Resubmissions
25/07/2024, 20:33
240725-zbyrpsshmk 925/07/2024, 20:19
240725-y37cgssdmp 925/07/2024, 20:16
240725-y18sjavhqg 9Analysis
-
max time kernel
692s -
max time network
686s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
25/07/2024, 20:19
Behavioral task
behavioral1
Sample
f2b3c6d7549e216fe9e8fb517553a240N.exe
Resource
win10-20240404-en
General
-
Target
f2b3c6d7549e216fe9e8fb517553a240N.exe
-
Size
64KB
-
MD5
f2b3c6d7549e216fe9e8fb517553a240
-
SHA1
c8c59541cc7bb898a6ca98e1bcf9981e1fb78ee4
-
SHA256
b29e8580734a462ecd1834e60e46a5276d5c58d65a89a43fd66e21373c7bc99a
-
SHA512
cd110e425299c12df33a94121cf3982d4a974145c11d1645b9c7cdf57c15c1fe2ff3e5dc386c73be1b0b51d14466c0059665396d9f985903df0b2ddb9339addd
-
SSDEEP
768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeIiKxP:CTWJGpG7TWJGpGjUpCUpS
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Renames multiple (20393) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Sets service image path in registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SASKUTIL\ImagePath = "\\??\\C:\\Program Files\\SUPERAntiSpyware\\SASKUTIL64.SYS" SUPERAntiSpyware.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SASDIFSV\ImagePath = "\\??\\C:\\Program Files\\SUPERAntiSpyware\\SASDIFSV64.SYS" SUPERAntiSpyware.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SASKUTIL\ImagePath = "\\??\\C:\\Program Files\\SUPERAntiSpyware\\SASKUTIL64.SYS" SUPERAntiSpyware.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SASDIFSV\ImagePath = "\\??\\C:\\Program Files\\SUPERAntiSpyware\\SASDIFSV64.SYS" SUPERAntiSpyware.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.exe.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.tmp Zombie.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 26 IoCs
pid Process 2100 _MS.MSACCESS.DEV.12.1033.hxn.exe 3432 Zombie.exe 4432 WINWORD.EXE 2224 WINWORD.EXE 4736 SUPERAntiSpyware.exe 2736 SASCORE64.EXE 4308 SASCORE64.EXE 4904 SUPERAntiSpyware.exe 1940 SSUPDATE64.EXE 2348 SUPERAntiSpyware.exe 1808 SSUPDATE64.EXE 5204 EditRegister.odt.exe 6124 SUPERAntiSpyware.exe 6140 Uninstall.exe 5400 SASC0FD.tmp 5252 SUPERAntiSpyware.exe 4456 SSUPDATE64.EXE 5288 SASCORE64.EXE 5904 SASCORE64.EXE 5912 SASCORE64.EXE 352 SUPERAntiSpyware.exe 440 SSUPDATE64.EXE 5944 SUPERAntiSpyware.exe 5636 SSUPDATE64.EXE 5952 SUPERAntiSpyware.exe 6068 SSUPDATE64.EXE -
Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\control\safeboot\minimal\!SASCORE SASCORE64.EXE Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\!SASCORE SASCORE64.EXE Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\control\safeboot\minimal\!SASCORE SASCORE64.EXE -
Loads dropped DLL 11 IoCs
pid Process 4736 SUPERAntiSpyware.exe 2676 REGSVR32.EXE 4696 regsvr32.exe 3420 Process not Found 2148 taskmgr.exe 6124 SUPERAntiSpyware.exe 4156 REGSVR32.EXE 5992 REGSVR32.EXE 5976 regsvr32.exe 5676 taskmgr.exe 5460 taskmgr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/4560-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x000800000001ac24-6.dat upx behavioral1/files/0x000a00000001aaca-9.dat upx behavioral1/files/0x000800000001ac28-12.dat upx behavioral1/files/0x000700000001ac29-20.dat upx behavioral1/files/0x000200000001554c-22.dat upx behavioral1/files/0x000800000001a163-25.dat upx behavioral1/files/0x000200000001a2ae-26.dat upx behavioral1/files/0x000200000001a2ae-29.dat upx behavioral1/files/0x000200000001a2b0-33.dat upx behavioral1/files/0x000200000001a2b1-39.dat upx behavioral1/files/0x000200000001a2b2-40.dat upx behavioral1/files/0x000200000001a2b3-44.dat upx behavioral1/files/0x000600000001a166-54.dat upx behavioral1/files/0x000500000001a16f-55.dat upx behavioral1/files/0x000600000001a16f-63.dat upx behavioral1/files/0x000300000001a174-67.dat upx behavioral1/files/0x000300000001a176-75.dat upx behavioral1/files/0x000400000001a176-83.dat upx behavioral1/files/0x000300000001a178-84.dat upx behavioral1/files/0x000500000001a176-90.dat upx behavioral1/files/0x000400000001a178-91.dat upx behavioral1/files/0x000500000001a178-95.dat upx behavioral1/files/0x000300000001a179-99.dat upx behavioral1/files/0x000300000001a17a-104.dat upx behavioral1/files/0x000400000001a179-107.dat upx behavioral1/files/0x000400000001a17a-117.dat upx behavioral1/files/0x000600000001a17a-124.dat upx behavioral1/files/0x000300000001a17b-131.dat upx behavioral1/files/0x000300000001a17c-135.dat upx behavioral1/files/0x000400000001a17b-141.dat upx behavioral1/files/0x000400000001a17c-142.dat upx behavioral1/files/0x000500000001a17c-146.dat upx behavioral1/files/0x000500000001a17c-149.dat upx behavioral1/files/0x000300000001a17d-150.dat upx behavioral1/files/0x000400000001a17d-156.dat upx behavioral1/files/0x000300000001a17e-157.dat upx behavioral1/files/0x000500000001a17d-161.dat upx behavioral1/files/0x000400000001a17e-165.dat upx behavioral1/files/0x000600000001a17d-169.dat upx behavioral1/files/0x000800000001a17d-180.dat upx behavioral1/files/0x000300000001a180-181.dat upx behavioral1/files/0x000400000001a180-187.dat upx behavioral1/files/0x000600000001a180-194.dat upx behavioral1/files/0x000300000001a181-195.dat upx behavioral1/files/0x000300000001a183-202.dat upx behavioral1/files/0x000400000001a184-211.dat upx behavioral1/files/0x000300000001a187-220.dat upx behavioral1/files/0x000300000001a188-223.dat upx behavioral1/files/0x000400000001a188-226.dat upx behavioral1/files/0x000300000001a189-229.dat upx behavioral1/files/0x000300000001a18b-235.dat upx behavioral1/files/0x000300000001a191-241.dat upx behavioral1/files/0x000300000001a192-244.dat upx behavioral1/files/0x000300000001a193-250.dat upx behavioral1/files/0x000500000001a194-259.dat upx behavioral1/files/0x000300000001a195-262.dat upx behavioral1/files/0x000300000001a197-266.dat upx behavioral1/files/0x000300000001a198-270.dat upx behavioral1/memory/4560-1757-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x0002000000018d1e-4734.dat upx behavioral1/memory/4432-11315-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/4432-11316-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows\CurrentVersion\Run\SUPERAntiSpyware = "C:\\Program Files\\SUPERAntiSpyware\\SUPERAntiSpyware.exe" SUPERAntiSpyware.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows\CurrentVersion\Run\SUPERAntiSpyware = "C:\\Program Files\\SUPERAntiSpyware\\SUPERAntiSpyware.exe" SUPERAntiSpyware.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini IEXPLORE.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-DeviceRuntime-Package~31bf3856ad364e35~amd64~es-ES~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Wer-onecore-Package~31bf3856ad364e35~amd64~uk-UA~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package-AutoMerged-ua~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-Compute-System-VirtualMachine-onecore-Package~31bf3856ad364e35~amd64~ja-JP~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Connectivity-Keyboard-Package~31bf3856ad364e35~amd64~it-IT~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-UpdateAgent-Core-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-BootEnvironment-Dvd-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-VmBus-Host-onecore-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-DebugCore-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Maps-Full-Package~31bf3856ad364e35~amd64~es-ES~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Hyper-V-ClientEdition-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-MTF-Dictionaries-Package~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-Package~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\SysWOW64\capiprovider.dll.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package-AutoMerged-ua~31bf3856ad364e35~amd64~es-ES~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Wired-Network-Drivers-servercommon-Package~31bf3856ad364e35~amd64~it-IT~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Wired-Network-Drivers-onecore-Package~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-SecureStartup-onecore-Package~31bf3856ad364e35~amd64~es-ES~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package-AutoMerged-ua~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package-AutoMerged-ua~31bf3856ad364e35~amd64~it-IT~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Containers-Server-Package~31bf3856ad364e35~amd64~ja-JP~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Client-License-Platform-Upgrade-Subscription-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-MTF-Dictionaries-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Multimedia-MFPMP-WOW64-Package~31bf3856ad364e35~amd64~ja-JP~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package-AutoMerged-printscan~31bf3856ad364e35~amd64~it-IT~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-VmBus-Host-onecore-Package~31bf3856ad364e35~amd64~ja-JP~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Shell-ServiceHostBuilder-Package~31bf3856ad364e35~amd64~uk-UA~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Wired-Network-Drivers-servercommon-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-Guest-Networking-SrIov-Package~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Biometrics-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-DeviceRuntime-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-SD-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package-AutoMerged-net~31bf3856ad364e35~amd64~es-ES~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-WalletService-Package~31bf3856ad364e35~amd64~es-ES~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-Guest-RemoteFx-onecoreuap-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package-AutoMerged-onecore~31bf3856ad364e35~amd64~es-ES~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-Storage-VHD-Drivers-Package~31bf3856ad364e35~amd64~ja-JP~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-HyperV-Hypervisor-Package~31bf3856ad364e35~amd64~uk-UA~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Maps-Package~31bf3856ad364e35~amd64~it-IT~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Backup-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-IsolatedUserMode-Package~31bf3856ad364e35~amd64~en-US~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package-AutoMerged-avcore~31bf3856ad364e35~amd64~it-IT~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-Guest-KvpExchange-Package~31bf3856ad364e35~amd64~en-US~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-PCI-VirtualDevice-GPU-vm-Package~31bf3856ad364e35~amd64~ja-JP~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-CoreUiComponents-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-Storage-VHD-VHDMP-Package~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Multimedia-CastingReceiver-Media-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-AppRuntime-minio-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Gaming-XBGM-Package~31bf3856ad364e35~amd64~en-US~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package-AutoMerged-inetcore~31bf3856ad364e35~amd64~es-ES~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\SysWOW64\cabinet.dll.