Analysis

  • max time kernel
    354s
  • max time network
    358s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 03:42

General

  • Target

    Predator The Theif.rar

  • Size

    8.2MB

  • MD5

    acfb3fd9a6df3035f61f0d2c4aa92fc1

  • SHA1

    2eb807c990e4a8802b6fad09ae8e93bed30363da

  • SHA256

    b2da54c75bc68b77aa1fd4608711abac1f7d5a2e0cad9a39e75794b3218d78cf

  • SHA512

    fe5940c60bf00aa9f7a0daea15ef5f7679f1d5290399e8cf18cb73f7420717088c180c166e5d008df1271e198ad1ae2e1f91d664f4ccff4ad35719b463175948

  • SSDEEP

    196608:rmGkcqJlv29/WUUmJ14QcdQAVPt9CiQNlDjRX0Sq/G/iE8lgBCVWuJdtS:aGiJ2lHR14Qcd/PPXQ/DjRE2/mDWuJdE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 51 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Predator The Theif.rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Predator The Theif.rar"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2840
  • C:\Users\Admin\Desktop\Predator The Thief Last Cracked [XakFor.Net].exe
    "C:\Users\Admin\Desktop\Predator The Thief Last Cracked [XakFor.Net].exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://xakfor.net/forum/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:696
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:696 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2300
  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\panel v18.rar"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2348
  • C:\Users\Admin\Desktop\111\Predator The Thief Last Cracked [XakFor.Net].exe
    "C:\Users\Admin\Desktop\111\Predator The Thief Last Cracked [XakFor.Net].exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://xakfor.net/forum/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2348
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x584
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2696
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\111\robots.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:2452
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
    1⤵
      PID:1680
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
      1⤵
        PID:2904
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
        1⤵
          PID:1288
        • C:\Users\Admin\Desktop\111\Predator The Thief Last Cracked [XakFor.Net].exe
          "C:\Users\Admin\Desktop\111\Predator The Thief Last Cracked [XakFor.Net].exe"
          1⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1896
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" https://xakfor.net/forum/
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1064
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1064 CREDAT:275457 /prefetch:2
              3⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1652
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\111\install\index.php
          1⤵
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1164
          • C:\Windows\system32\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\111\install\index.php
            2⤵
            • Opens file in notepad (likely ransom note)
            PID:2116

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

          Filesize

          717B

          MD5

          822467b728b7a66b081c91795373789a

          SHA1

          d8f2f02e1eef62485a9feffd59ce837511749865

          SHA256

          af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

          SHA512

          bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1946F523093CFC22C17C0B994AFAC47D

          Filesize

          503B

          MD5

          916677d47bd9cb7e6f21449554150593

          SHA1

          2b530a0ba55fb32570a317f13d03686a78cf955e

          SHA256

          19d5705fb9927367745b0681f7880b250307e7e42b9206f47e48953b66e0b1dd

          SHA512

          ccc3a5a5f7d927fc6650c6342ebe949b67ae5d14c1dbf5705a3384aedb9fc709c79aee274819326842e897b4983456ac72e1137d08010a317d984fa8608c6134

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          914B

          MD5

          e4a68ac854ac5242460afd72481b2a44

          SHA1

          df3c24f9bfd666761b268073fe06d1cc8d4f82a4

          SHA256

          cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

          SHA512

          5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

          Filesize

          192B

          MD5

          ea2377588986bbbd4c35afe089500440

          SHA1

          095cea1aee601e3b673b6b66dfa495d5b6d09728

          SHA256

          df4d4f5854abb254e5e26245517ee89305b8a59ceb3c6626eda3936765f6806b

          SHA512

          45161d1f01af958b91389e3e53be65dafb7deb0e623dd9ffa6f777b843181227cb2c030efb6e22ad0ab4f6ba11be7c85c938780b5946d61059a781ff973ebb12

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1946F523093CFC22C17C0B994AFAC47D

          Filesize

          548B

          MD5

          58184e312c15ab746cc97c4e8903afd1

          SHA1

          07410a2a47dfa0ad21423b99d8930770388ddf75

          SHA256

          1c02bc2a2d967a408fb72767a06d55852db4b8e057b84ab6da0358b1c3255a4c

          SHA512

          8ce6662b2a523fb15b7d165c3febe7750d43d24696568fbdbbe63997c2059eb2b0ff1c23f804d351e8cd7cafd0b770ed236b8304c817fd46f54301cd6b318e94

