafbe24333fcbb72ac928f3c4a42e69368d

                                                                        SHA512

                                                                        8c8b71c79e169229f55b2cddbfcd02b220fcf8d6ba756d4e994116e8c96ee2d6695dc34009b276a1947388b60c656157d12b423b6debfde079dd2aeecbd65586

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                                        Filesize

                                                                        175KB

                                                                        MD5

                                                                        77f990fd24694795408171efbb6dcdf8

                                                                        SHA1

                                                                        538a641c1dcaba20fe4cea59d37c6de8610957a4

                                                                        SHA256

                                                                        7e4a05b2f9efc2319961f216579684884c659a594005bb95b42063fc256b4cd5

                                                                        SHA512

                                                                        d99cc2f40e78d11c8902fd441df8d9b525d8f9d491e0f94c5b691382ef06243f975f12af808fa1b6850deb9d989eea2cfed81222ab0160278cdeaecc58e5a39f

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                                        Filesize

                                                                        175KB

                                                                        MD5

                                                                        d530242ee86c654d6a2bb192569848d5

                                                                        SHA1

                                                                        372fec343235d86e3e0c6b379a52299e4331fc1d

                                                                        SHA256

                                                                        9f6ed8ddf8c2ed99538a6254fafead2678f4ea60bbf24612ad2db46d12eae2d6

                                                                        SHA512

                                                                        7803e8a1f6306971f610e7d4b07e081a4f236b011783efd0f7b5e38f82bb20ad2027f2ba65f380bfa6684783a12b7cd36caf31d2844bbd3783de56277bc9eae4

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                                        Filesize

                                                                        175KB

                                                                        MD5

                                                                        3c503878ed86dcbf8ebf9f63a3596343

                                                                        SHA1

                                                                        f26076be3109aecad0d0766a5561b911049d94c2

                                                                        SHA256

                                                                        e776ab2bf30cd60f4c81e10b9364fabf010add8146ca2802bac08fdfe09f8b42

                                                                        SHA512

                                                                        af6606320081b72a92f10db6578e185ba20e6dd83b0c159158209688ba14a58a14ee9b6433b675999dc9a51a90203df76c757692e6cb4ff48c41d18c2e3dac40

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                                        Filesize

                                                                        175KB

                                                                        MD5

                                                                        6b2c6b98090153782dbc81eb8ecf5907

                                                                        SHA1

                                                                        a3a42f67fd770741ab25ea608d132dfb954d6f42

                                                                        SHA256

                                                                        e4d42bb7d70f854935686744b3e42b16066264afa8e0472371ea1630de42549f

                                                                        SHA512

                                                                        90b2d8ba2be06b897fbc94c4837b22a2a03aacf8645f532f12925809ce3ee04e1ed3213c17109c100a3ece5c98c9af7f5580e815d1bb9217602f0d89ed01a486

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                                        Filesize

                                                                        175KB

                                                                        MD5

                                                                        3c4868d50bd3e799ec24948f51470e59

                                                                        SHA1

                                                                        ca5ab620de71ceb4dc3f5db06ba1a2e11445e959

                                                                        SHA256

                                                                        4e70a71e03a858cbd44f022d7c373ce29482de8cccd401fbe4e73c501b5a5413

                                                                        SHA512

                                                                        da4764f142e9ba20a8a781f955436f2b8a5d5b8f95bb8b8492c3b7361d1f847f55618eee3bd64868f80c67b235f49ccc49269e7964531c008e4c28531a3f9a90

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                                        Filesize

                                                                        175KB

                                                                        MD5

                                                                        f2a169a6b3c65ed8a4fe80f1498b3ebb

                                                                        SHA1

                                                                        93c35c8801ea90c3309509c30a43b51a872884e9

                                                                        SHA256

                                                                        8065c9752cd74010303863c1fb351e61dc88183773f38ceb8bb89c786b8e2df2

                                                                        SHA512

                                                                        75edaade2b11fd4946ed974ad76cb1a2b723dd0d6f0a3b6d2537d1c9cbb58bf47fc98926e748805c747b0d9db0e371324f629eada2cd3845d1ddd8ddc39e0c07