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package-AutoMerged-net~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Containers-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package-AutoMerged-minkernel~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-NowPlayingSessionManager-Package~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Shell-ServiceHostBuilder-Package~31bf3856ad364e35~amd64~en-US~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-AssignedAccess-Package~31bf3856ad364e35~amd64~ja-JP~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\SysWOW64\attrib.exe.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-Guest-Networking-SrIov-onecore-Package~31bf3856ad364e35~amd64~it-IT~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Hyper-V-Online-Services-Package~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\SysWOW64\ar-SA\quickassist.exe.mui.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package-AutoMerged-sdktools~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-AppModel-TextMessaging-Package~31bf3856ad364e35~amd64~es-ES~10.0.15063.0.cat.tmp Zombie.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_neutral_split.scale-180_8wekyb3d8bbwe\Assets\Office\Scale.scale-180.png.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\arrow-down.png.tmp Zombie.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\HowToPlay\TriPeaks\Goal_2.jpg.tmp Zombie.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreAppList.targetsize-80.png.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\icons_retina.png.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\tr-tr\ui-strings.js.tmp Zombie.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\xerces.md.tmp Zombie.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedMedTile.scale-100_contrast-white.png.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\pk_16x11.png.tmp Zombie.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\s_filter_18.svg.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\fontconfig.bfc.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019MSDNR_Retail-ul-oob.xrm-ms.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp5-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\root\ui-strings.js.exe.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\OpenSSL64.DllA\ssleay32.dll.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\New-Fixture.ps1.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Data.Services.Client.resources.dll.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription1-pl.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB_EURO.txt.tmp Zombie.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Arkadium.Win10.Xaml.Toolkit\Assets\XboxControl\Xbox-over.png.tmp Zombie.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_x64__8wekyb3d8bbwe\Assets\Logo.scale-100.png.tmp Zombie.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Calculator\Add-Numbers.Tests.ps1.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ro-ro\ui-strings.js.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_CA.txt.tmp Zombie.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsAppList.targetsize-60.png.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-ma\ui-strings.js.exe.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\illustrations.png.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial4-ul-oob.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019VL_MAK_AE-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft Help\MS.EXCEL.16.1033.hxn.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Assets\Videos\Help\Unipulator.mp4.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\ec_16x11.png.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-rtlsupport-l1-1-0.dll.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Xml.Linq.Resources.dll.tmp Zombie.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WorldClockLargeTile.scale-125.png.tmp Zombie.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\ExchangeSmallTile.scale-200.png.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-default.svg.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_SubTrial-pl.xrm-ms.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_1.4.101.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\aic_file_icons.png.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nl-nl\ui-strings.js.exe.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\CourierStd-BoldOblique.otf.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\LargeTile.scale-125.png.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\976_24x24x32.png.tmp Zombie.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fi-fi\ui-strings.js.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\Ink\uk-UA\micaut.dll.mui.tmp Zombie.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\it.pak.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CSS7DATA000A.DLL.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedStoreLogo.scale-100_contrast-black.png.tmp Zombie.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Arkadium.Win10.StarClub\Assets\StarClubTile.Small.jpg.tmp Zombie.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Arkadium.Win10.Xaml.Toolkit\Assets\XboxControl\Xbox-over.png.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\vcruntime140_1.dll.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\api-ms-win-core-localization-l1-2-0.dll.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\hu-hu\ui-strings.js.exe.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\WideTile.scale-100.png.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\FlickLearningWizard.exe.mui.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\IRIS\PREVIEW.GIF.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_17.8010.5926.0_x64__8wekyb3d8bbwe\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\oregres.dll.tmp Zombie.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ms-my.dll.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\sqlpdw.xsl.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\IMCONTACT.DLL.tmp Zombie.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libmarq_plugin.dll.tmp Zombie.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Livetiles\MicrosoftSolitaireAppList.targetsize-72_altform-unplated.png.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_neutral_split.scale-140_8wekyb3d8bbwe\Assets\Office\DeselectAll.scale-140.png.tmp Zombie.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\INF\c_fsantivirus.inf.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-CoreSystem-ClassExtensions-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-Foundation-x86-onecore-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-MobilePC-Client-Sensors-WOW64-drivers-Package~31bf3856ad364e35~amd64~it-IT~10.0.15063.0.mum.tmp Zombie.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Wizard\App_LocalResources\wizardProviderInfo.ascx.de.resx.tmp Zombie.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\JA\System.Configuration.resources.dll.tmp Zombie.exe File created C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\adodb.dll.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File opened for modification C:\Windows\ImmersiveControlPanel\Settings\AAA_SettingsPageDevicesTouchpad.settingcontent-ms.tmp Zombie.exe File created C:\Windows\InfusedApps\Packages\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\models\en-GB.mail.config.tmp Zombie.exe File created C:\Windows\InfusedApps\Packages\Microsoft.ZuneVideo_10.16112.11601.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-36_altform-unplated_contrast-black.png.tmp Zombie.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\reflow.api_NON_OPT.tmp Zombie.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\WorkflowServiceHostPerformanceCounters.dll.tmp Zombie.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Providers\App_LocalResources\providerList.ascx.resx.exe.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-BackgroundExecution-Group-Package~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.mum.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.XML.resources\2.0.0.0_es_b77a5c561934e089\System.xml.Resources.dll.tmp Zombie.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Providers\App_LocalResources\manageconsolidatedProviders.aspx.fr.resx.tmp Zombie.exe File created C:\Windows\servicing\Packages\HyperV-Storage-VirtualDevice-SMB-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-Client-Features-WOW64-Package-AutoMerged-printscan~31bf3856ad364e35~amd64~~10.0.15063.0.mum.tmp Zombie.exe File created C:\Windows\InfusedApps\Packages\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Icons\Star-Club_icon.png.tmp Zombie.exe File created C:\Windows\InfusedApps\Packages\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-24.png.tmp Zombie.exe File created C:\Windows\InfusedApps\Packages\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\Resources\RetailDemo\data\en-us\3.jpg.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\System.Windows.Forms.tlb.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\fr\System.DirectoryServices.AccountManagement.resources.dll.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\HyperV-Guest-Shutdown-Package~31bf3856ad364e35~amd64~~10.0.15063.0.mum.tmp Zombie.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config\Browsers\chrome.browser.tmp Zombie.exe File created C:\Windows\INF\pmem.PNF.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\InfusedApps\Packages\Microsoft.People_10.1.10531.0_x64__8wekyb3d8bbwe\Assets\tilebg.png.tmp Zombie.