Analysis
-
max time kernel
354s -
max time network
358s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
Predator The Theif.rar
Resource
win7-20240221-en
General
-
Target
Predator The Theif.rar
-
Size
8.2MB
-
MD5
acfb3fd9a6df3035f61f0d2c4aa92fc1
-
SHA1
2eb807c990e4a8802b6fad09ae8e93bed30363da
-
SHA256
b2da54c75bc68b77aa1fd4608711abac1f7d5a2e0cad9a39e75794b3218d78cf
-
SHA512
fe5940c60bf00aa9f7a0daea15ef5f7679f1d5290399e8cf18cb73f7420717088c180c166e5d008df1271e198ad1ae2e1f91d664f4ccff4ad35719b463175948
-
SSDEEP
196608:rmGkcqJlv29/WUUmJ14QcdQAVPt9CiQNlDjRX0Sq/G/iE8lgBCVWuJdtS:aGiJ2lHR14Qcd/PPXQ/DjRE2/mDWuJdE
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1344 Predator The Thief Last Cracked [XakFor.Net].exe 1724 Predator The Thief Last Cracked [XakFor.Net].exe 1896 Predator The Thief Last Cracked [XakFor.Net].exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe Predator The Thief Last Cracked [XakFor.Net].exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe Predator The Thief Last Cracked [XakFor.Net].exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cba98abecf58f6478530ccd0f4c96e8400000000020000000000106600000001000020000000d942d7679202d13bb581313fe02568f140d70ac9f3d0850d7f77dd2e5abc73a2000000000e8000000002000020000000d5f8c479e7253eb6d74f7a652060d3a8c23c67dd1c091e084ca19a28c43f9df520000000e3f2246ecb71ce91b527688de53a4fa0a4979a039581baff742973d19370a69f40000000dc316eb5b57b8b673336a4efa009f3f1f9b834e4ef4eec4d424fce82357982d7ac7e8f8b6bff5447aa9d7a5102c52a173a9745910fb60d331dd0d910b9a64daa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff7a000000220000000005000087020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C80C1C1-1CA5-11EF-8698-5E73522EB9B5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A52B6EA1-1CA4-11EF-8698-5E73522EB9B5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Modifies registry class 51 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\php_auto_file\shell\edit rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\php_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Predator The Thief Last Cracked [XakFor.Net].exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.php\ = "php_auto_file" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" Predator The Thief Last Cracked [XakFor.Net].exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Predator The Thief Last Cracked [XakFor.Net].exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\php_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Predator The Thief Last Cracked [XakFor.Net].exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\php_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Predator The Thief Last Cracked [XakFor.Net].exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\php_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\php_auto_file\shell\open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\php_auto_file\shell\edit\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\php_auto_file\shell\open rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Predator The Thief Last Cracked [XakFor.Net].exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5 Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.php rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\php_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Predator