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache
                                                                        Filesize

                                                                        117KB

                                                                        MD5

                                                                        29dce5ed9071d109209626d4fc8838f1

                                                                        SHA1

                                                                        a980aa5b11aa1ec595b64689dfb3fa820a6a0091

                                                                        SHA256

                                                                        dbf637d0158e49463930be23ee6fa036de2ba9386a354d5dad06cca2854d03fb

                                                                        SHA512

                                                                        faa2efa53e67af3cf2016c866adb6fd53e9f8cd45e93745bc1a86ea46ef8b4f0913a78effa6be7c37cb6ecf383c1de819cd6a1b6d614d0d710a3658c03ffccd1

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57e251.TMP
                                                                        Filesize

                                                                        113KB

                                                                        MD5

                                                                        ec13732371ad3b4c239124805eb08d03

                                                                        SHA1

                                                                        1cc5310e2db9bba028aba52100c9dfc7f1b4a182

                                                                        SHA256

                                                                        c594447009c04ca3ebe1842e39c9aa88db92a4cd33f16e26d1c386dd137a6ff1

                                                                        SHA512

                                                                        9239ce46346e8887cebd7b0919845949656a78f0909f2516b2f3403b2d4841cc9af938226d00270cc838abab2f82c4c5186dae77d43bca83dd8f4576f1eb080c

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
                                                                        Filesize

                                                                        2B

                                                                        MD5

                                                                        99914b932bd37a50b983c5e7c90ae93b

                                                                        SHA1

                                                                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                        SHA256

                                                                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                        SHA512

                                                                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                      • C:\Users\Admin\AppData\Local\Temp\Rar$EXb1088.5386\Havij-Pro-v1.17-PentestCore\Havij 1.17 Pro.exe
                                                                        Filesize

                                                                        6.3MB

                                                                        MD5

                                                                        7174885a28d74433457f718b592fe141

                                                                        SHA1

                                                                        910fd3e659f1151743e4dc6a435119c3a6386d41

                                                                        SHA256

                                                                        883ec8f4371547d297895632d59ccd2e50ad1826f6cc47d09873390a53393344

                                                                        SHA512

                                                                        5ab64a7a76c1e000a36f8d91ded361c60b6cd0942bc6e76b231e003e19404e84a2ec1f3720cfe8eaba493f7be2b727d33335dddf22414d34f6cdc86abebff6aa

                                                                      • C:\Users\Admin\AppData\Local\Temp\Rar$EXb1088.5386\Havij-Pro-v1.17-PentestCore\Havij 1.17 Pro.exe
                                                                        Filesize

                                                                        6.3MB

                                                                        MD5

                                                                        7174885a28d74433457f718b592fe141

                                                                        SHA1

                                                                        910fd3e659f1151743e4dc6a435119c3a6386d41

                                                                        SHA256

                                                                        883ec8f4371547d297895632d59ccd2e50ad1826f6cc47d09873390a53393344

                                                                        SHA512

                                                                        5ab64a7a76c1e000a36f8d91ded361c60b6cd0942bc6e76b231e003e19404e84a2ec1f3720cfe8eaba493f7be2b727d33335dddf22414d34f6cdc86abebff6aa

                                                                      • C:\Users\Admin\AppData\Local\Temp\Rar$EXb1088.5386\Havij-Pro-v1.17-PentestCore\Havij 1.17 Pro.exe
                                                                        Filesize

                                                                        6.3MB

                                                                        MD5

                                                                        7174885a28d74433457f718b592fe141

                                                                        SHA1

                                                                        910fd3e659f1151743e4dc6a435119c3a6386d41

                                                                        SHA256

                                                                        883ec8f4371547d297895632d59ccd2e50ad1826f6cc47d09873390a53393344

                                                                        SHA512

                                                                        5ab64a7a76c1e000a36f8d91ded361c60b6cd0942bc6e76b231e003e19404e84a2ec1f3720cfe8eaba493f7be2b727d33335dddf22414d34f6cdc86abebff6aa