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Wizard\App_LocalResources\wizardPermission.ascx.ja.resx.tmp Zombie.exe File created C:\Windows\PolicyDefinitions\ja-JP\WindowsRemoteManagement.adml.tmp Zombie.exe File created C:\Windows\servicing\Packages\HyperV-Guest-DynamicMemory-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-Store-Client-Package~31bf3856ad364e35~amd64~en-US~10.0.15063.0.cat.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File opened for modification C:\Windows\INF\mdmmcom.inf.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\InfusedApps\Packages\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Microsoft.Advertising\bootstrap.js.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\HyperV-Guest-TimeSync-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-Embedded-UnifiedWriteFilter-Merged-Package~31bf3856ad364e35~amd64~it-IT~10.0.15063.0.mum.tmp Zombie.exe File created C:\Windows\InfusedApps\Packages\Microsoft.WindowsFeedbackHub_1.1612.10312.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\InsiderHubAppList.scale-100_contrast-white.png.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WPF\it\System.Speech.resources.dll.tmp Zombie.exe File created C:\Windows\Prefetch\WFSERVICESREG.EXE-122A0E00.pf.tmp Zombie.exe File created C:\Windows\servicing\Packages\HyperV-PCI-VSP-vm-Package~31bf3856ad364e35~amd64~it-IT~10.0.15063.0.mum.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-Foundation-x86-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-ShareMedia-ControlPanel-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\INF\mdmcommu.inf.tmp Zombie.exe File created C:\Windows\InfusedApps\Packages\Microsoft.WindowsAlarms_10.1702.333.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\TimerWideTile.contrast-white_scale-125.png.tmp Zombie.exe File created C:\Windows\MiracastView\pris\resources.en-US.pri.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-Client-Drivers-onecore-Package~31bf3856ad364e35~amd64~ja-JP~10.0.15063.0.mum.tmp Zombie.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-Lxss-Package~31bf3856ad364e35~amd64~uk-UA~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\ImmersiveControlPanel\Settings\aaa_Classic_{A88F43D0-B9C8-42F2-B9F3-90902FC0B22B}.settingcontent-ms.tmp Zombie.exe File created C:\Windows\InfusedApps\Packages\Microsoft.WindowsCalculator_10.1702.312.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-96_altform-fullcolor.png.tmp Zombie.exe File created C:\Windows\servicing\Packages\HyperV-Guest-IcSvcExt-onecore-Package~31bf3856ad364e35~amd64~en-US~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\servicing\Packages\Microsoft-OneCore-NowPlayingSessionManager-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.mum.tmp Zombie.exe File created C:\Windows\servicing\Packages\Microsoft-OneCore-BITS-Client-Package~31bf3856ad364e35~amd64~uk-UA~10.0.15063.0.mum.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-Common-Drivers-onecore-Package~31bf3856ad364e35~amd64~en-US~10.0.15063.0.mum.tmp Zombie.exe File opened for modification C:\Windows\Help\mui\0407\sqlsoldb.chm.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\InfusedApps\Packages\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-white\SmallTile.scale-200.png.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\Microsoft-OneCore-Graphics-BasicDrivers-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.mum.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\InstallCommon.sql.tmp Zombie.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-GroupPolicy-ClientTools-Group-termsrv-Package~31bf3856ad364e35~amd64~uk-UA~10.0.15063.0.mum.tmp Zombie.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\fr\aspnet_compiler.resources.dll.tmp Zombie.exe File created C:\Windows\servicing\Packages\Microsoft-OneCore-LicenseManager-Api-Package~31bf3856ad364e35~amd64~es-ES~10.0.15063.0.mum.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-Client-Features-WOW64-Package-AutoMerged-multimedia~31bf3856ad364e35~amd64~uk-UA~10.0.15063.0.mum.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\InfusedApps\Packages\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\5664_20x20x32.png.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\diagnostics\system\Performance\RS_RemoveAllUsersStartupPrograms.ps1.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe File created C:\Windows\servicing\Packages\Microsoft-Windows-CoreSystem-SecurityVault-Cmd-Package~31bf3856ad364e35~amd64~en-US~10.0.15063.0.cat.tmp Zombie.exe File created C:\Windows\Fonts\javatext.ttf.tmp _MS.MSACCESS.DEV.12.1033.hxn.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\Downloads\SUPERAntiSpyware.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\SUPERAntiSpyware(1).exe:Zone.Identifier firefox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REGSVR32.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _MS.MSACCESS.DEV.12.1033.hxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REGSVR32.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EditRegister.odt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SASC0FD.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2b3c6d7549e216fe9e8fb517553a240N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Checks SCSI registry key(s) 3 TTPs 42 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID SUPERAntiSpyware.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 SUPERAntiSpyware.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 SUPERAntiSpyware.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 SUPERAntiSpyware.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 SUPERAntiSpyware.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 SUPERAntiSpyware.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID SUPERAntiSpyware.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID SUPERAntiSpyware.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 SUPERAntiSpyware.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 SUPERAntiSpyware.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7086d462d0deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60de0fe4d0deda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1656378004" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1FDE8ECF-4AC4-11EF-B03F-E6651DA5F279} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "428720722" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004fb2f50095e6e24493e53682493ba59400000000020000000000106600000001000020000000ae18d66471c906b6f28841387b51a600347e7d0f373ff222158f37135ad9db06000000000e800000000200002000000086e1b5a56e4f2e4051ab972bf27c245ec4a9ca5401a5654a288a70d1629e6f6520000000420d43e7a9b05cac0afeab5ee89a3525fd282f9d5e261c98bdec304a066aef9b400000004398867cb0557575fe90e0998239eabcae7b6a364bd90a52faf080a096662796e5c21ba911ffad8b5df5c3009dea2f6f8bf78567b0a515cc440ca40d98dc05b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31121104" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001c61a0cdf5194747953063e7bd12143f000000000200000000001066000000010000200000008df7f62954ad0ba42c8b0b36b3e2661c0856b35b0f638088e4ce5da36da1615f000000000e8000000002000020000000bdb36b9bd92bb0dd287a1518f026e27f4db9f958d939bbbfb7c738dc8efbfaf020000000ef8527fab44a80ff82b6877811feaed843d314c68c4336f3d864da44f8003e6e400000000e4c34ab33b6997dd5462f3e78fe9c5be523b25d4c266e71e708d62ad4b1ecc380d6df03222ecd9a559d9c7f2d9473dee6fe36ecf564ef219d2755d8f3a940e2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DFD5553-4AC3-11EF-B03F-E6651DA5F279} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{168FD74F-4AC4-11EF-B03F-E6651DA5F279} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31121104" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004fb2f50095e6e24493e53682493ba594000000000200000000001066000000010000200000007afc7346c31ae9aaac3392d9dfaf5bd0a48cf7fc9950a532008fbcbefbd9874f000000000e8000000002000020000000c3304fbfd0112b7a7e66317c249330e4d171e1a695c09f8108090b64326a1455200000002131db7b77f7fd19c50cc58d2f80b17cefa329251388bd7be6155adef62cf04f40000000ee1aea3607312be3567807768d52d698f80531f6d7259996df1e0b37fc1a450048cd4bbb574955c0e15cda534fe8b47f9f12ae3cd9c27486b88939479dbcceeb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428704127" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004fb2f50095e6e24493e53682493ba5940000000002000000000010660000000100002000000025cbb36780249f6cde657fd8a6cbbd7cbb516f8242689f286ebfd69943b156a7000000000e8000000002000020000000b3dbb5dc60636a9a1a6149e605d289f26645abf521d1a1a2949440a3c43bd8da200000000972cc59ce62b5282cdfc14aea35d16042e929880d76076fc8beae05c14ebb9040000000c78f979341fca21fcf5e40d5dbd73fe1e5330f982e4919e516b536a33c5d108e541c1c10eed0cb266d9ed8473e9e35ec070d7492dcb18490cf55de352c09f5dc iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte\CLSID\ = "{CA8ACAFA-5FBB-467B-B348-90DD488DE003}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\Programmable REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{746C91D0-C4A9-460A-B841-851A2B6F2C4B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\SASCTXMN.DLL\AppID = "{746C91D0-C4A9-460A-B841-851A2B6F2C4B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\{CA8ACAFA-5FBB-467B-B348-90DD488DE003} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\TypeLib regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{746C91D0-C4A9-460A-B841-851A2B6F2C4B} REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\TypeLib\ = "{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{746C91D0-C4A9-460A-B841-851A2B6F2C4B}\ = "SUPERAntiSpywareContextMenuExtension" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASCon.1\ = "SASContextMenu Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\SASCTXMN.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\ProgID\ = "SUPERAntiSpywareContextMenuExt.SASCon.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\AppID = "{746C91D0-C4A9-460A-B841-851A2B6F2C4B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte\CLSID\ = "{CA8ACAFA-5FBB-467B-B348-90DD488DE003}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASCon.1\CLSID\ = "{CA8ACAFA-5FBB-467B-B348-90DD488DE003}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\SASCTXMN.DLL REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\TypeLib\ = "{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\MiscStatus\1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\ = "SUPERAntiSpyware Context Menu" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\Version regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte REGSVR32.