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          252B

          MD5

          059b1a1d074efc5a2ce53b6a1d578be2

          SHA1

          931d837e085a075fed82bd46628d1803144cb85e

          SHA256

          ce3ff42b5adf4f252faf4e10c1643649b8c8be0004c7a4a4c1ed4b489c7328a4

          SHA512

          273be209b0d1b3f2c96b61922cb5e1b45ab2b309fa3d25f3a80170c5f9a9d540866a8d665f2bbbf390104929a1abdbda80de2abe530cdc43362f1a3b6f6847d3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7e3194d9de4566697f1b4977e6518d71

          SHA1

          0ae04aab2253942173a794c5a43e1505ef60a03f

          SHA256

          f2c8686b7afa3f9a9da93de4068ed12bbb496ce044fca887b368bf6264b3264b

          SHA512

          d3a8c9c2efbbc1609cf4a6df2ebdbe0d3fed8ae78d29e58618c85b75dccb90d1eca1333295923cfcc1678fd5cf16a23b69c0757c4de37f250b21e7fd8af6b623

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          660851247393f576083d8a671c42381b

          SHA1

          5587f45af98980211dfab2b6cd349bbb0759ac29

          SHA256

          8fd9119ed8dbc55dd5e6ac3b24deccf26028e29468a015ae40391ea9e65633dc

          SHA512

          2ec238f47780989cfe88fd7e6eefad969bab8d3edfc133dd79b735bbe42415bf8948204651714520eef079dcf1b288c2733ada9f759c9fb29719c9df49768268

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          98966c06b55b0183473031963093fc01

          SHA1

          ed41ad05a7cc4f78580368424faf25060e2e1426

          SHA256

          8f0282898a94ee66fb55a58771522b88cfd4b6ed2ff1bf64c01c253d8e89df75

          SHA512

          dd4d6aac95f84deb84df64522cdd69fb10d8c6fe97ec97ca54655bbd848399ee00e6e74692ce5b7341bae07c1a8789f9a1ee8f5219e9d946285f8c36d9e55661

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          75ae65cab3983e220298d1036800cde6

          SHA1

          c8396dc7971344ea09cbd32dfa651bd16453c522

          SHA256

          a1f2acfe6a398904de8b1f112f0e522490ced9ab038021bfede1b53aaca83829

          SHA512

          c940b1b45e96c6074319b9fdfb87efdf1e520333295dff404397b1f0ac75db1e63b887aa51dfd9901a05a287c49368bf506c237621112a119094966c1a0b0e69

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          931386ccac5350ddda06decffd64a13c

          SHA1

          d6167dcd946e89bb67d2c303b2410b59fdf626c8

          SHA256

          dfe5aa1e5558395f273fdda9264463ab3436e5b10a4c463ba64948b2395cd987

          SHA512

          dde74b1134dcd0d4646e24ac5e970e4462ced3132e83d974da93670c42148f0296f659f20468c4e5148cf9470fafc1243999e10b70970cc1b3eb12f82ae0aec8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8a380f6959fba4c3f56c31585fe9a1fd

          SHA1

          beada24f109e85d99f2ef4f7afaba23a77c31f24

          SHA256

          2a24be8f668f2e189dbf32709057965cc716da69592f4c142292c00e6ea0c5be

          SHA512

          ac515c1326efbca5ae0182c0d0bb440fba4ed85fdd795fabb024524504033270f34a42bcf48c47e7c710e1ee7bc1af57c431310d17a97dfeeda38280f3dd829a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fd368cfe6c305032311ab60d266804f4

          SHA1

          7ae40c580b217d301f0ca5f193a0351588087f07

          SHA256

          4ca60178b24f66696647d8223c60767b311ffe7597990da8cf4c02cfdeed3805

          SHA512

          63bbd1841d3908bfe2a1907914653b42bb0cf502dc410d0895989030de121c65ea289c74f78ba350f023a5f2fa15c33cef6e2bc8f40dbc18c2474b87442ab7ca

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          075dfa75a6aacbdcd492d0c38da9efe7

          SHA1

          e4fc866dcc0083905f8b5b3f8339de866e09f608

          SHA256

          ff37077aaada9d5a7951a6c63f94ec9d10156f768cd504df134eb599f752b6a8

          SHA512

          56488bf05be2e8fb96eee505db3d0778a1a48b73a697716625b2cfed6f6fe02e75d7660abae8a6867eebae2d9cfb324dd224e8378fbb1b8e3fbd485838ffd407