The Thief Last Cracked [XakFor.Net].exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlot = "5" Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Predator The Thief Last Cracked [XakFor.Net].exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Predator The Thief Last Cracked [XakFor.Net].exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg Predator The Thief Last Cracked [XakFor.Net].exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0c00000050000000a66a63283d95d211b5d600c04fd918d00b0000007800000030f125b7ef471a10a5f102608c9eebac0e00000078000000 Predator The Thief Last Cracked [XakFor.Net].exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Predator The Thief Last Cracked [XakFor.Net].exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 2452 NOTEPAD.EXE 2116 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2348 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeRestorePrivilege 2840 7zFM.exe Token: 35 2840 7zFM.exe Token: SeSecurityPrivilege 2840 7zFM.exe Token: SeRestorePrivilege 2348 7zFM.exe Token: 35 2348 7zFM.exe Token: SeSecurityPrivilege 2348 7zFM.exe Token: 33 2696 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2696 AUDIODG.EXE Token: 33 2696 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2696 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2840 7zFM.exe 2840 7zFM.exe 2348 7zFM.exe 696 iexplore.exe 2348 7zFM.exe 1724 Predator The Thief Last Cracked [XakFor.Net].exe 1608 iexplore.exe 1608 iexplore.exe 1064 iexplore.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 696 iexplore.exe 696 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 1724 Predator The Thief Last Cracked [XakFor.Net].exe 1724 Predator The Thief Last Cracked [XakFor.Net].exe 1724 Predator The Thief Last Cracked [XakFor.Net].exe 1724 Predator The Thief Last Cracked [XakFor.Net].exe 1724 Predator The Thief Last Cracked [XakFor.Net].exe 1724 Predator The Thief Last Cracked [XakFor.Net].exe 1608 iexplore.exe 1608 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 1064 iexplore.exe 1064 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2840 2820 cmd.exe 29 PID 2820 wrote to memory of 2840 2820 cmd.exe 29 PID 2820 wrote to memory of 2840 2820 cmd.exe 29 PID 1344 wrote to memory of 696 1344 Predator The Thief Last Cracked [XakFor.Net].exe 37 PID 1344 wrote to memory of 696 1344 Predator The Thief Last Cracked [XakFor.Net].exe 37 PID 1344 wrote to memory of 696 1344 Predator The Thief Last Cracked [XakFor.Net].exe 37 PID 1344 wrote to memory of 696 1344 Predator The Thief Last Cracked [XakFor.Net].exe 37 PID 696 wrote to memory of 2300 696 iexplore.exe 38 PID 696 wrote to memory of 2300 696 iexplore.exe 38 PID 696 wrote to memory of 2300 696 iexplore.exe 38 PID 696 wrote to memory of 2300 696 iexplore.exe 38 PID 1724 wrote to memory of 1608 1724 Predator The Thief Last Cracked [XakFor.Net].exe 53 PID 1724 wrote to memory of 1608 1724 Predator The Thief Last Cracked [XakFor.Net].exe 53 PID 1724 wrote to memory of 1608 1724 Predator The Thief Last Cracked [XakFor.Net].exe 53 PID 1724 wrote to memory of 1608 1724 Predator The Thief Last Cracked [XakFor.Net].exe 53 PID 1608 wrote to memory of 2348 1608 iexplore.exe 54 PID 1608 wrote to memory of 2348 1608 iexplore.exe 54 PID 1608 wrote to memory of 