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{209D651D-9AAE-47B4-AD74-16A8F03ACDDB} REGSVR32.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\TypeLib REGSVR32.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\ProxyStubClsid32 REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\ProxyStubClsid32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19} REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\SASCTXMN.DLL\AppID = "{746C91D0-C4A9-460A-B841-851A2B6F2C4B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASCon.1\CLSID\ = "{CA8ACAFA-5FBB-467B-B348-90DD488DE003}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\AppID = "{746C91D0-C4A9-460A-B841-851A2B6F2C4B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\{CA8ACAFA-5FBB-467B-B348-90DD488DE003} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte\ = "SASContextMenu Class" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\{CA8ACAFA-5FBB-467B-B348-90DD488DE003} REGSVR32.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\{CA8ACAFA-5FBB-467B-B348-90DD488DE003} REGSVR32.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte\CurVer REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\SASCTXMN.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\ = "SUPERAntiSpyware Context Menu" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASCon.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\VersionIndependentProgID\ = "SUPERAntiSpywareContextMenuExt.SASConte" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}\1.0\0\win64 REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\ = "SUPERAntiSpyware Context Menu" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\MiscStatus\1\ = "131473" regsvr32.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\Downloads\SUPERAntiSpyware.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\SUPERAntiSpyware(1).exe:Zone.Identifier firefox.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4412 NOTEPAD.EXE -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 327 SASDef_GetComponentsDescriptor HTTP User-Agent header 327 SASDef_GetDescriptor HTTP User-Agent header 447 SASDef_GetComponentsDescriptor -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe -
Suspicious behavior: LoadsDriver 20 IoCs
pid Process 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4428 taskmgr.exe Token: SeSystemProfilePrivilege 4428 taskmgr.exe Token: SeCreateGlobalPrivilege 4428 taskmgr.exe Token: 33 4428 taskmgr.exe Token: SeIncBasePriorityPrivilege 4428 taskmgr.exe Token: SeDebugPrivilege 3176 taskmgr.exe Token: SeSystemProfilePrivilege 3176 taskmgr.exe Token: SeCreateGlobalPrivilege 3176 taskmgr.exe Token: 33 3176 taskmgr.exe Token: SeIncBasePriorityPrivilege 3176 taskmgr.exe Token: SeDebugPrivilege 2996 firefox.exe Token: SeDebugPrivilege 2996 firefox.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4736 SUPERAntiSpyware.exe Token: SeTakeOwnershipPrivilege 4736 SUPERAntiSpyware.exe Token: SeTakeOwnershipPrivilege 4736 SUPERAntiSpyware.exe Token: SeTakeOwnershipPrivilege 4736 SUPERAntiSpyware.exe Token: SeTakeOwnershipPrivilege 4736 SUPERAntiSpyware.exe Token: SeTakeOwnershipPrivilege 4736 SUPERAntiSpyware.exe Token: SeTakeOwnershipPrivilege 4736 SUPERAntiSpyware.exe Token: SeTakeOwnershipPrivilege 4736 SUPERAntiSpyware.exe Token: SeTakeOwnershipPrivilege 4736 SUPERAntiSpyware.exe Token: SeDebugPrivilege 1940 SSUPDATE64.EXE Token: SeDebugPrivilege 4904 SUPERAntiSpyware.exe Token: SeDebugPrivilege 4904 SUPERAntiSpyware.exe Token: 33 4904 SUPERAntiSpyware.exe Token: SeIncBasePriorityPrivilege 4904 SUPERAntiSpyware.exe Token: SeDebugPrivilege 2996 firefox.exe Token: SeDebugPrivilege 2996 firefox.exe Token: SeDebugPrivilege 2996 firefox.exe Token: SeDebugPrivilege 4428 iexplore.exe Token: SeDebugPrivilege 4428 iexplore.exe Token: SeDebugPrivilege 4428 iexplore.exe Token: SeDebugPrivilege 592 IEXPLORE.EXE Token: SeDebugPrivilege 592 IEXPLORE.EXE Token: SeDebugPrivilege 592 IEXPLORE.EXE Token: SeDebugPrivilege 592 IEXPLORE.EXE Token: SeDebugPrivilege 592 IEXPLORE.EXE Token: SeDebugPrivilege 592 IEXPLORE.EXE Token: SeDebugPrivilege 4428 iexplore.exe Token: SeDebugPrivilege 4428 iexplore.exe Token: SeDebugPrivilege 4428 iexplore.exe Token: SeDebugPrivilege 1808 SSUPDATE64.EXE Token: SeDebugPrivilege 2348 SUPERAntiSpyware.exe Token: SeDebugPrivilege 2348 SUPERAntiSpyware.exe Token: 33 2348 SUPERAntiSpyware.exe Token: SeIncBasePriorityPrivilege 2348 SUPERAntiSpyware.exe Token: 33 2348 SUPERAntiSpyware.exe Token: SeIncBasePriorityPrivilege 2348 SUPERAntiSpyware.exe Token: 33 2348 SUPERAntiSpyware.exe Token: SeIncBasePriorityPrivilege 2348 SUPERAntiSpyware.exe Token: 33 2348 SUPERAntiSpyware.exe Token: SeIncBasePriorityPrivilege 2348 SUPERAntiSpyware.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 3612 iexplore.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe -
Suspicious use of SetWindowsHookEx 46 IoCs
pid Process 3612 iexplore.exe 3612 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2996 firefox.exe 2996 firefox.exe 2996 firefox.exe 2996 firefox.exe 2996 firefox.exe 2996 firefox.exe 2996 firefox.exe 4428 iexplore.exe 4428 iexplore.exe 592 IEXPLORE.EXE 592 IEXPLORE.EXE 4904 SUPERAntiSpyware.exe 4904 SUPERAntiSpyware.exe 3580 iexplore.exe 3580 iexplore.exe 3920 IEXPLORE.EXE 3920 IEXPLORE.EXE 2348 SUPERAntiSpyware.exe 2348 SUPERAntiSpyware.exe 2996 firefox.exe 2996 firefox.exe 2996 firefox.exe 4428 iexplore.exe 4428 iexplore.exe 4572 IEXPLORE.EXE 4572 IEXPLORE.EXE 352 SUPERAntiSpyware.exe 352 SUPERAntiSpyware.exe 3580 iexplore.exe 3580 iexplore.exe 5292 IEXPLORE.EXE 5292 IEXPLORE.EXE 5944 SUPERAntiSpyware.exe 5944 SUPERAntiSpyware.exe 3580 iexplore.exe 3580 iexplore.exe 5624 IEXPLORE.EXE 5624 IEXPLORE.EXE 5952 SUPERAntiSpyware.exe 5952 SUPERAntiSpyware.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4560 wrote to memory of 2100 4560 f2b3c6d7549e216fe9e8fb517553a240N.exe 75 PID 4560 wrote to memory of 2100 4560 f2b3c6d7549e216fe9e8fb517553a240N.exe 75 PID 4560 wrote to memory of 2100 4560 f2b3c6d7549e216fe9e8fb517553a240N.exe 75 PID 4560 wrote to memory of 3432 4560 f2b3c6d7549e216fe9e8fb517553a240N.exe 74 PID 4560 wrote to memory of 3432 4560 f2b3c6d7549e216fe9e8fb517553a240N.exe 74 PID 4560 wrote to memory of 3432 4560 f2b3c6d7549e216fe9e8fb517553a240N.exe 74 PID 3612 wrote to memory of 2644 3612 iexplore.exe 82 PID 3612 wrote to memory of 2644 3612 iexplore.exe 82 PID 3612 wrote to memory of 2644 3612 iexplore.exe 82 PID 2324 wrote to memory of 2996 2324 firefox.exe 92 PID 2324 wrote to memory of 2996 2324 firefox.exe 92 PID 2324 wrote to memory of 2996 2324 firefox.exe 92 PID 2324 wrote to memory of 2996 2324 firefox.exe 92 PID 2324 wrote to memory of 2996 2324 firefox.exe 92 PID 2324 wrote to memory of 2996 2324 firefox.exe 92 PID 2324 wrote to memory of 2996 2324 firefox.exe 92 PID 2324 wrote to memory of 2996 2324 firefox.exe 92 PID 2324 wrote to memory of 2996 2324 firefox.exe 92 PID 2324 wrote to memory of 2996 2324 firefox.exe 92 PID 2324 wrote to memory of 2996 2324 firefox.exe 92 PID 2996 wrote to memory of 1648 2996 firefox.exe 93 PID 2996 wrote to memory of 1648 2996 firefox.exe 93 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 PID 2996 wrote to memory of 2224 2996 firefox.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2b3c6d7549e216fe9e8fb517553a240N.exe"C:\Users\Admin\AppData\Local\Temp\f2b3c6d7549e216fe9e8fb517553a240N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\_MS.MSACCESS.DEV.12.1033.hxn.exe"_MS.MSACCESS.DEV.12.1033.hxn.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2100
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4428
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2768
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -nohome1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3612 CREDAT:82945 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Are.docx" /o ""1⤵PID:2144
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\RequestBackup.rtf" /o ""1⤵PID:2384
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Documents\RestoreSave.xls"1⤵PID:4304
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ExpandOptimize.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4412
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\DebugRepair.rtf" /o ""1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4432
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\DebugRepair.rtf" /o ""1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\RepairExport.ods"1⤵PID:2312
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.0.2111838281\1938847176" -parentBuildID 20221007134813 -prefsHandle 1692 -prefMapHandle 1684 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {553fabc1-2430-484f-bdc7-0a56646d2c4e} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 1796 12904cf6758 gpu3⤵PID:1648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.1.1649003213\158074181" -parentBuildID 20221007134813 -prefsHandle 2144 -prefMapHandle 2140 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c29105dc-dd6f-4509-a379-84c834b66ca5} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 2180 129047efb58 socket3⤵PID:2224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.2.738877196\1286781412" -childID 1 -isForBrowser -prefsHandle 2836 -prefMapHandle 2916 -prefsLen 20931 -prefMapSize 233444 -jsInitHandle 1068 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ff4f1d4-a9da-4756-ab38-46af5e792128} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 2928 12908ba0a58 tab3⤵PID:1944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.3.1021787552\153985181" -childID 2 -isForBrowser -prefsHandle 3436 -prefMapHandle 3432 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1068 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ba7c310c-92ac-4c85-84c7-faf0184d6951} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 3448 12909b24158 tab3⤵PID:1464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.4.659926388\146022897" -childID 3 -isForBrowser -prefsHandle 4348 -prefMapHandle 4344 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1068 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {69a57b6c-42e0-4f74-a827-51f173d5ff87} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 4360 12909f22f58 tab3⤵PID:3628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.5.477882408\1412994269" -childID 