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          66b7a99b8db0c8607fed392cd0746cd4

          SHA1

          c1b63057d601b818af31e99708bc2a3e41c5fecc

          SHA256

          064412d36ddc0d52537c1c625226755efc6f1a9d203ee49ccf82d7409e05fba4

          SHA512

          1e18d69f7b6a6ef249dc840156b02af01ed440a22e2e4fba5b909b3d511249eddf1e3663b46b1f3138a3fc3cd48ba856574b6ab4155dea5fa80efd540cc41a68

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          51d78cfad129d9a5defad3fdc88b01f5

          SHA1

          f395ba2732677997de9c0eccf7fe2cdf211e5762

          SHA256

          ddef3e8bf4e9e843304ebda13b0a0e79853b88b5b37fd33e7e280fd9625d44bc

          SHA512

          37aaf82935eed482193347d4239c745ad8a93f11711078e7c03000cc6002cad5cc9091dd4e528b68402249219fb4e2e2030873fe1b8932a87f03fd09a2e5fdc1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          24f2146e1595b2c2eba9ed70efe83368

          SHA1

          ef4a9c8047b6e06ea02b8d6baaf1923307f960d2

          SHA256

          bad742bd188d0e033dc09f7fa4d2a12dd173c67f6eafac6c2e586ad799b2a0bc

          SHA512

          abf9d723475410bc243b255bb43a35499e3d4d2df71f06e05dcb5b4f9d6f682db11abafc3d444b410791721470d0366298b8b150ee681b6cb350bf04f35a2b25

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6bb3f6ee2ede2743f4bd6b7cfe85863f

          SHA1

          d39aad479a8956d96b8aed4be54d125e624d55ec

          SHA256

          bc9f6740ddf3ab93c9b347c48bda7d50398d073d16cd5b4c6364a532bf01afe9

          SHA512

          52f6525a8f98e2e5ee06f53e57175b5b9efd4e9dc072701a101f6f1336764d6adf6831a1db1a71d45ce4df9a3d08e75fdd071f0eb6f01516da088011c903015a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          bee50cdb4c3bc9ef2e53868f1b301e8a

          SHA1

          fadf6c9b0cd2895abd925d4f8b770b7ba45336ff

          SHA256

          65a34482447bf820f784c3c6db787fc0f76f0659bab11ce6b92e4c5b77923a57

          SHA512

          85cf491f5582574738952897b9f9a3cb7473032e0b9d4fb02212a32a117fc77588dcb9db190cc25ca0ba4b4d8919114b5346a412e290e3019b729bb54139ae23

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          418420f978bd9cac53e347a44daac8e0

          SHA1

          cb20852ce54255fe109cf16140af433e47cc3507

          SHA256

          d93f87a88facb718d5481b1fba56ebfe1bd95c668b800eca2363800228e61fec

          SHA512

          a6cadee871aafbacd92a4db05b96c65a6a18cf5317f2dc0b049473839e786ac275c5faf6de24e896b30894425ee844aa75b552bbcc524a89ef487fcae613a4f8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          1af15c9da323fdceb3b5540d16c82771

          SHA1

          715c4bd619cf6904dfa9311231df3c690f37df19

          SHA256

          6defd3cc951560b64128bc93705f1a4c8df45318808433389aa4efb8ef1d8175

          SHA512

          9c859e79d262488578bd4c4a58785c61e5f05a857a7b5e95372d123630467edd1b621adee7627989adb16146fbf972a424b2af6c616cd757fcbe276643e9d948

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8fe13190986fd91565f140dee660d409

          SHA1

          d014d7686eb81ffa380caa8ee9ec0ee5a339170e

          SHA256

          da012dbfa3a5d783f7d02d181b8560ab6ccddd4fbae730e6185425acf4336b49

          SHA512

          8a6826f9d3ba65b383243fb772d94840edce17feae26131a9548d65558d56712de115f5cb53ddbeb6350370bc28bf1c1558c4cc5a6cc12c0d23214fb63827690

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a58e0018f2ed7d2031de8dbdb47fca43

          SHA1

          10ce90425233f7c592079b10b3d0a00cf69ba74d

          SHA256

          3b99adb6c9422d26c9a4f1e093c73e6d5f12b0330b15083ef12ba41407f3e2c0

          SHA512

          cc63baae84f1a1b704999e0725e5686b52ab3bfd903534f0cb1eadc727e5793659aaec0aa9b6beaf5da8c05b18880a544c97fb1c1cf3c85bfe633929bd06b616