2348 1608 iexplore.exe 54 PID 1608 wrote to memory of 2348 1608 iexplore.exe 54 PID 1164 wrote to memory of 2116 1164 rundll32.exe 59 PID 1164 wrote to memory of 2116 1164 rundll32.exe 59 PID 1164 wrote to memory of 2116 1164 rundll32.exe 59 PID 1896 wrote to memory of 1064 1896 Predator The Thief Last Cracked [XakFor.Net].exe 61 PID 1896 wrote to memory of 1064 1896 Predator The Thief Last Cracked [XakFor.Net].exe 61 PID 1896 wrote to memory of 1064 1896 Predator The Thief Last Cracked [XakFor.Net].exe 61 PID 1896 wrote to memory of 1064 1896 Predator The Thief Last Cracked [XakFor.Net].exe 61 PID 1064 wrote to memory of 1652 1064 iexplore.exe 62 PID 1064 wrote to memory of 1652 1064 iexplore.exe 62 PID 1064 wrote to memory of 1652 1064 iexplore.exe 62 PID 1064 wrote to memory of 1652 1064 iexplore.exe 62
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Predator The Theif.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Predator The Theif.rar"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2840
-
-
C:\Users\Admin\Desktop\Predator The Thief Last Cracked [XakFor.Net].exe"C:\Users\Admin\Desktop\Predator The Thief Last Cracked [XakFor.Net].exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://xakfor.net/forum/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:696 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\panel v18.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2348
-
C:\Users\Admin\Desktop\111\Predator The Thief Last Cracked [XakFor.Net].exe"C:\Users\Admin\Desktop\111\Predator The Thief Last Cracked [XakFor.Net].exe"1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://xakfor.net/forum/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5841⤵
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\111\robots.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2452
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1680
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2904
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1288
-
C:\Users\Admin\Desktop\111\Predator The Thief Last Cracked [XakFor.Net].exe"C:\Users\Admin\Desktop\111\Predator The Thief Last Cracked [XakFor.Net].exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://xakfor.net/forum/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1064 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\111\install\index.php1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\111\install\index.php2⤵
- Opens file in notepad (likely ransom note)
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
503B
MD5916677d47bd9cb7e6f21449554150593
SHA12b530a0ba55fb32570a317f13d03686a78cf955e
SHA25619d5705fb9927367745b0681f7880b250307e7e42b9206f47e48953b66e0b1dd
SHA512ccc3a5a5f7d927fc6650c6342ebe949b67ae5d14c1dbf5705a3384aedb9fc709c79aee274819326842e897b4983456ac72e1137d08010a317d984fa8608c6134
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5ea2377588986bbbd4c35afe089500440
SHA1095cea1aee601e3b673b6b66dfa495d5b6d09728
SHA256df4d4f5854abb254e5e26245517ee89305b8a59ceb3c6626eda3936765f6806b
SHA51245161d1f01af958b91389e3e53be65dafb7deb0e623dd9ffa6f777b843181227cb2c030efb6e22ad0ab4f6ba11be7c85c938780b5946d61059a781ff973ebb12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1946F523093CFC22C17C0B994AFAC47D
Filesize548B
MD558184e312c15ab746cc97c4e8903afd1