                                                                      • C:\Users\Admin\AppData\Local\Temp\is-UJ7MS.tmp\Havij 1.17 Pro.tmp
                                                                        Filesize

                                                                        669KB

                                                                        MD5

                                                                        52950ac9e2b481453082f096120e355a

                                                                        SHA1

                                                                        159c09db1abcee9114b4f792ffba255c78a6e6c3

                                                                        SHA256

                                                                        25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

                                                                        SHA512

                                                                        5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

                                                                      • C:\Users\Admin\AppData\Local\Temp\is-UJ7MS.tmp\Havij 1.17 Pro.tmp
                                                                        Filesize

                                                                        669KB

                                                                        MD5

                                                                        52950ac9e2b481453082f096120e355a

                                                                        SHA1

                                                                        159c09db1abcee9114b4f792ffba255c78a6e6c3

                                                                        SHA256

                                                                        25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

                                                                        SHA512

                                                                        5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

                                                                      • C:\Users\Admin\Downloads\H-Pro-v1.17-PentestCore.rar
                                                                        Filesize

                                                                        6.3MB

                                                                        MD5

                                                                        40d2b3f6ec770b960df9dc68f8befab1

                                                                        SHA1

                                                                        8ae3c2a9b06a9e2871cfa08af32240a8bfc38b9c

                                                                        SHA256

                                                                        8d5729259089fb3d5b14f86c6ab3db93db27b05e58a9e1f4d8d106c272b5a424

                                                                        SHA512

                                                                        291d40afdaa8e5d3eb92de096c66426de922ee588cd5ce610b9834d5a69f17bbb60d2b9be34bd933751c0e02ea399662afdea263a6ebaa72decac02167c22e4f

                                                                      • C:\Users\Admin\Downloads\H-Pro-v1.17-PentestCore.rar
                                                                        Filesize

                                                                        6.3MB

                                                                        MD5

                                                                        40d2b3f6ec770b960df9dc68f8befab1

                                                                        SHA1

                                                                        8ae3c2a9b06a9e2871cfa08af32240a8bfc38b9c

                                                                        SHA256

                                                                        8d5729259089fb3d5b14f86c6ab3db93db27b05e58a9e1f4d8d106c272b5a424

                                                                        SHA512

                                                                        291d40afdaa8e5d3eb92de096c66426de922ee588cd5ce610b9834d5a69f17bbb60d2b9be34bd933751c0e02ea399662afdea263a6ebaa72decac02167c22e4f

                                                                      • C:\Users\Admin\Downloads\winrar-x64-621.exe
                                                                        Filesize

                                                                        3.4MB

                                                                        MD5

                                                                        766ac70b840c029689d3c065712cf46e

                                                                        SHA1

                                                                        e54f4628076d81b36de97b01c098a2e7ba123663

                                                                        SHA256

                                                                        06d6ecc5f9d88636b0bac62218c296bfa1b2222f734c9cbed5575bd9f634e219

                                                                        SHA512

                                                                        49064dc2c30eecd7320a6431abfee49d250ea7cda5e8ae630d2c55325f5bdf338355ae8d7a3246b4036afce5c100b8b30599baf19ab64d20190392d2d9a28608

                                                                      • C:\Users\Admin\Downloads\winrar-x64-621.exe
                                                                        Filesize

                                                                        3.4MB

                                                                        MD5

                                                                        766ac70b840c029689d3c065712cf46e

                                                                        SHA1

                                                                        e54f4628076d81b36de97b01c098a2e7ba123663

                                                                        SHA256

                                                                        06d6ecc5f9d88636b0bac62218c296bfa1b2222f734c9cbed5575bd9f634e219

                                                                        SHA512

                                                                        49064dc2c30eecd7320a6431abfee49d250ea7cda5e8ae630d2c55325f5bdf338355ae8d7a3246b4036afce5c100b8b30599baf19ab64d20190392d2d9a28608

                                                                      • C:\Users\Admin\Downloads\winrar-x64-621.exe
                                                                        Filesize