4 -isForBrowser -prefsHandle 4808 -prefMapHandle 4796 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1068 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ceb2700f-c479-4d68-ae02-07ec11edb0a7} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 4816 12908b50258 tab3⤵PID:408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.6.313209758\991295771" -childID 5 -isForBrowser -prefsHandle 4944 -prefMapHandle 4948 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1068 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a7d745d-ccd7-47da-9094-806a7eb41619} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 4936 12908b50858 tab3⤵PID:2504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.7.1035887637\8163709" -childID 6 -isForBrowser -prefsHandle 5144 -prefMapHandle 5148 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1068 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d2cdb238-9ae5-413a-bf4f-b9757ad3874f} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 5136 12909f22658 tab3⤵PID:1224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.8.393594517\584609203" -childID 7 -isForBrowser -prefsHandle 5560 -prefMapHandle 5532 -prefsLen 26830 -prefMapSize 233444 -jsInitHandle 1068 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd1e2904-0285-43a2-ad0c-9e78633061b0} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 5568 1290c75af58 tab3⤵PID:4896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.9.1364390724\546571237" -childID 8 -isForBrowser -prefsHandle 5320 -prefMapHandle 5316 -prefsLen 26830 -prefMapSize 233444 -jsInitHandle 1068 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {986f6c15-93c3-4bae-9e30-b02af81f93b8} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 5024 1290b0b5558 tab3⤵PID:1512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.10.1248541777\1671539229" -childID 9 -isForBrowser -prefsHandle 6080 -prefMapHandle 6076 -prefsLen 26830 -prefMapSize 233444 -jsInitHandle 1068 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {070917b3-c974-45c8-abd2-40fd2ece8b12} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 6088 1290d45df58 tab3⤵PID:1580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.11.596869792\2070076267" -childID 10 -isForBrowser -prefsHandle 10236 -prefMapHandle 4300 -prefsLen 26870 -prefMapSize 233444 -jsInitHandle 1068 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {11bf72ab-4b31-429f-8396-ea3451631d27} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 10232 1290d0adc58 tab3⤵PID:2404
-
-
C:\Users\Admin\Downloads\SUPERAntiSpyware.exe"C:\Users\Admin\Downloads\SUPERAntiSpyware.exe"3⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4736 -
C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE"C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE" -install -name:!SASCORE -display:"SAS Core Service" -description:"SUPERAntiSpyware Core Service" -pipe:sascoreservicepipe4⤵
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
PID:2736
-
-
C:\Windows\SysWOW64\REGSVR32.EXE"C:\Windows\system32\REGSVR32.EXE" /s "C:\Program Files\SUPERAntiSpyware\SASCTXMN64.DLL"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files\SUPERAntiSpyware\SASCTXMN64.DLL"5⤵
- Loads dropped DLL
- Modifies registry class
PID:4696
-
-
-
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4904 -
C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE"C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE" *10.0.1266!{0D3C4F0D-1C11-47bc-AD1C-BAB98712DBFB}5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-
-
C:\Users\Admin\Downloads\SUPERAntiSpyware.exe"C:\Users\Admin\Downloads\SUPERAntiSpyware.exe"3⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6124 -
C:\Program Files\SUPERAntiSpyware\Uninstall.exe"C:\Program Files\SUPERAntiSpyware\Uninstall.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6140 -
C:\Users\Admin\AppData\Local\Temp\SASC0FD.tmp"C:\Users\Admin\AppData\Local\Temp\SASC0FD.tmp" C:\Users\Admin\AppData\Local\Temp\SASC0FC.tmp5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5400 -
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe" /uninstall6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:5252 -
C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE"C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE" *10.0.1266!{0D3C4F0D-1C11-47bc-AD1C-BAB98712DBFB}7⤵
- Executes dropped EXE
PID:4456
-
-
-
C:\Windows\system32\REGSVR32.EXE"C:\Windows\system32\REGSVR32.EXE" /s /u "C:\Program Files\SUPERAntiSpyware\SASCTXMN64.DLL"6⤵
- Loads dropped DLL
- Modifies registry class
PID:4156
-
-
C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE"C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE" -remove -name:!SASCORE6⤵
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
PID:5288
-
-
-
-
C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE"C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE" -install -name:!SASCORE -display:"SAS Core Service" -description:"SUPERAntiSpyware Core Service" -pipe:sascoreservicepipe4⤵
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
PID:5904
-
-
C:\Windows\SysWOW64\REGSVR32.EXE"C:\Windows\system32\REGSVR32.EXE" /s "C:\Program Files\SUPERAntiSpyware\SASCTXMN64.DLL"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5992 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files\SUPERAntiSpyware\SASCTXMN64.DLL"5⤵
- Loads dropped DLL
- Modifies registry class
PID:5976
-
-
-
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:352 -
C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE"C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE" *10.0.1266!{0D3C4F0D-1C11-47bc-AD1C-BAB98712DBFB}5⤵
- Executes dropped EXE
PID:440
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2996.12.1332566478\1587369548" -childID 11 -isForBrowser -prefsHandle 9560 -prefMapHandle 9588 -prefsLen 27578 -prefMapSize 233444 -jsInitHandle 1068 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ececb3af-330e-43f8-9b61-5a41adcc534a} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" 9752 1290b0bd658 tab3⤵PID:5256
-
-
-
C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE"C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE"1⤵
- Executes dropped EXE
PID:4308
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4428 CREDAT:82945 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:592
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4428 CREDAT:82947 /prefetch:22⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4572
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\1c3192260eb643bc81b6763b07baa265 /t 2644 /p 49041⤵PID:3588
-
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE"C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE" *10.0.1266!{0D3C4F0D-1C11-47bc-AD1C-BAB98712DBFB}2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3580 CREDAT:82945 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3920
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3580 CREDAT:82948 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5292
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3580 CREDAT:82951 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5624
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
PID:3488
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:2148
-
C:\Users\Admin\Downloads\EditRegister.odt.exe"C:\Users\Admin\Downloads\EditRegister.odt.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5204
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:5676
-
C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE"C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE"1⤵
- Executes dropped EXE
PID:5912
-
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:5944 -
C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE"C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE" *10.0.1266!{0D3C4F0D-1C11-47bc-AD1C-BAB98712DBFB}2⤵
- Executes dropped EXE
PID:5636
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:5460
-
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:5952 -
C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE"C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE" *10.0.1266!{0D3C4F0D-1C11-47bc-AD1C-BAB98712DBFB}2⤵
- Executes dropped EXE
PID:6068
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5fb1fffa1a0aea5e98c7d7ea875e6ec50
SHA16aafdf7adb8a47167f47572e698c8c15948c3add
SHA256f0784155501f6ab18314edc75ed05cb6600625dc09d7d98ef9759f2783943719
SHA512cd8decda352170eb8cc7ea6d7b701f7799c4c7a9d5c3f22101c853cbaa81895e685e4337e2a49c70e12ab37b0dd7df035ea6d76b0376dce676abaf34363f591a
-
Filesize
32KB
MD503edc4265b7830b60bfecb1c99ced7e1
SHA1bee9b5a1e9aca762cbdeb0d2c0a8bb7440ae764d
SHA2569ff6d95996e2ceceff3c45b9418836dad627d582caa9d5e924fad73a71021637
SHA5123616cb00b552080e164cdf8c620f21de5a113796d75b624e52e91f8cabc9d991d5475d9bd05b2f5eee9fbd9a34df502049bf7add4a3a1c7894ac7706b2a215d0
-
Filesize
144KB
MD5e93abf733b801c54d71622d5ebb26726
SHA1db9262b2809fe028209451e39541ee9141a90e3e
SHA256a4dac5aae96f3451a9e36bdd1d837b9773143c141fe180f77d40f14cf17f0159
SHA51202e47a313c6d453cf9d3207b659aa98e55281a6314f08abe94eb7322564ae8b7225ae110cbe0202a0a2e96084644df442eed4133f0d117ae8cd567b860f5b388
-
Filesize
131KB
MD551aaa3b776079133295064e0e0bcc867
SHA1ad0ea671468b33d2e882324bf536739685ca9169
SHA2569341d4547dcd6991eebafb926926bb436231cf337ba5c4fc89e61136474d47cc
SHA512d882c27d0d15471227eecdcba2bd5b0a96a869442369ed9fd605ea0e4f72fdfac9b70d0235dca25f2156208f69b29b5f3966e207c77718bf904eb41f25219b3c
-
Filesize
1.5MB
MD5c6edebe9143557967f9c36f1f0366ae7
SHA1c5cc0168e1c94b696409888b1926f0e2fead7ee4
SHA256232d8a82d56a55df10ece5deca7bba82024bcb9873f5de535173e80f3e66daed
SHA5128e27f9444e350d221bf1b7d73d566c49a9e432c7dc1b276d9ca35d53aa48de3ca6cbcda9640cd71c3228ec811b7b364928869c17549dd20b61786bbe90cccb6b
-
Filesize
1.8MB
MD52e15e347cfe07d41768e0ed2cf481bfc
SHA1b4544cb1804cd3994e3373287d2aea71586db1df
SHA256ba5c2dfeb17280f3591455464e062a4faca5f688b40b7af398e57df905dd87f2
SHA512152736ff1a437b4ff7bcac631ed3c358556040498cfda66ec966c1fa39d58ed5c3d9caf7401583646c8d8a07aa380a886dbee08d37f048cfae4acc99c5ba0254
-
Filesize
242KB
MD511a301ef69e461b68685f8dcd323ff02
SHA1e40dae86da8ad20964426f3d3eb6f01b2afb339a
SHA2567588cf702acea5801ecb1408d0f6dd40576678a263da20ee4dfc1b4d9e71aef6
SHA51216d4de520ca8cf23d0d4ac4c323cefb6d4131d47d695134980b188d0cb646ccb1753a2369d1a9c54b09ce2c2c36d16f540206addfad8ae0cad5f642440011813
-
Filesize
221KB
MD589d774466941426cc91b12e0ed22e408