SHA107410a2a47dfa0ad21423b99d8930770388ddf75
SHA2561c02bc2a2d967a408fb72767a06d55852db4b8e057b84ab6da0358b1c3255a4c
SHA5128ce6662b2a523fb15b7d165c3febe7750d43d24696568fbdbbe63997c2059eb2b0ff1c23f804d351e8cd7cafd0b770ed236b8304c817fd46f54301cd6b318e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5059b1a1d074efc5a2ce53b6a1d578be2
SHA1931d837e085a075fed82bd46628d1803144cb85e
SHA256ce3ff42b5adf4f252faf4e10c1643649b8c8be0004c7a4a4c1ed4b489c7328a4
SHA512273be209b0d1b3f2c96b61922cb5e1b45ab2b309fa3d25f3a80170c5f9a9d540866a8d665f2bbbf390104929a1abdbda80de2abe530cdc43362f1a3b6f6847d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e3194d9de4566697f1b4977e6518d71
SHA10ae04aab2253942173a794c5a43e1505ef60a03f
SHA256f2c8686b7afa3f9a9da93de4068ed12bbb496ce044fca887b368bf6264b3264b
SHA512d3a8c9c2efbbc1609cf4a6df2ebdbe0d3fed8ae78d29e58618c85b75dccb90d1eca1333295923cfcc1678fd5cf16a23b69c0757c4de37f250b21e7fd8af6b623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5660851247393f576083d8a671c42381b
SHA15587f45af98980211dfab2b6cd349bbb0759ac29
SHA2568fd9119ed8dbc55dd5e6ac3b24deccf26028e29468a015ae40391ea9e65633dc
SHA5122ec238f47780989cfe88fd7e6eefad969bab8d3edfc133dd79b735bbe42415bf8948204651714520eef079dcf1b288c2733ada9f759c9fb29719c9df49768268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598966c06b55b0183473031963093fc01
SHA1ed41ad05a7cc4f78580368424faf25060e2e1426
SHA2568f0282898a94ee66fb55a58771522b88cfd4b6ed2ff1bf64c01c253d8e89df75
SHA512dd4d6aac95f84deb84df64522cdd69fb10d8c6fe97ec97ca54655bbd848399ee00e6e74692ce5b7341bae07c1a8789f9a1ee8f5219e9d946285f8c36d9e55661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575ae65cab3983e220298d1036800cde6
SHA1c8396dc7971344ea09cbd32dfa651bd16453c522
SHA256a1f2acfe6a398904de8b1f112f0e522490ced9ab038021bfede1b53aaca83829
SHA512c940b1b45e96c6074319b9fdfb87efdf1e520333295dff404397b1f0ac75db1e63b887aa51dfd9901a05a287c49368bf506c237621112a119094966c1a0b0e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5931386ccac5350ddda06decffd64a13c
SHA1d6167dcd946e89bb67d2c303b2410b59fdf626c8
SHA256dfe5aa1e5558395f273fdda9264463ab3436e5b10a4c463ba64948b2395cd987
SHA512dde74b1134dcd0d4646e24ac5e970e4462ced3132e83d974da93670c42148f0296f659f20468c4e5148cf9470fafc1243999e10b70970cc1b3eb12f82ae0aec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a380f6959fba4c3f56c31585fe9a1fd
SHA1beada24f109e85d99f2ef4f7afaba23a77c31f24
SHA2562a24be8f668f2e189dbf32709057965cc716da69592f4c142292c00e6ea0c5be
SHA512ac515c1326efbca5ae0182c0d0bb440fba4ed85fdd795fabb024524504033270f34a42bcf48c47e7c710e1ee7bc1af57c431310d17a97dfeeda38280f3dd829a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd368cfe6c305032311ab60d266804f4
SHA17ae40c580b217d301f0ca5f193a0351588087f07
SHA2564ca60178b24f66696647d8223c60767b311ffe7597990da8cf4c02cfdeed3805
SHA51263bbd1841d3908bfe2a1907914653b42bb0cf502dc410d0895989030de121c65ea289c74f78ba350f023a5f2fa15c33cef6e2bc8f40dbc18c2474b87442ab7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5075dfa75a6aacbdcd492d0c38da9efe7
SHA1e4fc866dcc0083905f8b5b3f8339de866e09f608
SHA256ff37077aaada9d5a7951a6c63f94ec9d10156f768cd504df134eb599f752b6a8
SHA51256488bf05be2e8fb96eee505db3d0778a1a48b73a697716625b2cfed6f6fe02e75d7660abae8a6867eebae2d9cfb324dd224e8378fbb1b8e3fbd485838ffd407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566b7a99b8db0c8607fed392cd0746cd4