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f622d98e071dd9e32117d814635b1ce4

          SHA1

          670b265a5540106be759e5a58ba2396c5c0a7b41

          SHA256

          fd06a5dc3053d65c31739720335c4d9b7eb0208212a434577cff580bc9147aeb

          SHA512

          245b1b81cd7f7320f50b9d590b77921126ec33b7974d1a03edef7d5a9ed50541a410822bc4dd667b828426ab39793fdf18048d51ca558e2bc428faebe99a916d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          348da6b0485ac66a46dd52ca79e15506

          SHA1

          31703b458dd443c0def7b582fef6d07d30f3d151

          SHA256

          794faebb3e4811d607889a532d3ad4a6dd2836ab82d7618ea873d5fb2428f8b6

          SHA512

          13f488b57c00d266e2c11d65e33d26113a080cd1320c2af8112e9706b6d0ce8f95482e53d385c992723fe95ad6520b0535ec8baa47d522e343167f2ff0757993

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          9b674458956c1dda2cda50483b0628fd

          SHA1

          671d89f077d0bb8a81ae2f3e26f8698fd0be0c2d

          SHA256

          319974102cfaf15fb413e4672ec81b758b4bdbb5aa342aade7433c1406ed3aed

          SHA512

          e564d21a33ea188c01b9e9ebf6e1349658bae86c45a32ec12df6da6a9f142f9443a9402774949a9a5df5c420bc9017e4eb2ea859070b6e06adf1facc3fcaf340

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          3f2c819eadd6085b519c570b36249531

          SHA1

          791c453c8937b0d9535a08271bb7ac8989e50fe2

          SHA256

          3159bc201d123afa931a16626765c752c8fc2a3c5e526c3f24a0c475abfbcae0

          SHA512

          d614051cfccad6e8d13cf35b8c300f0503e1db379e2ff5c75a4d4232d3424bf5d27837d2218974e805a5e1e2fc712fb09b283add5950d1dbe18686f415be9b4b

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{BA76E2A0-D0CB-11EE-AB17-C695CBC44580}.dat

          Filesize

          5KB

          MD5

          699b4fc3a5c1d6b7056f72c0c326138d

          SHA1

          ffd53260c4aed5ae3f5c22dda9e60e165cdaa7c8

          SHA256

          e6f9a4a38d63d9806e6aca7c8a4ac950b38533ebaf76f1eace999fc98dc9c816

          SHA512

          68533a703e573a2ec0f10f11d7c48026a6012c0ea723bf1fa899fb892bcdcc8ef69449a795c0076958935bdaab24cbbba4e4e0cddc9907f0d6e30bc128820eb9

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{A52B6EA4-1CA4-11EF-8698-5E73522EB9B5}.dat

          Filesize

          4KB

          MD5

          4f2c41b8ac9d68bc6e71a4ddce8dd353

          SHA1

          72fa0743b859f9e516e48d6c225f48de1c53cd43

          SHA256

          eed67104a1fc12afa9a297b4492be4db6ad0febbd24f4738af93dafaba7825f7

          SHA512

          c60d17594c51b1a6c0f1758ca455678924ec0c152a5c83876ff8debc5be93bdf07900672f460e8771f9c3ee79e766e6add33e04d31bf0aeb011c6b971c6d1be8

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9M0HR0P6\forum[1].htm

          Filesize

          478B

          MD5

          59e81a2425c9ccb169aac17cc1fcd7a1

          SHA1

          6b450f2ec8cb815e124725e0263eb8accc690ada

          SHA256

          41f1589d07c3b1309be385ea67becc7c9e8a856fc35a1e354933b80925fef013

          SHA512

          e86124a19e1d082c846293b09ebbc6f1c847982551cfe36763b6e22cf5473a37bc7ab29f67e2201263130382e2273bc14d71c8836c0a0094e49da5f08487250e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\bkuKxPQGb[1].js

          Filesize

          32KB

          MD5

          f48baec69cc4dc0852d118259eff2d56

          SHA1

          e64c6e4423421da5b35700154810cb67160bc32b

          SHA256

          463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c

          SHA512

          06fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\forum[1].htm

          Filesize

          478B

          MD5

          a2a39e22e439384621c10b539cb932d3

          SHA1

          431f1636bf57c304534ec03b6dd410b71e4052c6

          SHA256

          e12571a76fbf5c625c6b1559a94ec65a9b7cd9142e378b96d302c2f44f861821

          SHA512

          375317c170bcd9f68d48170ab2e99a693982034b4fadd87219c4028a9c9adc417dfa21ce5b0f917f54f016c9006e97772f457e4b07967da90b020cb2d43a6ce8