                                                                        3.4MB

                                                                        MD5

                                                                        766ac70b840c029689d3c065712cf46e

                                                                        SHA1

                                                                        e54f4628076d81b36de97b01c098a2e7ba123663

                                                                        SHA256

                                                                        06d6ecc5f9d88636b0bac62218c296bfa1b2222f734c9cbed5575bd9f634e219

                                                                        SHA512

                                                                        49064dc2c30eecd7320a6431abfee49d250ea7cda5e8ae630d2c55325f5bdf338355ae8d7a3246b4036afce5c100b8b30599baf19ab64d20190392d2d9a28608

                                                                      • C:\Windows\SysWOW64\MSInet.ocx
                                                                        Filesize

                                                                        112KB

                                                                        MD5

                                                                        7bec181a21753498b6bd001c42a42722

                                                                        SHA1

                                                                        3249f233657dc66632c0539c47895bfcee5770cc

                                                                        SHA256

                                                                        73da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31

                                                                        SHA512

                                                                        d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc

                                                                      • C:\Windows\SysWOW64\MSInet.ocx
                                                                        Filesize

                                                                        112KB

                                                                        MD5

                                                                        7bec181a21753498b6bd001c42a42722

                                                                        SHA1

                                                                        3249f233657dc66632c0539c47895bfcee5770cc

                                                                        SHA256

                                                                        73da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31

                                                                        SHA512

                                                                        d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc

                                                                      • C:\Windows\SysWOW64\Mscomctl.ocx
                                                                        Filesize

                                                                        1.0MB

                                                                        MD5

                                                                        ecc7d7f0d3446de36045d1d9e964fafe

                                                                        SHA1

                                                                        da6b0ec081d628c33b150327f3bd16d3b7fa4729

                                                                        SHA256

                                                                        bc58d624ceea02ab086f1cce809c992bf5a7105e88931853317a2f5aa5afd6e4

                                                                        SHA512

                                                                        443de697be9886cd97235e6468f3a7f6bf11612711e54dba31431b0d9418672e1434e839ed50cacf28107f692f0c9d9d2f57d90e3a843d81015d459c180db632

                                                                      • C:\Windows\SysWOW64\Mscomctl.ocx
                                                                        Filesize

                                                                        1.0MB

                                                                        MD5

                                                                        ecc7d7f0d3446de36045d1d9e964fafe

                                                                        SHA1

                                                                        da6b0ec081d628c33b150327f3bd16d3b7fa4729

                                                                        SHA256

                                                                        bc58d624ceea02ab086f1cce809c992bf5a7105e88931853317a2f5aa5afd6e4

                                                                        SHA512

                                                                        443de697be9886cd97235e6468f3a7f6bf11612711e54dba31431b0d9418672e1434e839ed50cacf28107f692f0c9d9d2f57d90e3a843d81015d459c180db632

                                                                      • C:\Windows\SysWOW64\Mswinsck.ocx
                                                                        Filesize

                                                                        121KB

                                                                        MD5

                                                                        e8a2190a9e8ee5e5d2e0b599bbf9dda6

                                                                        SHA1

                                                                        4e97bf9519c83835da9db309e61ec87ddf165167

                                                                        SHA256

                                                                        80ab0b86de58a657956b2a293bd9957f78e37e7383c86d6cd142208c153b6311

                                                                        SHA512

                                                                        57f8473eedaf7e8aad3b5bcbb16d373fd6aaec290c3230033fc50b5ec220e93520b8915c936e758bb19107429a49965516425350e012f8db0de6d4f6226b42ee

                                                                      • C:\Windows\SysWOW64\Mswinsck.ocx
                                                                        Filesize

                                                                        121KB

                                                                        MD5

                                                                        e8a2190a9e8ee5e5d2e0b599bbf9dda6

                                                                        SHA1

                                                                        4e97bf9519c83835da9db309e61ec87ddf165167

                                                                        SHA256

                                                                        80ab0b86de58a657956b2a293bd9957f78e37e7383c86d6cd142208c153b6311

                                                                        SHA512

                                                                        57f8473eedaf7e8aad3b5bcbb16d373fd6aaec290c3230033fc50b5ec220e93520b8915c936e758bb19107429a49965516425350e012f8db0de6d4f6226b42ee