SHA14d634ee68df903f00a1e2177396ef933b79a3680
SHA256090140a8efb2e12bf2b42d649b9e5c5c60845e52aaba260cbe0b706e52f95629
SHA51295d20e4bbdedbe9bbfafe3e60515e867f79be5b2e9bface778d22a90043859224433a15077c05e0917d234649c6bc28cd210e212e642ae3daf8bf534e56f8948
-
Filesize
963KB
MD5eac826de9979568ed1a9303a50e4fbbf
SHA1d50e6767e14d6f637a232dc273a2915f3cf6dea6
SHA256444d986125ae7b8ac2d147a798d985a4308db6ef5ec3f7f653f8264d53292bce
SHA512b41dbe3831f5d548253ed72a7d768d67141bdca18b71b0deadd9fe01e82c25f98f357d063130c01ae8957168cb40a58c8a1f0bae9694308b213765a56afb63cf
-
Filesize
716KB
MD5abff2a1fa56022e4dcdc34af3972381b
SHA1fb0dc4a1f65a1ff90169d8e69d609cb9006f4325
SHA256f45d6f09ec04cfa9e82efde141ae378ef6e93c05da81ac9845d5747c0a331ad3
SHA512216c4b58908c78afaff6b2bf28eff6db40750986329312e5556d9b58325c922194cda5294cf3b87b050fcee04778ff20de03febd4e5fb590fc85b9ec31f3c6b1
-
Filesize
42KB
MD528132e844ab01db930e5d599b2981f5d
SHA1a7621d9974b21d4d12b8b978a21c6b7df252adc0
SHA256959a7570044615e1deff15a2751c60327477bed72904baea562873e10015c3e0
SHA512352eeab2e1c4db8482765c73c7fa17281398f0e67219f0857a3bbf449ed1d34d5b6497afb2e8c43440a98bd7a4d912482336b6cd1383980f330c9b42ff0c4423
-
Filesize
40KB
MD53d7982b03b8bae8e86cb63cf09edd58e
SHA1f2152d18a79ffe6138b3a4fb532fbf06cb7c273b
SHA256e2bba78e4f52814b399a881bf4a271486502346bf131adcf4311df7a4f011b8a
SHA5124fe1653234c60d565480ab7f106b08351323c3171891283039b2f79c4ae1f5c0216c800784e12848f28e40a9551b2fd14bbed1b580d15217ceca6726c10906f2
-
Filesize
42KB
MD55703dbb0e0a1cb8d92b585fd3e12b097
SHA1ac8329c08ad93fbf360acfe9ea69b9720ff87264
SHA256c74d64666505123ffff30994f08c835d052919475731cb7c6a28e05a33a2dc6b
SHA5129d1cf85814d7f9b8bcb3183a44ea8081d1c58db64f7c34ccfbe380c3ce2c32ad2488fe7d180af249c70723ff263d52182fb143e222b7311ccd2bb2084bd8250e
-
Filesize
43KB
MD58828d853a190405db114f815dcdccc79
SHA129f88f5f945e07834a3375fc09da8cb4a2b2b315
SHA256548b3a814a68875d849d17ef003528e3b7bb394eaf891c132cb20bfdbc45241c
SHA512aa012aeae0ec1dc85a80f152a5c844b22ddc714d80373c1cf5e3aaee64569acd1a52a34728bc564aceb334f8f496be06076f718b85b391159fe849f78c9c1b96
-
Filesize
46KB
MD59dae86c80a94947c7ceb6535270b3a83
SHA11b2a55ea704bce1e7962bc6bd615735837a3036a
SHA256d938e0245a6a7cf03472dce302054c117d6682355a1b0f08749e5fa8a8b5f82e
SHA512c47dfb13560e577469fd9e6e0b6098f2a45c6eb163de7d9cf131f2db71033c7d067151514d739db631e79bb1cbd414235c96b8e3f0a24689b0cf92c408de4264
-
Filesize
41KB
MD53a33b3aa834c7ce7eeb725c821f0dd6b
SHA14c555adc4ce5fd739e49649a63e1f89d2251f1a7
SHA25666b865c99faac77f1bbd04b255a52c1c77e38d91eb7637767cadd765afdc1a9a
SHA5122ff207b1c05d04b4d4486948753e5667498a01e8e82dec15cbeebe1fde918af3e4a0895e640495d736aa5f8bb5e43d44e14c828f24796f24fecf5079350b8b49
-
Filesize
42KB
MD530d9aeea578c67898c097771892ffd9c
SHA10bd29eea24f8faece42bbd554f0fae6be46c4bf9
SHA256cfb0e30c672f4b2fb8fc65da624062d91bdb34cb5def66142b6cc942e73555b5
SHA5129f7dc310501f602bdacfb86648e928d8e9d633d0347778b384effbc6c73da5685fa811a6fffcd6d6b2fb6da06f76fb1c5bfe1a90432b5dbf4aa78f35c1d48fde
-
Filesize
41KB
MD59a2cfd6269d54ad70ab8ebfb75178e4d
SHA14f0f5a8c33c1f0eb735cfa26ae3586cf7d39fc6d
SHA25628397c7d16a44933e375113818b8ef859396ef1e01288f25d3c02261df0d0d9e
SHA512eae40939cafb4099d4e55f0734a25a3774eb8541f4b8772c6ebc86053e836e6cb80f31863628fcfc48188e9a8dde82b7ac1f6396d23da85291f3214f2add37f1
-
Filesize
37KB
MD5e2ce1bbf94f28e06bb01e99faef29ae2
SHA1f0baff85104344a6f5a31e81a78de5c8edbdfc0b
SHA2566d336a67ae81083d209c48c9f946d1932f6bceac369bdd5251dae7b22eed3c38
SHA51242b35c103b771d97fbb9e793f4d451ad54ee08ad255a8300d98d6266a223006f4192165942ca3d59b35137bbf8cf8321e56f0cc98da0a051742239aa7ff87dd7
-
Filesize
41KB
MD532523fcf7c4b364640002b7c68a0e3ff
SHA14bd85d9c03ad10746b4db14a623e9c6cd6d56c18
SHA256a4c7d85576554debbc57bb834ee43f8f3c8180045762f4a1a097abc46ca5b117
SHA512341f16fdadf0c722e5c24c0f8315dbe4b7d8e90e6f2d72f90497e58e4b4f080011a05e2ba605e9137ac9571192f80c1a4448c0927c92582e7354e32a60173dd0
-
Filesize
41KB
MD50777b0a3bed7074e986656588b8d5db1
SHA19ba650e9042010f4e170a995351fbc83720d472e
SHA256ee27a26b385d3e3dd4e27ba3e2716c9c835c03f792f55fb562ef7470a2f29a77
SHA5123c3b239ed28d6a44cb89d5829f51e88c4b98e2b2dfcea11e8a468fcde9a7a331d6857f07540b0320ca3bdf9ce065b5d84c81ca68320d01f22cee0f4ac02632b3
-
Filesize
32KB
MD51ef136415627c02c2289dc749eac0539
SHA1aef66a0932e72ed261096f5810a1ff59bfa2bbab
SHA256c48fb4f1a98f6d8ea1f589bb78cbaadc7b34fecf6c32cfbad3fd60f81398b705
SHA5123707b8daa6a26df8f9259251ac2b5f7329dc576e18ded4d031418b05d5926c0c500f60d3007bbc9ec4a190f79cdecff32bea73b4f5dce3f662e9f27f5394a99d
-
Filesize
39KB
MD5733eb0b8df9bc55bccecbcdbe1375966
SHA1ff60b4403c6dce2b4bb5c6f95b85659c6a6ec51f
SHA256debfce4641e9d1e9652ff3f929f8b724b5417c5f4e3dd4fbd764159ad9da51a0
SHA5121d61d1bd8269d2927f8fabade43c9af4956d65b9e82bca9b8d2554c1ea9b65c95e8581cfc01ac3dfd4a749027065fec762df6f3f7c7432ac02026ef03e24274c
-
Filesize
39KB
MD55caf92474b5247992f734787e77d28ce
SHA148f25898d007df807c7d374a3c00dc2825a8fbc7
SHA256efa5b72d23e64ac93be5885a585905f4ae0a170d57cc3ba050f5a4a079eea96c
SHA5126012e1357d3caa11ff3c82551f7b3588f457586ef4747fbf8ed64459a1792bb430058e9ba1d1be3147f5b69f1b85c9891d56eb01a74abf1cd382675261bd5283
-
Filesize
40KB
MD5d274566252a3621ce088e87a6f0c1d54
SHA1cbf43d415411203799a9a2e703bd79b1564a3957
SHA25699a7d9486db20b0de41776a0b8389df7a1448f49f3d9f256921dd858084084c5
SHA512965f4ba44232290f0f0fc583b675124275be562c27e1992a028a494bec25df56147bc367da64cbe4fa606f5be47df5ea597c8e98e96dd1ce13932879d027ca6a
-
Filesize
40KB
MD5895ae1148034eb988780814165d678bb
SHA1de59b6fdd1f23eef107bca91b60bb1a668b35052
SHA256af319266bcf3a891d10f9287525c0c91b4b70f275a05846919ae27eff07128b8
SHA512a2660080a8ed884d042454320a274bb30c7feed8888d42609232662f46ed0a7c579db7fc98ceba9391847234bcc2ee9fd37f01efce2fe6e0b2f249972fd5129b
-
Filesize
41KB
MD558e1a1fa3f05deb415139887eaf10902
SHA1fa4915a5d6826cb6f46fd7affb4fcf0ad440a479
SHA256e112ead3536cf1bfb4886148de30c70649028e2491c58961dd68283b184a1f53
SHA512e77c6d1659eefe0329fa6e83b96a773b03e4aec06c441c2d088fbe55e97207025791440db65830b500ffbf7aef85b19c515f08005fcdf747509b06a787a18f3a
-
Filesize
40KB
MD5e03ff031b2eebcd1017dd46a7a3be439
SHA1cc24fed365d4759d7101a2bcd39d74ef8deef30b
SHA256de10d4482d6e9c163d5028bc37f5a5e03171e593e4b0e54af79c31eac7de01f5
SHA5123c3d8b1cfc5a3116c48c9d84f68980cc0b73f1a07f5209e7dd78f24628608a8ea870b503049831e1561aa9802b01fb1bd585134d36aca42835bbdf00cbf014d0
-
Filesize
38KB
MD516aa2ba0ba4dc4ae5425643931d2441a
SHA1fc4bd4cc042f3aba6afbca4ee31e6e2058dfab77
SHA2560074e2c3883c1543b62dc99ec7c37ede7d866fadc439b630a747b1cf531c6ed7
SHA512c6831750b3f8df1c8dc1764a35ec6cef6db8f59908216b030c765f9db4dc15fa2005f377135a8bcde50861da5180922ebeedbcb35c2d3d9d8ac4a93456065932
-
Filesize
41KB
MD51af407d1fb9eff9407071f1e18e3cf03
SHA175f72bb307689cfb9b1b19ec93ae406f36fc4728
SHA2562117c804578da48de6ab0df2eea55f7275e1990c9cb3d7264b08ecacc4061012
SHA512f41beb66a02a8c1a8762236a6e47e2a5790ff9ad19e8004fce6621d4e27edc1851dd0a5417f7e9cd23ea998616a6b8349a1d33c04a9d8d94f07f2f348411b81c
-
Filesize
41KB
MD56d7aeca09fb7311f5c5a65401056dbe9
SHA117c89ba4708e6bd42fde3da83ed36118c61fbba5
SHA256b9ed3d061bd58ccc121929b79bcefba45929d5bd117c82288effb19a2cac29d7
SHA512ce5baa2e91a9aff78d9c18fd045bd08f69a7d8ba59a044deed8499a7f666f5af18157c8438dffc7a9acc59f4900ca020c80d2e03786d5bdfc37d88a9ce7682a6
-
Filesize
42KB
MD515272973cc0f2252f9e6c8806fa0cd32
SHA17f84ca16ada99d50436a9fba6979f881c5c5c362
SHA256f4a8aa9b1daaa299359a9c1eee6708040ea205fc4c6d530d564630c9eeed9ca1
SHA512c6ecdb1b13d3a248be54e075275033bb1871afefeb8dd638a9569bf0310492710f137a661205a442b34031b43c6340d1c0b4c56d7c0fc44f09ddf9d48c159740
-
Filesize
49KB
MD5f95d609a3fba67a756bd5ced9b5f1368
SHA1412ff4bb9c7cbc73013913163caf95abd44e0783
SHA256e1cc9bee688dbfa63d27cba47ca8a3f258883f377afc086e216dda591f812cc2
SHA512d39db8ac537bb7ca35587754e524a355648ac37d3e58982f7a5fb28dbd36261ccb5975eed37b6ff367c8f3c150c1750627574cca5a0f79d7dcc013270496f5a5
-
Filesize
43KB
MD5f4ca6161f52bd599122b3c7ee2308f85
SHA1606b21a024c2b47d1371311d9fddf6725937fabf
SHA25631e427e3c48ad0ffc4ca495e4045ed1eb9cb51a5f80fd160cdd1790d0e055e1f
SHA5122c2021ac74549fc4e01e1ebd71603b4e54bce54413e14217263add2a950296b411d37cc8d454f37259ea7c31ac275b4b8ae86cec0396814edcd7001f3db0da8c
-
Filesize
49KB
MD57e33ba181e5679341d39a858c14a305f
SHA14621139fb76962eb18d95da027b58adc5f067717
SHA2568177c427d5a20416924f9fe90bfa48a4c8c0c0ebf4e763f52a9fb83ef4ad0aa9
SHA512ad1d844e774079f179b35e861569b8b0a8bfbab18408cbfbdbf38cecf275ee4e5c8391fd88b1a40f09a061c0a864d8d055f4b9b914b967c2771e8e32ccc9c93c
-
Filesize
41KB
MD584ce1ea647e1acfd04cc0ebc02639a05
SHA1e96ee0411b475c4dd2a0772e4a908c94e463012f
SHA2567195a2a84cf7a563a338f73aa0d9e9518a8da06c9b0bb26f9c64b262725f1a71
SHA512aac346b8c57f4b2836f8c1369c7b71e0b87e643068eae507e8314319e81b216a80d772023971caad1061d9f27167cbd110a136884f619334f29f6431ed6f7ab6
-
Filesize
42KB
MD5813ec84b0a10a9a7974033f0616b0e50
SHA1652bbc17b1227097b29f1ff87acd6a0a3cb2aa4c
SHA25655c0ed1f8f633451145cc82a31bd541df2bfc5a653f85743b048bd82923abe1f
SHA512a6aafa5860c26bf0eced59c72987d51586fa867cf88b2fc3af8db4ece8e5ee6102feccf61e8bc51cfd1abb66065aa22ce8b92bc32129ca8f412e442474fcb2ce
-
Filesize
42KB
MD5ed852528d21eb7352d765b1b2b3e1402
SHA1a622dbc2d7450f76ed38cf562869175792d44790
SHA25626ed5944ba6a08b4da7e634ee1136061401abf526a68fc274dba34b61b6247c7
SHA512fc3ee690ef21b1e3fb6b8a7d9379a8fc4c458e6bb4b9c2c767c7e41b37f3a65f7db35492bc9896bb1d83a581d1e17c4049a212d2173459a9605d4aba3a225162
-
Filesize
40KB
MD5055e78cef4069f4aafa5b50f16328c88
SHA10dfa5d77ccdcc84b4c37473cf54b94f00a926446
SHA256ce5197deeba779f0032ed703729e7df240641c8f1015b16b84d7dcb1a6492d82
SHA5122bc1580ae2a22b0cc93be3e580fb90cab8d8470a74bfb4492da44a9d6905badb1a6cccaeeaf9286fd811fe825116c2dc791901187f9ed7e9b2e9fccfe338f084
-
Filesize
42KB
MD53da519bc2a8847273221fb3e3ba987f9
SHA128dd8b7fce00a057e149c01d6e385a50d2fd4974
SHA2568785dd59dc51ff5586854e1273b0bb2e2808f136e4f4e990024325734cbf7161
SHA512ca74e0888a2019f1a5479ec2279e1f3221069e272642f28f29d2b1b2321267d99232ee51d0a3ebede57de888e151ec3d55a6013a47ed23ca6c97e9ca68cbdb61
-
Filesize
50KB
MD5d57c014d05ed2bd9544ae0a572676164
SHA1250797efbb93d2a88f3ff6c1dd94b2185f11ff37
SHA2566fad0ce53221e53bbd70e9f0e1cf113e882784fa2c3cbbbdf4e20e971dbd645c
SHA5125ddec23b321854f67955c41d8a7912806113c1e76cbb0b80b14932469acff4bfa1e465a47a4106fc486c305857ce0e24f428d008e1ad37c66374c98fffb72b59
-
Filesize
16KB
MD5fe40cf4da3666d16aadd7bc1fead2115
SHA149e3d79bb9b9084170084bb7e1f763f958d2e383
SHA2565a1f510b1f725a7c707287cb6bf85b7d1792bc1c561049a5a0c1db49bab29531