        • C:\Users\Admin\AppData\Local\Temp\7zEC29668A7\controller\.htaccess

          Filesize

          13B

          MD5

          209634bb0238704c4874c35d615ae59e

          SHA1

          ee9a29b31d78b2e52120610ed51f732453580f7c

          SHA256

          6b817083ef9d947002e5ffe1e216de9b1ecd9bba813f0d8493b25dab83001699

          SHA512

          8e174de2599d239acb1aa28ba98b6159a57d220eaaed49f100c669814b04ba7cecc4988cf99eed9845bbf6a59e3b7f4950fd8f1afeaf53d1c82b2e361d3239ca

        • C:\Users\Admin\AppData\Local\Temp\7zEC29668A7\upload\js\index.html

          Filesize

          123B

          MD5

          6b37309700ffdd85eed2431b5dfd3bb1

          SHA1

          2eaf914fe507a09f321684b8add29b94cee50db3

          SHA256

          c703afa89e7517dd5020ac2960b7e14b44d4010ef02d5e0f6e34b9629935a3ce

          SHA512

          79211ac08ef90a01c9ab0bbb2f2bc437b696c9f5b1193c1d98659428ea3ba5a1db7a6659d8b14f5c4184c577ef6caff456439654b84c986740e7a2a50bd92060

        • C:\Users\Admin\AppData\Local\Temp\7zEC29668A7\view\error\error_db.php

          Filesize

          1KB

          MD5

          2959c87ab5dd5cd83281917cd7624206

          SHA1

          0e492374c8b650270f37ba5d8dc464874fd81c4c

          SHA256

          4b93e252876f8110c61498a1c2a98cd8c383310b3e24b259658a0cb88c6f419b

          SHA512

          50892a503d831e22d6e5ab7c73d42da2dc01eca18a44800927f5848f1edf09e108ad1079f30111db44d7b4cbd8e0224b6ec9be5584acd7afd97d00619c88e9fb

        • C:\Users\Admin\AppData\Local\Temp\Cab6FD4.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Cab70D2.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar6FF6.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • C:\Users\Admin\AppData\Local\Temp\Tar7134.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\Temp\~DF8B4736273538DD17.TMP

          Filesize

          20KB

          MD5

          f3defba593e6627fc6764a06bdef423e

          SHA1

          744f5a0348d452d86ab70809321b3767b43ef045

          SHA256

          6f3a57c43834caf155bd50a7cfb9c890f3d56ac9d3c5a533c400943764da7540

          SHA512

          1afea6410da3ad076cad509989289c2996cf352e606b3fdeedfff1536de3f84db26db09b735f3a01e43b8927d1597ced82162c01585889cdabfa485bc0539671

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6JGTSWEP.txt

          Filesize

          100B

          MD5

          231e5e2d9baea73936ebd2496604512b

          SHA1

          3c52b57c7061713275f1049b4542d62a1f02b584

          SHA256

          d2384e59924a5918cac5d2c4a8f67ce2a160638a9d544b2b6d82aceb17371603

          SHA512

          e54d12a912681cdbd105a8ed4e17a80557cf4de608252ed9a5e9c486280110fedce5249ac551293f0db8294612bd8e7a5e454394dc3369feb703a2d1f3ab6ab1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GMTFDBO3.txt

          Filesize

          116B

          MD5

          5ccd3e176d77e85ef92627fc2506153f

          SHA1

          cfe8af4fb9d09c47b1a7b2979395d05c6e592d4e

          SHA256

          c2fc80a408bfee6577ec11cd44b01621ae8eb11504e8cb4b104a45e013d2521f

          SHA512

          ba47aa67047c4c6acc3b8ed526d61f74803de7edad1f3cd73e3b10b9084ee968a0a1d38f8d98c0224f26387a1c28b85929498154f4e65281c5e2928f05ffa2ba

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JR3NTKVX.txt

          Filesize

          115B

          MD5

          460ef863ab451761e37125d60bddd21e

          SHA1

          4c5d60ba7fe19b37ec6766ecbb55b961727c0ab3

          SHA256

          646debfb390b76c21cb3da85536f2db2e1083cb2623f3e1f2d2d5157dea7248a

          SHA512

          03f3b95a67093e872a7ab95da1213a66a770fe77a6ebc17ce70433afe71f924c3b9a90b6215a19c98ac4aeb9369f8872957252ee6e6d03dcc5518c6864a444c8