                                                                      • C:\Windows\SysWOW64\RICHTX32.ocx
                                                                        Filesize

                                                                        254KB

                                                                        MD5

                                                                        21034a336e16f30345a96de9bd8cec25

                                                                        SHA1

                                                                        c9fb876a001874c4ee8670fabf12c36036f54a1f

                                                                        SHA256

                                                                        251a419bb5998882227a11188311b82f20c4952865ff916397973bd9a50c69d5

                                                                        SHA512

                                                                        ed1f33cd13f6cda5aa4696271927ff2497a2bd33fee606655ed50bb5f13cedb81a3597844c1a8030e6ffa3c46ed34c217a55dab062ba00a76f2f079b7da2e86f

                                                                      • C:\Windows\SysWOW64\RICHTX32.ocx
                                                                        Filesize

                                                                        254KB

                                                                        MD5

                                                                        21034a336e16f30345a96de9bd8cec25

                                                                        SHA1

                                                                        c9fb876a001874c4ee8670fabf12c36036f54a1f

                                                                        SHA256

                                                                        251a419bb5998882227a11188311b82f20c4952865ff916397973bd9a50c69d5

                                                                        SHA512

                                                                        ed1f33cd13f6cda5aa4696271927ff2497a2bd33fee606655ed50bb5f13cedb81a3597844c1a8030e6ffa3c46ed34c217a55dab062ba00a76f2f079b7da2e86f

                                                                      • C:\Windows\SysWOW64\comdlg32.ocx
                                                                        Filesize

                                                                        137KB

                                                                        MD5

                                                                        d76f0eab36f83a31d411aeaf70da7396

                                                                        SHA1

                                                                        9bc145b54500fb6fbea9be61fbdd90f65fd1bc14

                                                                        SHA256

                                                                        46f4fdb12c30742ff4607876d2f36cf432cdc7ec3d2c99097011448fc57e997c

                                                                        SHA512

                                                                        9c22bc6b2e7dbcd344809085894b768cfa76e8512062c5bbf3caeaa2771c6b7ce128bd5a0b6e385a5da777d0d822a5b2191773cc0ddb05abe1fa935fa853d79d

                                                                      • C:\Windows\SysWOW64\comdlg32.ocx
                                                                        Filesize

                                                                        137KB

                                                                        MD5

                                                                        d76f0eab36f83a31d411aeaf70da7396

                                                                        SHA1

                                                                        9bc145b54500fb6fbea9be61fbdd90f65fd1bc14

                                                                        SHA256

                                                                        46f4fdb12c30742ff4607876d2f36cf432cdc7ec3d2c99097011448fc57e997c

                                                                        SHA512

                                                                        9c22bc6b2e7dbcd344809085894b768cfa76e8512062c5bbf3caeaa2771c6b7ce128bd5a0b6e385a5da777d0d822a5b2191773cc0ddb05abe1fa935fa853d79d

                                                                      • C:\Windows\SysWOW64\comdlg32.ocx
                                                                        Filesize

                                                                        137KB

                                                                        MD5

                                                                        d76f0eab36f83a31d411aeaf70da7396

                                                                        SHA1

                                                                        9bc145b54500fb6fbea9be61fbdd90f65fd1bc14

                                                                        SHA256

                                                                        46f4fdb12c30742ff4607876d2f36cf432cdc7ec3d2c99097011448fc57e997c

                                                                        SHA512

                                                                        9c22bc6b2e7dbcd344809085894b768cfa76e8512062c5bbf3caeaa2771c6b7ce128bd5a0b6e385a5da777d0d822a5b2191773cc0ddb05abe1fa935fa853d79d

                                                                      • C:\Windows\SysWOW64\tabctl32.ocx
                                                                        Filesize

                                                                        204KB

                                                                        MD5

                                                                        908938d3ba2d870ee9fc6238a4c6af95

                                                                        SHA1

                                                                        e8648d6d69fd5cf900c4bf98b210f6921bed3ef5

                                                                        SHA256

                                                                        40cadbfb2eb5732f025d687664f34239db7153a192bca0287f9208852b201fb6

                                                                        SHA512

                                                                        f9433f48330f7ddc64edb8a64229c1490fa31978e9f4ffdc5fa5ff8b18430317a39a07a559d560051ba195b730429acfb18edb38bf712507b00ac788ffca0b74