SHA1c1b63057d601b818af31e99708bc2a3e41c5fecc
SHA256064412d36ddc0d52537c1c625226755efc6f1a9d203ee49ccf82d7409e05fba4
SHA5121e18d69f7b6a6ef249dc840156b02af01ed440a22e2e4fba5b909b3d511249eddf1e3663b46b1f3138a3fc3cd48ba856574b6ab4155dea5fa80efd540cc41a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551d78cfad129d9a5defad3fdc88b01f5
SHA1f395ba2732677997de9c0eccf7fe2cdf211e5762
SHA256ddef3e8bf4e9e843304ebda13b0a0e79853b88b5b37fd33e7e280fd9625d44bc
SHA51237aaf82935eed482193347d4239c745ad8a93f11711078e7c03000cc6002cad5cc9091dd4e528b68402249219fb4e2e2030873fe1b8932a87f03fd09a2e5fdc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524f2146e1595b2c2eba9ed70efe83368
SHA1ef4a9c8047b6e06ea02b8d6baaf1923307f960d2
SHA256bad742bd188d0e033dc09f7fa4d2a12dd173c67f6eafac6c2e586ad799b2a0bc
SHA512abf9d723475410bc243b255bb43a35499e3d4d2df71f06e05dcb5b4f9d6f682db11abafc3d444b410791721470d0366298b8b150ee681b6cb350bf04f35a2b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bb3f6ee2ede2743f4bd6b7cfe85863f
SHA1d39aad479a8956d96b8aed4be54d125e624d55ec
SHA256bc9f6740ddf3ab93c9b347c48bda7d50398d073d16cd5b4c6364a532bf01afe9
SHA51252f6525a8f98e2e5ee06f53e57175b5b9efd4e9dc072701a101f6f1336764d6adf6831a1db1a71d45ce4df9a3d08e75fdd071f0eb6f01516da088011c903015a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bee50cdb4c3bc9ef2e53868f1b301e8a
SHA1fadf6c9b0cd2895abd925d4f8b770b7ba45336ff
SHA25665a34482447bf820f784c3c6db787fc0f76f0659bab11ce6b92e4c5b77923a57
SHA51285cf491f5582574738952897b9f9a3cb7473032e0b9d4fb02212a32a117fc77588dcb9db190cc25ca0ba4b4d8919114b5346a412e290e3019b729bb54139ae23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5418420f978bd9cac53e347a44daac8e0
SHA1cb20852ce54255fe109cf16140af433e47cc3507
SHA256d93f87a88facb718d5481b1fba56ebfe1bd95c668b800eca2363800228e61fec
SHA512a6cadee871aafbacd92a4db05b96c65a6a18cf5317f2dc0b049473839e786ac275c5faf6de24e896b30894425ee844aa75b552bbcc524a89ef487fcae613a4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af15c9da323fdceb3b5540d16c82771
SHA1715c4bd619cf6904dfa9311231df3c690f37df19
SHA2566defd3cc951560b64128bc93705f1a4c8df45318808433389aa4efb8ef1d8175
SHA5129c859e79d262488578bd4c4a58785c61e5f05a857a7b5e95372d123630467edd1b621adee7627989adb16146fbf972a424b2af6c616cd757fcbe276643e9d948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fe13190986fd91565f140dee660d409
SHA1d014d7686eb81ffa380caa8ee9ec0ee5a339170e
SHA256da012dbfa3a5d783f7d02d181b8560ab6ccddd4fbae730e6185425acf4336b49
SHA5128a6826f9d3ba65b383243fb772d94840edce17feae26131a9548d65558d56712de115f5cb53ddbeb6350370bc28bf1c1558c4cc5a6cc12c0d23214fb63827690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a58e0018f2ed7d2031de8dbdb47fca43
SHA110ce90425233f7c592079b10b3d0a00cf69ba74d
SHA2563b99adb6c9422d26c9a4f1e093c73e6d5f12b0330b15083ef12ba41407f3e2c0
SHA512cc63baae84f1a1b704999e0725e5686b52ab3bfd903534f0cb1eadc727e5793659aaec0aa9b6beaf5da8c05b18880a544c97fb1c1cf3c85bfe633929bd06b616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f622d98e071dd9e32117d814635b1ce4
SHA1670b265a5540106be759e5a58ba2396c5c0a7b41
SHA256fd06a5dc3053d65c31739720335c4d9b7eb0208212a434577cff580bc9147aeb
SHA512245b1b81cd7f7320f50b9d590b77921126ec33b7974d1a03edef7d5a9ed50541a410822bc4dd667b828426ab39793fdf18048d51ca558e2bc428faebe99a916d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5348da6b0485ac66a46dd52ca79e15506