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LA43M914.txt

          Filesize

          100B

          MD5

          1ea7d937d028afb09ae1aca65ada4e0c

          SHA1

          454883bda51c84108b89ebd36cf4112d1b1ffae9

          SHA256

          dec995421730d6e9ba6c852d2952e5cf601853f3bf0cfefa878fd493da36f1c9

          SHA512

          8c1bbdc7499d742c4a48495920324779632dc7a230b0ebbc2f6ca01b34e834123d11a964f4b8d863993925fd0e6c583a71394749b610249a7e0960934fbfa0e4

        • C:\Users\Admin\Desktop\111\install\index.php

          Filesize

          10KB

          MD5

          1b664aea09497784d770ce53ceb444b0

          SHA1

          5e6c3c672ce034b33d2a6701bf183e62157eb88b

          SHA256

          a37d47d6748d36b0d6beaf69121433b86c09a4bd70a92dfd94d60798925c02a1

          SHA512

          11560991a624bd4a642c42c6393b236c3cfce75de289a26ea1dfc975a1fba2f00af9877d903c3e5963775a6fe65797b95355a8dad2aade5442265ad46cd46bc1

        • C:\Users\Admin\Desktop\111\robots.txt

          Filesize

          26B

          MD5

          bbbcde0b15cabd06aace1df82d335978

          SHA1

          7a54e2d580b1ccecb62fe3fbb7b98fe569630744

          SHA256

          133e4db054e73a10017a1f429c80c35cd5bfa9c3a1aba581b364ecc459c48a4b

          SHA512

          9d2e24f78ee75c05bc7be4a8c6050159709331c13b891df77c4eee30890e4b4bc7756f1443738474967b364e0f296ffdfd3d630248be77ecc11476682fd7c8a3

        • C:\Users\Admin\Desktop\111\stub.bin

          Filesize

          276KB

          MD5

          11f2180a9c66bdf1f3c2c68219522268

          SHA1

          398bc882c874a4a1109257f68ad006dd3b245776

          SHA256

          5efbd63930e9664dc4ff598b7427aeaa6e44b4754e18f471dd245a2f2a21cf14

          SHA512

          a61e15e7ef55198e9e37f70848a7f976f5297cc33ca44bbad856f03e314d27132584950e836e7db2df3f0c09e710463b629613f32ac82cf75be18893350b780f

        • C:\Users\Admin\Desktop\Predator The Thief Last Cracked [XakFor.Net].exe

          Filesize

          2.2MB

          MD5

          f8df8488f2a0abb03b6fc03fa0c5d76f

          SHA1

          5098b760e9bff46e836303f3adbb41551068f37d

          SHA256

          c05350c96e4f3cc1536068dffed18756739c61923ec61aa86cdb989e032d9af5

          SHA512

          5ea65eca3d71084638974f685353d467e588858c786a297568ae9b4e28a0e8f7e49ad967d9a4970661f742e9f52e32eb363705c0c4afdd68ff2f2aee2f1e1ccf

        • C:\Users\Admin\Desktop\panel v18.rar

          Filesize

          6.6MB

          MD5

          312c6314befadbe3a937c16251002453

          SHA1

          5301207f0dab233b953c61d91ddcba6c75bf22a2

          SHA256

          246a288df8698e7fec02bb4054e27db02f5401dc709543a7cdf4a01563c6c3f7

          SHA512

          2c70c79e59e38d88f5a53c6aab43f6e36e418e576716992562236258c07017e5a13c4ca74186db1e733689055a0b05e5ac496d1a9fcc8e615be9b00cf9cd4525

        • memory/1344-31-0x0000000000A40000-0x0000000000A46000-memory.dmp

          Filesize

          24KB

        • memory/1344-32-0x0000000000490000-0x0000000000514000-memory.dmp

          Filesize

          528KB

        • memory/1344-30-0x0000000000F80000-0x00000000011BC000-memory.dmp

          Filesize

          2.2MB

        • memory/1724-1571-0x0000000000B90000-0x0000000000DCC000-memory.dmp

          Filesize

          2.2MB

        • memory/1724-1577-0x0000000006A60000-0x0000000006A62000-memory.dmp

          Filesize

          8KB

        • memory/1896-1588-0x0000000000B10000-0x0000000000B94000-memory.dmp

          Filesize

          528KB