                                                                      • C:\Windows\SysWOW64\tabctl32.ocx
                                                                        Filesize

                                                                        204KB

                                                                        MD5

                                                                        908938d3ba2d870ee9fc6238a4c6af95

                                                                        SHA1

                                                                        e8648d6d69fd5cf900c4bf98b210f6921bed3ef5

                                                                        SHA256

                                                                        40cadbfb2eb5732f025d687664f34239db7153a192bca0287f9208852b201fb6

                                                                        SHA512

                                                                        f9433f48330f7ddc64edb8a64229c1490fa31978e9f4ffdc5fa5ff8b18430317a39a07a559d560051ba195b730429acfb18edb38bf712507b00ac788ffca0b74

                                                                      • \??\pipe\crashpad_4768_ELBHXNKDTERQHTHE
                                                                        MD5

                                                                        d41d8cd98f00b204e9800998ecf8427e

                                                                        SHA1

                                                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                        SHA256

                                                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                        SHA512

                                                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                      • memory/1088-655-0x0000028CFD040000-0x0000028CFD797000-memory.dmp
                                                                        Filesize

                                                                        7.3MB

                                                                      • memory/1088-647-0x0000028CFD040000-0x0000028CFD797000-memory.dmp
                                                                        Filesize

                                                                        7.3MB

                                                                      • memory/2888-772-0x0000000000780000-0x00000000007C0000-memory.dmp
                                                                        Filesize

                                                                        256KB

                                                                      • memory/2888-782-0x0000000000780000-0x00000000007C0000-memory.dmp
                                                                        Filesize

                                                                        256KB

                                                                      • memory/2888-767-0x0000000000400000-0x0000000000622000-memory.dmp
                                                                        Filesize

                                                                        2.1MB

                                                                      • memory/2888-769-0x0000000000400000-0x0000000000622000-memory.dmp
                                                                        Filesize

                                                                        2.1MB

                                                                      • memory/2888-786-0x0000000000400000-0x0000000000622000-memory.dmp
                                                                        Filesize

                                                                        2.1MB

                                                                      • memory/2888-784-0x0000000000400000-0x0000000000622000-memory.dmp
                                                                        Filesize

                                                                        2.1MB

                                                                      • memory/2888-770-0x0000000000690000-0x0000000000692000-memory.dmp
                                                                        Filesize

                                                                        8KB

                                                                      • memory/2888-781-0x0000000000400000-0x0000000000622000-memory.dmp
                                                                        Filesize

                                                                        2.1MB

                                                                      • memory/2888-773-0x0000000000400000-0x0000000000622000-memory.dmp
                                                                        Filesize

                                                                        2.1MB

                                                                      • memory/2888-775-0x0000000000400000-0x0000000000622000-memory.dmp
                                                                        Filesize

                                                                        2.1MB

                                                                      • memory/2888-776-0x0000000000780000-0x00000000007C0000-memory.dmp
                                                                        Filesize

                                                                        256KB

                                                                      • memory/3840-696-0x0000000000400000-0x0000000000414000-memory.dmp
                                                                        Filesize

                                                                        80KB

                                                                      • memory/3840-683-0x0000000000400000-0x0000000000414000-memory.dmp
                                                                        Filesize

                                                                        80KB

                                                                      • memory/3840-771-0x0000000000400000-0x0000000000414000-memory.dmp
                                                                        Filesize

                                                                        80KB

                                                                      • memory/4276-697-0x0000000000400000-0x00000000004B6000-memory.dmp
                                                                        Filesize

                                                                        728KB

                                                                      • memory/4276-768-0x0000000000400000-0x00000000004B6000-memory.dmp
                                                                        Filesize

                                                                        728KB

                                                                      • memory/4276-694-0x0000000000710000-0x0000000000711000-memory.dmp
                                                                        Filesize

                                                                        4KB