SHA131703b458dd443c0def7b582fef6d07d30f3d151
SHA256794faebb3e4811d607889a532d3ad4a6dd2836ab82d7618ea873d5fb2428f8b6
SHA51213f488b57c00d266e2c11d65e33d26113a080cd1320c2af8112e9706b6d0ce8f95482e53d385c992723fe95ad6520b0535ec8baa47d522e343167f2ff0757993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b674458956c1dda2cda50483b0628fd
SHA1671d89f077d0bb8a81ae2f3e26f8698fd0be0c2d
SHA256319974102cfaf15fb413e4672ec81b758b4bdbb5aa342aade7433c1406ed3aed
SHA512e564d21a33ea188c01b9e9ebf6e1349658bae86c45a32ec12df6da6a9f142f9443a9402774949a9a5df5c420bc9017e4eb2ea859070b6e06adf1facc3fcaf340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53f2c819eadd6085b519c570b36249531
SHA1791c453c8937b0d9535a08271bb7ac8989e50fe2
SHA2563159bc201d123afa931a16626765c752c8fc2a3c5e526c3f24a0c475abfbcae0
SHA512d614051cfccad6e8d13cf35b8c300f0503e1db379e2ff5c75a4d4232d3424bf5d27837d2218974e805a5e1e2fc712fb09b283add5950d1dbe18686f415be9b4b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{BA76E2A0-D0CB-11EE-AB17-C695CBC44580}.dat
Filesize5KB
MD5699b4fc3a5c1d6b7056f72c0c326138d
SHA1ffd53260c4aed5ae3f5c22dda9e60e165cdaa7c8
SHA256e6f9a4a38d63d9806e6aca7c8a4ac950b38533ebaf76f1eace999fc98dc9c816
SHA51268533a703e573a2ec0f10f11d7c48026a6012c0ea723bf1fa899fb892bcdcc8ef69449a795c0076958935bdaab24cbbba4e4e0cddc9907f0d6e30bc128820eb9
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{A52B6EA4-1CA4-11EF-8698-5E73522EB9B5}.dat
Filesize4KB
MD54f2c41b8ac9d68bc6e71a4ddce8dd353
SHA172fa0743b859f9e516e48d6c225f48de1c53cd43
SHA256eed67104a1fc12afa9a297b4492be4db6ad0febbd24f4738af93dafaba7825f7
SHA512c60d17594c51b1a6c0f1758ca455678924ec0c152a5c83876ff8debc5be93bdf07900672f460e8771f9c3ee79e766e6add33e04d31bf0aeb011c6b971c6d1be8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9M0HR0P6\forum[1].htm
Filesize478B
MD559e81a2425c9ccb169aac17cc1fcd7a1
SHA16b450f2ec8cb815e124725e0263eb8accc690ada
SHA25641f1589d07c3b1309be385ea67becc7c9e8a856fc35a1e354933b80925fef013
SHA512e86124a19e1d082c846293b09ebbc6f1c847982551cfe36763b6e22cf5473a37bc7ab29f67e2201263130382e2273bc14d71c8836c0a0094e49da5f08487250e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\bkuKxPQGb[1].js
Filesize32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\forum[1].htm
Filesize478B
MD5a2a39e22e439384621c10b539cb932d3
SHA1431f1636bf57c304534ec03b6dd410b71e4052c6
SHA256e12571a76fbf5c625c6b1559a94ec65a9b7cd9142e378b96d302c2f44f861821
SHA512375317c170bcd9f68d48170ab2e99a693982034b4fadd87219c4028a9c9adc417dfa21ce5b0f917f54f016c9006e97772f457e4b07967da90b020cb2d43a6ce8
-
Filesize
13B
MD5209634bb0238704c4874c35d615ae59e
SHA1ee9a29b31d78b2e52120610ed51f732453580f7c
SHA2566b817083ef9d947002e5ffe1e216de9b1ecd9bba813f0d8493b25dab83001699
SHA5128e174de2599d239acb1aa28ba98b6159a57d220eaaed49f100c669814b04ba7cecc4988cf99eed9845bbf6a59e3b7f4950fd8f1afeaf53d1c82b2e361d3239ca
-
Filesize
123B
MD56b37309700ffdd85eed2431b5dfd3bb1
SHA12eaf914fe507a09f321684b8add29b94cee50db3
SHA256c703afa89e7517dd5020ac2960b7e14b44d4010ef02d5e0f6e34b9629935a3ce
SHA51279211ac08ef90a01c9ab0bbb2f2bc437b696c9f5b1193c1d98659428ea3ba5a1db7a6659d8b14f5c4184c577ef6caff456439654b84c986740e7a2a50bd92060
-
Filesize
1KB
MD52959c87ab5dd5cd83281917cd7624206