SHA512dbaec5bc27fb44ea70d4076725762a909b4ab987221bb46be10d32536335559b163e16953337df5871200f1a49dda99740353a661d30136ff97c6569f78441ae
-
Filesize
43KB
MD5d2be9b5bd20079bfa7fb51c28c23caca
SHA1fc4f69bda5eb76a653bd76d827d3915936ce2d28
SHA256fe80ccada640eac2947ceaea8bd0bf4788245c16d0dc8a1a680561279eee28a6
SHA512bb7b4c4779321eb34eff736132f2ef41e94ebac31949c6fec321e97424ab31d4874f51bf8725f343c4361c7bb393a3a52061f627a3db977498b1432024cc035e
-
Filesize
44KB
MD53874f1ecb32c50cf60018a2ff0474ba6
SHA11100e10a9b3a542bc0e56c7e2792354e234ee3a3
SHA256ed3f03a4154cd1e00c974a67f946fbe09f84ad9b6f306f40157b6c307d0050f1
SHA512e7db58035d9e47d9ffa66596d242a322db6b4ddf29da74f45a1d4a93845aa8e5a009ee5da4072ab48ec209f1d88703c5d821abd5008af795bbe8005419f8dc5a
-
Filesize
40KB
MD5fbda599dd19ea7cdaf1bd872abf5230f
SHA1df511c648421e622c8f5945c2c7d28c72dfbb06b
SHA256dabe4309fb20601572183054a59f3071d76b0709393b8dc9fd2ebba8e16ab6e5
SHA512c45091d4881d94a75723438eca8b8067e133207c3b4a27b443e488105e426d9d451881a8600cc8eacdcfb7953dcb4127646f11aa513e9cf3ff7445597f19f2ef
-
Filesize
41KB
MD552ccaaa6b676b05217c735e25b8dc71d
SHA1b038ff03b7545a362d37a57259cd380b1147c441
SHA25672c42c66e86439640c3da6414dfade74efb0d845a833fc9e5e382db23aaefbdd
SHA5120698bf62dcd62f3895bf2666baaa0d5f310920f41b7d55438046e76061912b9b4c0f1a34a16139679d3bb54191504c23e0e00a3604f692e7873171815eb75d26
-
Filesize
38KB
MD58d79e8788418ddc89de874e2cdec5ec0
SHA12a816f4d7d0d3c4edf862bae433ead1c9536bfb7
SHA256903f350d812b26086268232df353ab50de887c735856d41e0399d75374b23aa6
SHA512d0788f7c969bf563c9a9b589f34d28706a0bb0777ed352dc99a19e9c1c2c0ccb770649ba2febc740152939c36bc4a448b714d88d4844ccb29ba6435b6cc88782
-
Filesize
41KB
MD598a75e356c632e301156e73ff9e47376
SHA16eb47af0c09d89ad7cbaecf59598ec262695f669
SHA256fa1893787ce047d84a72db5433704836666910167e4bac76902350002b54a870
SHA5124ec70a2e153252e82bd27230a54b58d03c6777c6fbaeff19a72aed60a3cf90cb612f74ef28bcdb7d4102e26f5327018086a9a60094343ab1dc7ca1bff80d49e9
-
Filesize
52KB
MD55cda2868abbe172c8188cb47c003eaf9
SHA18a2347dfc17336c7820f9d2aa36c275d25c3d542
SHA256fd5f18c2ee42f1dfd3c9a2b336695bc9d599421babe41e89d784d32bf728a6be
SHA512ba58596d5717f235b15a4531070184e288ad4282b766a39cf28730e3ca9b2f8d0891aad71ee976e8a03d8d34885ef94cb350a7a8f6d03523a16536f3ed134dd9
-
Filesize
43KB
MD59fd1262d1ceca009cc912827f3cfb1c2
SHA127f66bfe33b4c5fcfddfabcaf0733ec36e558ad3
SHA25685a0fdf485adeeefc5dce4f2d76f6c5c78c0d3487b44116eac4a7bd0a3cd9845
SHA512756578a318c5e6cdfd76d60527e386b99bf60b5b228cd598ade1a4d659705536295f8b2f2a1be9d2758edf0657d4cdaebec35023871a64b4495f77d126ce1521
-
Filesize
37KB
MD58e12cea8079ed9bae76245f22d94f1d2
SHA1c55713e778998a0147660cb03f432921ac126bb5
SHA2565a5017c0ea6808c261cc8a3baf1b7ad5659941354ca8f50e935865eab4e067ee
SHA512c751bd65f2f20972aa54faca2277242a43a5c8da14df7ca14b643ee4861640db195cbc5388adf67a919da3ef2328e5fd96f0045be05e8aae9cb1896a82828567
-
Filesize
46KB
MD5a3415b3bbf8c71e544f89d15a7bb0b94
SHA139839476f28c9152b6dbd0f6d985e7bd9f7a8aaf
SHA2567853430d13f7e3728f1bf100afc43dca8dfdb79c10ed76f8ecd42ffe217b5348
SHA51234a6dcfca7c3e2ef2d2a4fd294e6e602e992cadeea9d2aec4f152b91e689406e8606003d0ba45b14f8765dd528fe2f74073a3151c403e47fe753c2f648e1a6da
-
Filesize
47KB
MD5dd2d4e8fa4c3b0a75676e6a24baf57dc
SHA1eb8cfc938f0639279bb5b3d97ff516d16cd1185c
SHA25687bb3eacfa21f8d3bd301101f7f8db184103c7828ba5601994384ef22eb92dfa
SHA512b47c64fdf84fc43a1365faa01afd3b98cf77c6834c19bc337ec0529696e0e7b1bcf1ab1c17654573886784dfbc2d43bc01648d3d470fe3faeea7777d2c72b4f8
-
Filesize
42KB
MD52b2bf33e0a0dad8ee9701ea49c588469
SHA106ee4592cb1c6770251b8ab42a9052a3c44afad3
SHA2564d42e59c7a7b4548de730e6ad30b924551e1404fd1ad7f37d682f7bafcd29d02
SHA512ccee5f5c47e7ae9395fd8c4afb602f00f59b018602c40ef4e70543f36812f05ab934ae50fa24f24d8488fa40180a75cb057502f0f28e875f085b72d944de3108
-
Filesize
42KB
MD524b8dd04ae46abaf1cf2aab692b55828
SHA1646b1ed94219f6cc3771d8a61870524883adc44f
SHA2566612de01ab18493fff7e9429d1ec3a7345d1da8295964bbf4e00e3204cd25de7
SHA5126eaff097648c984331190a733baecd836ceb5359bd8c159c775064d1cfaa9805f1a9ddbe491d2e8feb817251fc3c2dcacad5545f531d0c2ae674401f3471f823
-
Filesize
42KB
MD5315406d5b937d81645b8ab9affb33e48
SHA15301c761a83a8f4670e5b55ef511fd14ec774773
SHA256b144651ff541c10ef678ded28d9f6f80f8f2b8fa30da1ffb7ef7666e84321fd9
SHA512c2bbcab56345915074b900e37182304202aad3e3743bde596e69c4fb06ef2a3060aa659357c53f8f272c412857ec07697b14877649c59bf05d7c116d4e907f0e
-
Filesize
39KB
MD55d0aa287decd43765b785caec76adb37
SHA1c4cd9072cff3336cb197e0f046816041aea83486
SHA2565c91b855d74dbaf3a591a19c333befdaab281dc7ec9d96c3f355d50d5b57c880
SHA51269a44f03b9c7802c9e071b3e8822260705d4012bb901f1d3e928b75d648c629d09787e80592ad3fba0e764d27c0491c3f1f693417d850f60d6a9f3d1ef5447a1
-
Filesize
312KB
MD5e284907472a538b478b39b9cfe8f9542
SHA19cc808d999f0a6c61a79e860fa9c1dcf7b597ddb
SHA2569541d9d0d84fc562795bb0f1f22eff74a611c47b7efd561f9111c19f0d0a40ce
SHA51201cccd32f6fced22d66ba53ead563626ab227138ef331c1b8e971d2bf5f21ae728a775636c789af7a73c54935da9fd08270acac275e0a669eb495b836f2cfd33
-
Filesize
10.7MB
MD5c90c18048fede9c76dc970af684d2ea1
SHA156d91a751ab0843d8470229854cb523e517a8ece
SHA256593a2fe74febb96241a46b1a918e6232ad63476b81157b14293cea8a3c5fca12
SHA51209b61c7d7d93a62d8d17d9bfc294d7b44b990652bdee71c7e9438cdc22582e891faf6cf8620c837cfd0f14979ae5aeb32e26d64d619edeea2f64dae5d68a384e
-
Filesize
550KB
MD5597ffe9b5af6941b418695d334f67942
SHA11faa60139b812b85ec69bd294451dc98bdef7cc4
SHA25668b462210cb22430a1ba5c578ae06c22e856e44c4d0dab5b7205ea592a47f441
SHA512b2ffe031f29a3d84a046a49983740279957854d7155dd9f858710ec80d5f239b8149f1a8a7c5bbc1b6f2de41b3b4e17e4068b20734b7156432cf3579e6ea9db7
-
Filesize
3B
MD52db46c628cfb3bd1545d3b5a14b4a9c5
SHA19eced0e5812515e6cc9dbf964a43634d1b12700f
SHA256a9d35ae9c3c32b5e42ddaefc88d026bf2ecf55ec56396ff0bdc6ce37f3886a18
SHA51211fa550c4b3adda3f3a64ff754f5311bbf47f8efeb87345ae5e892d966f65245b13698776be8cfa47ae5bdaf5e3a87d1a1af7b34301eb71d7021d2d907606c62
-
Filesize
2KB
MD5a30dcfd41f3127c9141c9fae167de23f
SHA1b28236c710589dd886af3966d998354efc6ff2b6
SHA2566cc7a70f538b5c448a25a7c4142c4aaa0700488ff483f5a220d560bfde057976
SHA5121d3a9b8dd5eeca83b6ef5b558534383ba0663c1e5d1e62d57134082bcbec5dfdd8ac8e759301cad6818d171325a72ee0078986237ef4e264df8fc0fe34bd0794
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
1KB
MD5b363b329864b552d15b150c207c75eb4
SHA1095f309e4f20b2a4cebbfdbf670e48399dfc770e
SHA25694b4ffc989588195fc65c32fe7d397f66b1352a6df65324d06716a3bd070e9de
SHA5126ed587d6354002c1d0459e4c3bbed1100e4fe92957126ce6bdb650f6e5d621de7298a02fba4b45ea20b01d8f1cad0909ef41b5ed1f12cabe499a38825fe6e63e
-
Filesize
190KB
MD57d1d7a8622ab9506486aba2cfe423bc4
SHA15d4a18c9f87c74b830529013045147fd0c667ab6
SHA2560df266e42e2b3cd7dbcdf5474b752f4e67c035bf491702d4311f50db6907b777
SHA5120647de81012b5d402464876cf1b1900c17f1529f40e47faada4eb8a3c88326f4fe39d42d35d69710ccaf15d9ca5c5679fdcde50de4aada24bd34b4edb5048376
-
Filesize
314KB
MD5064f3d16a9f4fb1b1dd0a7c3d6650269
SHA14d39a92c860178a40786516fee16d4f0ddd82155
SHA25663a7f5e2a88db851cb8f09da60b778be52a5e497006507c1abada1a385ab3a0e
SHA5121961781082db0c2d390128ecb00ce48b4dbfd5e6b02756879f18430c28e3bd9aa1dcbcaf2e41bb20994ff279c262fa1bdcec12fe5fc8027e2fbac92486c5afb7
-
Filesize
2KB
MD5b8da5aac926bbaec818b15f56bb5d7f6
SHA12b5bf97cd59e82c7ea96c31cf9998fbbf4884dc5
SHA2565be5216ae1d0aed64986299528f4d4fe629067d5f4097b8e4b9d1c6bcf4f3086
SHA512c39a28d58fb03f4f491bf9122a86a5cbe7677ec2856cf588f6263fa1f84f9ffc1e21b9bcaa60d290356f9018fb84375db532c8b678cf95cc0a2cc6ed8da89436
-
Filesize
9KB
MD567a782ee18679fb14b7edefc228f966c
SHA1a8bcb3475dac1554ca1cbf51946c754380563cd2
SHA25672ea44a9ab5cab399eb43ed25fbf0fe1e9054a5d462d93a5c48fc72541b9db6b
SHA512f6dceda18d2973bbcaf3cdf6640106456328ead0a38226af27588361715f8c990f726a0da4f4a34daaaca2476abff58e59b6d35aaa0420583723276e271f2b22
-
Filesize
14KB
MD5e0de90bcfeceaf0a9a4fe3ce0d23b010
SHA1d32a28286fbab45f52e5bfeb293177c9df83a5d9
SHA2564000692365fcda36ae97b55e5a42f81489b7fcafb6a4095fdd5167c49e71e019
SHA512dfaf50111daa30449e8f11a27392aacc69b34568f1622c80496f5b7e4466caef1af05cd3a74a7d6326706cfb5389e0b4a34e3df68cedbe330a609eced8923b4b
-
Filesize
9KB
MD50cbac32957e2d72765ba6216e15c5479
SHA156be26c6f10f24942833ff40824b09737d6c5846
SHA256500e08fcce9013c66fa1b93b6f252376c0a342e87df6dc770a4f14955c241f5a
SHA51235e49584a10780330a002148662ef5b23146cff4f551d8f7d354486a3864dd662aa811fd9a9cc70179dbe9cd302840126650b3b19e94596880a2b1f5040bd4f8
-
Filesize
9KB
MD59669d2bd938710942424e7f2a787a83f
SHA1d1125d2db98238e240bd905fdd2f87f93a88b8fd
SHA25661d2421ae6d4efa92ae301404172c3443388d644e6a8b05cc6055a01aaae7f1c
SHA5121374be936c7318fc0d86197fdbb460819550f29b357bf65d5e89b60d2f721ae7fcb50d6b628ad030fc0961e0c94df27e4a47ce56cb64ff479a8b1035d9d63c52
-
Filesize
9KB
MD584ee424f76d6341ee9df20c1bdf66f6c
SHA15d0e00b27a362c1cce6d72c883139a6f00e0ea05
SHA2568188dac6afc30410c6dcb7d432a79cb7d8b9de7b0fd053598cf30c1410efd351
SHA512c4e679a13c4c1fc8ca0edc5e5aa64cab44813d708b7c7a1230c834edba2f4ae970eabcd8304a8bb216263c9b4bd7698fb8bdc9ee3111856dcf8026820707ba70
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\1417AD2ABAFF9BB59CCDA94FD6F2F1E32F71BD4D
Filesize109KB
MD5b78e6592e508160695dda66a46ccb7d0
SHA1bcf7e60ffa45d74e5af50a5d389aae565ccd128b
SHA2568a32ffa375857d3e1bd3845c8b5cebeaf573483ceabb94b22540bfcbce1bb74e
SHA51283bc748d08408b85c40bd6fd8fce0b804b59625df9358431bf39f2491b00e59414ef1e4b06929afb735fce8009c03a3ba9e69f69c57840bcad275c211a8fbd6c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\17C871B709F5A0EDE57513F17A6C0EAF402BBA75
Filesize22KB
MD5b27b9609ab507bf140af21aed98a3980
SHA1697ccf114c68abe5352eb006dad5b988cf99ab84
SHA256d5d2b7880cc5b0d6b6bc387ec98492094bc2ffee342a3db187dfdd8cf9f149b1
SHA512cd514cdd3e0b1af07a4da4d725df956c869d82cf35e0442faf9e539fcce17b6c1f2282d96a100c540644021fc7227f468ccbb2c4a745514d1b69fdc2decc0181
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\4FDA826F7C983ADC643416706D98A3E7C5C55607
Filesize17KB
MD5c3cd2230cf972fa6ad647d0daa949e7b
SHA13c490fca27618e61c2e43175bd7d9f15afeae20b
SHA2562206170cc802d2b3cdb3734dac84d1945f4e1df407128a27bbbfefdad03a69bd
SHA512de98f8264885b9608f26282d64b7ad3211e79bc4e3bef3c128626aef83613c48c386a7efea6db5b08b175b6e9fc178040c3c9adb3dc0d6c618671d9221a3727f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\57B4B200EE045EFB0170090E20B07C5FA0E78E1B
Filesize14KB
MD59dd419c263ae3f8cf88dfa789c3944e1
SHA1bf7463d5a841d6c6fb85f2da9f99f56cbf3eb896
SHA256e260da2be7f84418a802c196dca2d9ba050a34e6c95ce6a608cd0e2e8bf9767a
