Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe
Resource
win10v2004-20240508-en
General
-
Target
1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe
-
Size
573KB
-
MD5
503f112e243519a1b9e0344499561908
-
SHA1
8d635ca131d8aa20971744dcb30a9e2e1f8cd1be
-
SHA256
1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc
-
SHA512
71da9efbc24bf3428f7efd08f47e6dc698cdae769a918800de72ab4945fb79c2f5b92d21a839d9e13e700b3cfd6ae365073c32a6f368e43830c6ccba3322d00e
-
SSDEEP
12288:BV0qnXKTH2P6rxTcQpXDHgswvodgnAdA:BV0EMm6rxTcQjos
Malware Config
Extracted
C:\MSOCache\All Users\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1980 2796 powershell.exe -
Renames multiple (8623) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 47 IoCs
Processes:
1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Videos\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\EQ2PZD61\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Links\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\2RM92H5V\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Music\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\BB4W7M7Z\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JWM3U1DD\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Music\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Documents\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 64 IoCs
Processes:
1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Fortaleza 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-swing-plaf.xml 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\blackbars80.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01143_.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_right_hover.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\square_m.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ENVELOPR.DLL 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Brisbane 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_es.properties 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\slideShow.html 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_close_down_BIDI.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Author2String.XSL 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0215709.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\de-DE\Hearts.exe.mui 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\timeZones.js 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files (x86)\Common Files\microsoft shared\DAO\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\ImagingDevices.exe.mui 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\bNext-down.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsPreviewTemplate.html 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\HEADINGBB.POC 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\VideoLAN\VLC\locale\am\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer_settings.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-BoldOblique.otf 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152688.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0234376.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\slideShow.js 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_snow.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\ReadMe.htm 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\calendar.html 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\REPORT.CFG 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Cape_Verde 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\SpiderSolitaire.exe.mui 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\vlc.mo 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0301050.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\THIRDPARTYLICENSEREADME-JAVAFX.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02407_.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\Maple.gif 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Manila 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+9 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\MyriadCAD.otf 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME34.CSS 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN00853_.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02069J.JPG 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7db.kic 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_top_left.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0149118.JPG 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\redmenu.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\navBack.