SHA10e492374c8b650270f37ba5d8dc464874fd81c4c
SHA2564b93e252876f8110c61498a1c2a98cd8c383310b3e24b259658a0cb88c6f419b
SHA51250892a503d831e22d6e5ab7c73d42da2dc01eca18a44800927f5848f1edf09e108ad1079f30111db44d7b4cbd8e0224b6ec9be5584acd7afd97d00619c88e9fb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
20KB
MD5f3defba593e6627fc6764a06bdef423e
SHA1744f5a0348d452d86ab70809321b3767b43ef045
SHA2566f3a57c43834caf155bd50a7cfb9c890f3d56ac9d3c5a533c400943764da7540
SHA5121afea6410da3ad076cad509989289c2996cf352e606b3fdeedfff1536de3f84db26db09b735f3a01e43b8927d1597ced82162c01585889cdabfa485bc0539671
-
Filesize
100B
MD5231e5e2d9baea73936ebd2496604512b
SHA13c52b57c7061713275f1049b4542d62a1f02b584
SHA256d2384e59924a5918cac5d2c4a8f67ce2a160638a9d544b2b6d82aceb17371603
SHA512e54d12a912681cdbd105a8ed4e17a80557cf4de608252ed9a5e9c486280110fedce5249ac551293f0db8294612bd8e7a5e454394dc3369feb703a2d1f3ab6ab1
-
Filesize
116B
MD55ccd3e176d77e85ef92627fc2506153f
SHA1cfe8af4fb9d09c47b1a7b2979395d05c6e592d4e
SHA256c2fc80a408bfee6577ec11cd44b01621ae8eb11504e8cb4b104a45e013d2521f
SHA512ba47aa67047c4c6acc3b8ed526d61f74803de7edad1f3cd73e3b10b9084ee968a0a1d38f8d98c0224f26387a1c28b85929498154f4e65281c5e2928f05ffa2ba
-
Filesize
115B
MD5460ef863ab451761e37125d60bddd21e
SHA14c5d60ba7fe19b37ec6766ecbb55b961727c0ab3
SHA256646debfb390b76c21cb3da85536f2db2e1083cb2623f3e1f2d2d5157dea7248a
SHA51203f3b95a67093e872a7ab95da1213a66a770fe77a6ebc17ce70433afe71f924c3b9a90b6215a19c98ac4aeb9369f8872957252ee6e6d03dcc5518c6864a444c8
-
Filesize
100B
MD51ea7d937d028afb09ae1aca65ada4e0c
SHA1454883bda51c84108b89ebd36cf4112d1b1ffae9
SHA256dec995421730d6e9ba6c852d2952e5cf601853f3bf0cfefa878fd493da36f1c9
SHA5128c1bbdc7499d742c4a48495920324779632dc7a230b0ebbc2f6ca01b34e834123d11a964f4b8d863993925fd0e6c583a71394749b610249a7e0960934fbfa0e4
-
Filesize
10KB
MD51b664aea09497784d770ce53ceb444b0
SHA15e6c3c672ce034b33d2a6701bf183e62157eb88b
SHA256a37d47d6748d36b0d6beaf69121433b86c09a4bd70a92dfd94d60798925c02a1
SHA51211560991a624bd4a642c42c6393b236c3cfce75de289a26ea1dfc975a1fba2f00af9877d903c3e5963775a6fe65797b95355a8dad2aade5442265ad46cd46bc1
-
Filesize
26B
MD5bbbcde0b15cabd06aace1df82d335978
SHA17a54e2d580b1ccecb62fe3fbb7b98fe569630744
SHA256133e4db054e73a10017a1f429c80c35cd5bfa9c3a1aba581b364ecc459c48a4b
SHA5129d2e24f78ee75c05bc7be4a8c6050159709331c13b891df77c4eee30890e4b4bc7756f1443738474967b364e0f296ffdfd3d630248be77ecc11476682fd7c8a3
-
Filesize
276KB
MD511f2180a9c66bdf1f3c2c68219522268
SHA1398bc882c874a4a1109257f68ad006dd3b245776
SHA2565efbd63930e9664dc4ff598b7427aeaa6e44b4754e18f471dd245a2f2a21cf14
SHA512a61e15e7ef55198e9e37f70848a7f976f5297cc33ca44bbad856f03e314d27132584950e836e7db2df3f0c09e710463b629613f32ac82cf75be18893350b780f
-
Filesize
2.2MB
MD5f8df8488f2a0abb03b6fc03fa0c5d76f
SHA15098b760e9bff46e836303f3adbb41551068f37d
SHA256c05350c96e4f3cc1536068dffed18756739c61923ec61aa86cdb989e032d9af5
SHA5125ea65eca3d71084638974f685353d467e588858c786a297568ae9b4e28a0e8f7e49ad967d9a4970661f742e9f52e32eb363705c0c4afdd68ff2f2aee2f1e1ccf
-
Filesize
6.6MB
MD5312c6314befadbe3a937c16251002453
SHA15301207f0dab233b953c61d91ddcba6c75bf22a2
SHA256246a288df8698e7fec02bb4054e27db02f5401dc709543a7cdf4a01563c6c3f7
SHA5122c70c79e59e38d88f5a53c6aab43f6e36e418e576716992562236258c07017e5a13c4ca74186db1e733689055a0b05e5ac496d1a9fcc8e615be9b00cf9cd4525