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Port-au-Prince 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EXPLR_01.MID 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\FlickLearningWizard.exe.mui 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exepowershell.exepid process 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 1980 powershell.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2856 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 1980 powershell.exe Token: SeBackupPrivilege 2668 vssvc.exe Token: SeRestorePrivilege 2668 vssvc.exe Token: SeAuditPrivilege 2668 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe"C:\Users\Admin\AppData\Local\Temp\1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5de49e2e3eeb866fc517949893ed74bed
SHA13b503e6776a34f026f77ba7fea719dec182575e6
SHA256994010aaf2f723b06ace4f35eba28068160c38714fda8d62205b3b2e7b96b07e
SHA512f4c59b0f90ff8f6e05106c47160c239da0b5598845316a5a8705bde5f47378596fead491db828f4ab35ec84f796a22907210b51729d4c023c7ace68dccc1f9b8
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.akira
Filesize28KB
MD51b7500451276c1864470ac1cca0bc22d
SHA10edbea950d2d45c10f31d76655fd680e9340cdd5
SHA2563f66f8fdc1298495b71c0495ba9892984d728d01c61f3481e049f9c885ee3f8b
SHA512717b1ce80edfbf46a5d72a1bb884cf8d671f8114158b146ff48d0994ea65c1508c4d42716b36a2a36b1fffaa0520572afc2b1ea6b6c4a333f85bedc26ac82c2f
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.akira
Filesize875B
MD5e9c31cf8f3bc0b5220b86e89ea9467bc
SHA18fe4c24851712a6102a6bf1b5f8e8e30611967c6
SHA256495c5e50ae939e924234717a97c1c0831ac759e276a15448db1e1448c73d5407
SHA51259db1c0dd2e23a0c14e2bf57fd89e5d226f0efb1434eaa526e9d5d1145360baea3d08ef558ed5419a78256db077ef5c4f07be82370a1df48ab431c1fd1c68925
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.akira
Filesize756B
MD51e29c791793adff806e590eec8825237
SHA1de0a22213f53af914f584c3d5461a0d49601d9fb
SHA256a0a4915c05778c59a5deff93f8c5390dc7a4ab05720835210a4c9d30cd7020db
SHA5122c97b620d5df913330f6d13f0de4183f83819fe22598d7621719830278661564c5e91d4e7421abc08fb7a6b0a019f5e0dddcc6226dc09d32919c5195c09c9a2c
-
Filesize
648B
MD59069ebb2bba73570cc67348887182343
SHA17cd0bce978629764870c4f04c0d19ca557ac1500
SHA25628ef7c8518cda39f3da615827a55b5467d4a508b99d36662ad15fc1f17c2083c
SHA51201a484cf65dda61e4de713572406dcd00a53a052520fa6301980a7f95742a41268b579a606c659e40deacf59d72873ad76a40311b5094dba57559c17d2ddb03b
-
Filesize
647B
MD5d6b03d9ce4f59f79eb9579a14b7ed7ec
SHA12a20ba5fe5c9d180330c3e20204d85ca9d407796
SHA2561515bb2850f2b297b87efd2e8f3080f93de6d3431e013b2dfb4f66de647d4655
SHA512cd974697eeb121d4e93f7e3564211cd10b151c59600c2f54751a0266e8f25f066d3a8ec721f1bdc578c7b1d9e71c0cfd932dbe795049762f293d24d607fd74bc
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\BUTTON.GIF.akira
Filesize719B
MD59f6847327b3bf83289de7c1826a0b1ed
SHA15e7ff79afe9ac1d1f7fffe4620fdc96e01deca2e
SHA2561b1123a4f5a2cc1cf2074089cd14f45e3f5d306aea1ea5878acb3e274ab7f47a
SHA512a2fb371df392778ae20a154d2cc62e6f08985f97c6974533ce5f2f4f9bd0a0f8e5abdfe3fce02918fc7369ec4a64c0ed30bd57ad0199b80100e362fb8f1c50e4
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.akira
Filesize1KB
MD5126edaa6967e73e06849ad4f3a66c328
SHA123caed6dcc46cedd513394de39e233fbb808cb1a
SHA256e0ef7948c8274e659ea1a34bfd7c1a64fcedda0843d175187fe196cea1ed9aeb
SHA512f0ac877c3a3908a6ce58459a767fca10ce85513ffad9d388e36c913e3adea147363178145bdab49e84f02b47aa6fbc4fb300db90b764ecc9987d2a4a98c4b165
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.akira
Filesize1KB
MD5ca4a86213d9703d1e3d03c0485968d81
SHA14ce5676886576ab9dcb2abea0a335367618da7de
SHA256eb5d394cfb6b0475e7910ec17a500892fa6ef1373dda14dbedce1701472739cc
SHA512134ccb04f096cc99c50d25c682315cbb247573ad7f7359fb3e36b51fb171ed4121974c7fdd654ce8c095f36793f8fe4c27932934db506b71a4b4fcfecb7d6b5d
-
Filesize
1KB
MD52faa51c30ab62f5b8cb72a954dddb8b6
SHA13462f2c7f2b11bce00a93406fffcddacecf5e9da
SHA256022e61a079c03f0b6bcdb6c2302a2e84f5913524d228fe4b215492fc9dd73aae
SHA51256dbe27ed719f9a664354dc1aac3b08ffe1b0c77527a8191c23223746c25d16f0ee1b5b5defd4f503d01ad0ea8e4d0f8272e67d86286bab0a57b269af232a17e
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\eclipse.inf.akira
Filesize591B
MD5f3d0d788a049f643e9a8e95212807f13
SHA16154dd1c67247873c2d8645cc256f403dd7417fc
SHA256845e89041b911cafce064f55932cb38ca3ee730953bef33948bded450e3c05cd
SHA5123c0119460c983ba2e9826627d4f8d2b9c5c9e3cf9a6d4c9c007a8da13d64d4eb8436fdecad054ca076507e8c90847510b9b1cfd7dd6eb5ee8c831727ef360fc6
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html.akira
Filesize12KB
MD55d4c6eb521aa62ae4d1393f7081c100c
SHA1b18bd7d9433febde19d627c00cc7b85108ae45a3
SHA25638be1eb7df357a928d94ae548d360779e3fac35029fa414fa7a85d47ad2c07ab
SHA512abca9a1ad5e7f9e45a9b1ac7dff2b1983da5eaa0e436044908c76a452cf97a11af6fe88fef08c0e5724fdb8bf64a0ae906913274a1a847aa9942f1816abbfe09
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\license.html.akira
Filesize9KB
MD5297d18f2bab8f0ac047ce6dcbfa23694
SHA16fd09e04ab7591c1d10bcfa863b17876039f2704
SHA2563218f6ffdfe8d00aa491f75b97cfa8a72481efb6e466c3c1dfead5812abba8b7
SHA5124c8dd64979e17d34242e1a772e0f0d681ae6dfc363dd3494cad3396571212680258c9b936eaa4f2a693e095a3a18b694da4010f5cb8b68f4cf7144e725fbaa93
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA.akira
Filesize8KB
MD5d02df45fd88a16d994e261415609f468
SHA15868cf2e46294fbf84f1f6ce7f3ff64c811dbe0e
SHA256ffa0c751e5d101f9e7b1710e5ae7ffed32d25e0fd17aa019b5975bd93407e945
SHA512ccd6c4bce3d05490af6828d362a3677eadc2749582336ad1ca10be84d88f4588a3a7a51705d802609ba9f437a0680a2eb3bb5677a3965257af3e49b7e3038243
-
Filesize
687B
MD579fae8a583b56bca89b7a7a905562209
SHA114e51c61bfa505e9f8ae0bf9c0e8778be4912c40
SHA256c01d730c8c8cbc818334420b82ecf6751de0658164cd664cf8eac96a5f35dd74
SHA512a05e03e3f982d9eeadc156c673f58c18b542860e19e26622113b53de158abeac638ab8571dd9db9db8e7e5e325646f936f4d2ebf0f2816f32f42be67a320cbf7
-
Filesize
561B
MD529544ccc046bad4e3b0f8249d775a2e4
SHA181604538a09074d0b5486ab3345a8d581ffdf015
SHA2564df29e5512a095b13bee843adfdda5038786c3612423942d871a638d75e10361
SHA512b86c5d34fa7221002480fa03989dd558f1943342216f6f06c4c437dda3600b615727d0934975be2913b3e7e3bf241058eb7524fa27758e1459e4cb26eeabeff7
-
Filesize
561B
MD5e935c2c83cc5d6788894512fe23f49b6
SHA1ed7a7d51b26486bac83b1aad02f7d467a92003e3
SHA25658c12edc5ac3f869d8f695bca8e42c18c30b85df8c00034f4a33a920d9826c6a
SHA512874486a62df557c3ddf4069100b36ed824944995ee8ed58f733a0a26dd76beed95794cf88ce68c9e08712df6355e5794f5d01cab16d2f672e5f9c47280a8b9f3
-
Filesize
561B
MD52ffb808e8b6d7664c51e5b27f6a0e467
SHA1c4982241014b5c3e79a37539baee112800571993
SHA256a4471c4bac933fef7ff2b28d3a2dcc3cec2147724969431bf3a7f942d5e0d316
SHA512fffa0c0ba35d148c33fb0782684a8848dca9f91dc9a40cab87e6cebf631d62e6f1ee2397f1629cb0d3cab8d5e030e00994daf6775eca60b0c07bbf50bea1a993
-
Filesize
561B
MD51277f08d556f0e90b438ced0590bb7f4
SHA191711719c968e9faa6ce785dce0377d78321d97c
SHA256caa43bb3617812af9f6c63ad834f3caed9a5bf1d6139e5f33817a20bb8243ff1
SHA512195adf68773641ac2438f6f48117ed7dc534155093628f1f8de04b1c2574c48c5b571a18aa2ff7bf4b8961cf063b04b8d9c5ee701dd5302003b138e6c1c57250
-
Filesize
665KB
MD5bac642b8e1607d1abd32a31d3c2521bd
SHA175cc0758825d327daaa3ec85adb93e7f7fc6a0d6
SHA2568bd29d964209b4d3cd9dcce1eace93e0a63fb295b8a76d5cabe58e10a2ce41d7
SHA512c8e40a4db4b0e8712444f213e1fdcd014d0b23d3aea4e16a237b94f92013d94bc7a3fe2c48fa10e875c100491130562377095fa969b15dc8186057a7c75d0090
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\CURRENT.akira
Filesize550B
MD5f0097295ee3cd87547553b05f6e6bf35
SHA1b3ba054a143f122ea30439528df9ec3764b5c42e
SHA2569c72e89db51be5f4a0878b0ce074ac0868a0f71fbcbd2588c435901ba2705fcd
SHA5125eacbe2a81fa4d2d6004b9dc22d90fa3b65e2937ae74ac92d23fd275ef178cee7fd396cbb8d7f5f7724bb282b4b51431434c6646c0b07f238cf90502af7771ec
-
Filesize
8KB
MD5c906d1195add92bc31b61c46850914f5
SHA12624a1e8241e8247e118341ea241fa78ee57a1a2
SHA25632bf84ecccb0ebbcf28a19f041dd6a37f2185a5802330a1aaf584919640c4265
SHA51233b730dfb47daa48c33a264ce91eb39ca89dbad6e59ffb39691a3f7ef7d4cf39188a225479a777de87af9ee43866356db3fe8fd884a319fdfa2be2668e1283b3
-
Filesize
601B
MD52c191cfae80c8bb05590fe7d651c1089
SHA138e2479cc84ae014cec1c458a22dc80991022aa9
SHA256cd2b05fba060cdff3630cda3b81cc1ed1a31901910427ce99816716cf0e1494a
SHA512356c3c3e4e80835c6a6574760e08dbf4de02d18dc1e94e0f8b3eb6a5c214bd6d599eab21d46f53b05e167d7955e35520e7bf53a94d36b51ac334ff87e85b257e
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\Web Slice Gallery~.feed-ms.akira
Filesize28KB
MD50bc2bdec062e465cb6a80b68a84e7ffb
SHA15418e66f2c6150c33c44894d4846b8e133f761a0
SHA2563f7b3fab57820f6ca7d088e9e6b21c2846d9164aed8147c575b5a79d418c8831
SHA5126e24d5bac5f9eecf35566995a35e756458b329919272a910dbcb814b467c5315da756a87e1bf7e0f6cee4842a9097292cf6607eb0807e89c1137be17cb08c17c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.akira
Filesize48KB
MD5540f171615ba0270a0d980908bfe0219
SHA195f6901c735a29c1485cf5acbce2ffc6377818d8
SHA2564707a569f7718c611644160111e4965477e43cecb431f21ef895e829a064f142
SHA512256dca0481fba3056980ce6d4efb54eebd0c49b5a4ffc762aa8020e43c506c8f7729dd564a7370b2108d793cb2bcc855d7559509fd06487649f97a0f10cf0854