SHA512c956e25a6bf2d43505ce873edcf4db2ddee55efc7cee30061ca98962d849df953b8780ecfb923f7296e7f56f241f14b605827011d8fa32451eb0adf173bb2868
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\589B8AB6E3AB3F09B526A41D4CB91981A59371AB
Filesize30KB
MD5c5c230c395e1df1f73822b45bd2ed352
SHA1803c7b070f5de099ecc69c92122fccb889d03275
SHA2569491898fb471b3809eccef9cdaafd2f0314d2b2a3ac552240a8789af4c52d888
SHA5128c4547ae9df2809c491cee0091eeadcfacb68c15ea8e3bc240f0e1f551d24a66ec932f824d0a59238559e28a7d7c16dd6f98d431339f97b58a7e49408528e9e8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\5D467C902BA8A09606E952148B0ECE1D85D22744
Filesize23KB
MD58110dad7b49b0bc66d20652bac02b15b
SHA167cfe7d68950fb348200ae0ccf319faf22fac910
SHA2561b0e672f4841a633b5e8d8a61e90cbfa68153dbbd3f5ca331c1713b6e70f1394
SHA512fb714df6b5a3d4c44f21ae9cfe722754e6b85411ec1a8318d69160cb57ef1d05e7cd54b6b2145640c6774487a1c0ea80957315b2d0ef0ff5a43717e9e950d120
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\678ADA7986541A5D8379D684CFF5BBEF5966E106
Filesize44KB
MD54e5e1def63ab20ff2ccde2821d43d3c0
SHA15b0207df8ae8b8b5a40050ad27134b7cf01336ff
SHA256954d550f295b41953d2be06539d1f7146064d6c302edd74be66e586df3c773e0
SHA5129b8e5f8c30d1ce00bbb9a118e6d655231a8a7ded8549b5fc27965056206228547b742ba20bf0458ddef2209d824e1faf9ff14a1ae1a07ce1c8e9b88e7b882144
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\ACE8C30CCBDC55C7DF5646C4C3EF215589BC34D6
Filesize63KB
MD58a28729d509a521bc628c1600872cc6f
SHA19e01f513ee91a6d18c670d6a88bcd5ea171be333
SHA256e4308b251619f8433d241128d816632208c181d667202dc93e79d528ff24ebdd
SHA5123b15a9c2011bffee8d3b1950bb71fc3388909dcb45057c441686e40d071f8ca86e98e0b64a9eb4ef92971161809d4dde4e3ff536520435e65fcbe77060d8359e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\BDBAF8B7274A0E76A17C58E27E73F16BB518F7B7
Filesize71KB
MD5386acf21f3a6f7c8b5f603d293a732e9
SHA1f747d2e2ef8d62092f25d22a9ee7e7071a0edd68
SHA256a2c11d77d0442797d59b75297c2e8829257e38773c5829b86fc11a5f016ef15e
SHA5120f8fcc135ea0ae474b5118d20da317e8533eb39ea1e25eec7d5f4bd4379ae70a3b2e188b8a33552ace45829d801503beac7ec12210ac0da2d4cd83643c3c33f2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\C9355AD4D858D46A772FE058540A12CAF72F0EE0
Filesize27KB
MD56f8008ef7d47a795277873f84c70d807
SHA18d08eac20bace25ac36562f5a7629e0cd803309a
SHA256b585c6382ec2d3973eb915742c4420a1f1b531d650aeb95190c4a32e99fefdab
SHA51213ba3e25b1e6ee92832e6f5ce4fc0a9aac19e38510ff72755567b3cb3cb218d79607b3ca3a2374e1084123d72f05365dee1e427c885102a804651ecc442a5895
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\F8E6B723379CF15AD9492BE38F4349355FD60DBD
Filesize27KB
MD5156a97ec7e32cff3b551c8c9e0f7961f
SHA1c1373d87d28d2bffd67fc21500cd222bcdbd3025
SHA2561bddc2a7949ddb7bf339ddea091fbd5b5e595c94cb85d418191ba44efabc2127
SHA512a8f476566383ed13c6521c528c82a6919bd4869749354453adab908e1ce2b5f08604099d09d29ea496b33da5d3b7ead48e94f321c077cafa249515f6f3c90884
-
Filesize
106KB
MD5dfa33ee864f5957e57e61fada73f6087
SHA19fbad7ecf31bf1a3d6fdc87884a36eda8dab3cc9
SHA256ffeac88714650d325c25edfb2765d5220fe7e33b7af43743ba9df83dd1c6eed3
SHA512beaeca2bd37b7a4162943800d4e9f75e962fd191b86d6ab28b51149eba979903b4af39fa8a9dbcb15df0f696db4f409383b70d5fef3e101863d87360f031af62
-
Filesize
145KB
MD5c3b548995bb14485f164f0e09b6e2161
SHA16b0563b7e867376e19b3a56b07943a4765a3086b
SHA256b5b3bb534a1487632bcc575803b8b93f8306b0033da0b4b99cea9d31d901f285
SHA5128a190e08a1d837881a26b27c63a0f48b9e866abbc117020f17ff21bb885973ab7dad95424546a4128545f2aca182a89e41b44b2fddfc254cb207fd80ea37e60f
-
Filesize
38KB
MD5483e1e28067279237acbdd02c3d3cc0e
SHA1aade173e4f4e50f0564ce48e782f60ce1b1cf809
SHA25629e17b288eb7b261501f22b58a0c6becba2122e495580c26bf4ac3cc124cfb5e
SHA5129ffcd773d5c514f19e188ec23060f4e1f251783d0d9f7cf49b3cb43963ebaee40a14552bc01dfaf0ace3bc8f3704c2423dd2a0b05c94e5f8d2ad3b4d558c5ab4
-
Filesize
32KB
MD5ec1269c8bdc76857a94dc4a40a00089c
SHA135de207e45c4429f4114c5f61bb04d10de5a55d5
SHA256d9320e81828b58cb44aab5159da83a10e58faa6236185204f58cc3fca9537eaa
SHA512ede83c5e0c4e97ff13be254d398723d55e1391d32bd085679462ad7e630835789724bb984e6a3d0ccaa216ea29d84779dc4fb1f229786ac0b6c949436d842e8a
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize5KB
MD5114a76f8330339916f4b8b718cbd1c67
SHA15f3514e660f644e2866317f8dae1b8a29f8ea530
SHA256309f648b681a6440bf6ed16104e136d503c3a9ae1d5bd3b2d4714e0c6cb50aa3
SHA51221be2a0f94937d48ff60cc42d5c2526fa3207b2644b15d6b59958780c9e5853efc56b7995c7af13639a786409c223b7a3958906d5582458b7e0b1eb7f3fd2d7e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SN70RME212X03CS8V7GJ.temp
Filesize5KB
MD5a69bc9f67bb6c85ece426f6b4289a240
SHA13cc69f81a87adfa3bac6970f0563e9f8157b7f05
SHA25636893dd07ea18f4d5efc65a487fead35bc5518cb14b6b8c57ca5f912eeb9281d
SHA51252ffab14d9eff4cc09fd8ba1b8952abde6890765f79fcdb4ed272a5937b81e4066e9595be15f30ac0c0fbce65801314d46da4430b445fb8c13fae9f455c6e760
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD599af2278b049325dec4b9fb012459942
SHA1170367680b48866d0a5d768d8611bd6bee72b4f4
SHA256068ec2cccdeb898dff9fa390abd8e480a817a19fb2ef87e6b9681a2c2da9dba7
SHA51222c5b744e5fbc2442ef3399141ee08de466a4f0768b687c5c47a864d6c2daa1395ff9987d1eed6e259cea806870ccd81a8fbe01df6803675e7054c5c8b4223bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\06294b92-8a39-49e2-a105-9afe0be3d28c
Filesize9KB
MD504a651224e334a3087b0fc36523a6b26
SHA10833f81bed05f901514f937c57d3ba671a295843
SHA256099d70f15cbe3515a887e39e23dd6a3d9d134a2f22ec5acadacdfa01063824d9
SHA51285ac7267660c02f2568a05a2bd8853fa107f1f0c6b119d22b56b5362426469df9fce72a16b6c523516b148127418529c3a13dafea3327c9cf854ff4ad4df4877
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\9f2bcc15-a46d-42e1-9382-7c389575d1fe
Filesize746B
MD5d5c2969fb4535c964374a3e3d5c73dbd
SHA1c548a0e214cfaa42c013a35a461c74189e4724a2
SHA256d1b1872f2e9d52021d40be546aa72d15a3d9da107acee0f9d4d36962a91a184b
SHA512df28bc07dbb876fbb3addf61894d20a8d7e4a7b572d88b272c52694675e6f4a23bca386ae1e7458ad6526463c5fd2e34aec781290c7f9e321201831cf6d2dcad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD53e0e3d8b393b43c3e51ed1cee71b9a5c
SHA1583277b97c62fd731a7b1a42190fb16d98fe705f
SHA256b7455ac236620a5baeaf1101519e856b1f7458ffc2745c5fa9323d08ea331423
SHA5128937d49cfc62f6086c66743dc1548491dd1f99e336cf7cad431dd62b1a00f85664cc0afa5bffdafdc108049e16c923abf6d9c8b12107f02dbe4c262db95d97a6
-
Filesize
7KB
MD5ea20457d499c03fc5463275385ac0df1
SHA1a13fd25f498cc332cfc3949f8809a9f88b3f41be
SHA25604a487b32f9c1619e5494ccc9790df0e9a1d23c04cfd18b8a74e40d46970a086
SHA512b821e8aa2906d9c1411f8fedf72669a975c580622eaf712e19862b217562b000bea15b45e26a1642e6ceb53182fd205aff262c14a435a02dbe3ed79b5e0c43d5
-
Filesize
6KB
MD5fe5548b793ecd98f1f24fdf21e9956b8
SHA1a9ffec91a700bfbf7cf8b4d73f4def16d326245b
SHA2566f90123c85e8fc3cb5a0bf6a8823826728a90608efbd2d6180477f60ba97434e
SHA5124a0672c2f6ac748c6084e3a0f1bfa151b9c5e2ba445d9423d396613881e83d324855ced61be81620daece848d2a9316edcf2244d82ed7ef3f54334192999a3e2
-
Filesize
6KB
MD5828c6a807b8f425aa4197a4c8e4d46f0
SHA1e1d6c0f6e0d501bb9c1b22f1962ff036dc7d6c80
SHA256240024fed7537ac961207a044224c2c1c298d0ee7a4d29a12c45de0bc8b0fa1d
SHA5121327acf67d0b10aecd2604c3af1fd64060fe8b12328a475a1e78c44658c4672f87cd2cb8695f1ea2dcb69af427d77c8d1ee345ff2ae792507a36300a662dd2fd
-
Filesize
6KB
MD5d2dd36c3b72f971419cb0c36fbfc02c6
SHA1137b996b040fbe5c931cacd4dc8a985596244ec4
SHA25612efeba46b2758dbb59cb8c6c85414b74750a2725bc3731556d7ccafcacac957
SHA51246cf917b5f63f7347b96380d6376d2ac97521981fe7524a9d96d6b3fdb0b1bf8d0103aca96c6934c70082980cfb5f7025f6cbd333affc97766256d06ebd3a3c4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5f47ac0560b1b285c02ed17839dae4154
SHA16137de3dcdb8c22a91b43390b70aabeb5c138cf9
SHA2560cdc542630488f537ab42aae9f3d48d86e1e076861f2eef031f5d1e794c38cb3
SHA512467297ef18d56de0aa69eebce5a599cdeb343d93436c3822cfe56f44a6b05c32ffb5c7cc60666134fce46ff30b905058712836ab0dd5e7132806f7d3732f74b8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize8KB
MD54f407aaba79fea3cf2033fa9433c5bab
SHA123591a5fa9ce5620395789a867083956a42fdbee
SHA2560cfd8ea18b50c224f6b98c168a53a9d276bf98f2397bae9bcf666d359a60f7c3
SHA5121d13341966270f2bad65e199e773aff34f98c536ca206c8e91281a3933a0bacf48861fdb28416574c700ced26d67f1758f0b6a4059d7cad942d2856b0b936dd6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD54349c5eb1ddd4a1024ffcb4003bcfd1f
SHA1370a34be104385fb75f3720751fc2ed7d0e7a978
SHA25628e94784841379cd9255df9ef94120b89d7d45d840ea83a23d556fa7ad5f12c1
SHA512506bab80b583bae81071f3abd0af5b95106612662bced8c0061d237c3b56903006643fe69f3765fb524688b0a038af30a0e33bad20f8fe7cbc825d748116c576
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize9KB
MD500e3a97629a203df355e796297ef82f0
SHA13ab370c55193de28e701278ab44df9567b598851
SHA256b10db5a0a9823b5e2889fae866e5f6741b4e7f076dfef6d956030487ab5e336c
SHA5121efb4e3b249bf608fda0a4c37e53df538dfad51b2c46b397da7c6018ffd96fbe1bb66762a56b97367dd2f88f0b4f64dad4e8b5d0a1cff779a82dd85ce3843bb9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize2KB
MD59a20d587b3cbc755bab3d0f0e6136d71
SHA18ef80a552573c8624040afbcba69ebbaf2350b96
SHA25654a2a1fcc222cc084009b3b615865276dfd9c954eb1cf74dc4dda3ee86cafa8b
SHA5123b01a37dcad5c113dfc22947b607956e83e4fed9d5ce37bdf047dec92e939020e6eb6038d066ddbb2de2cfedf8c71bcac0b19422e26782448a3c131cae3a1bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize7KB
MD5db15e75d72de327f1c2d4811dcc55281
SHA11123a0f9d721bf6176768d7d21538647c5b2ecfd
SHA256e368317d3f81e34cd9c4bea687fe1f683e726db7723f8b8d17a4dde2422e2344
SHA512275159503c29a3eee0e989e091f9df92d6059442fc6608cee868588f08eaf91823a81b362f6a5cb9e0661f56afde9023a496d1b2a2a97e53fc5c0be9417f3e1f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize9KB
MD51f2535f16e92392bada1b60f4d728e0d
SHA1158016563e854478d84a00ba44e5b7694bd119df
SHA2568e563b7e70f328877e9696848cc24a813e7d7282c8ad39b5b53a546473d6c2ec
SHA512433c58dc0314ea1ad82ac6cc6ad82b33185f84ae83272321e1c8fafd42732d51d8fa3bc2563e0fdbf59fb9380ea6843d13d1e94e9e48ddb6af123be8bce8d9c1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize7KB
MD5fea6143f552d0968e14c9ddcac6d4901
SHA1e6f12f5ee0b9d1e4f712f94c2a18560e8bf132a6
SHA2566d945df27ddc58c48ec507693deb156cc1bc4a067a9936698aae91f4e48bba3a
SHA51297844185f86b9ba2dbc307747bb9588cdf12ad30d9dfd12351f27055d66b07eac92ca907c437605c83b77ba8c454a0c27c48b19955d72205b002d365d29f25e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\storage\default\https+++shop.superantispyware.com\ls\usage
Filesize12B
MD5fd3fcf8dfbcd51dbf52965ecebbd4a47
SHA1722cf3076d40408d718fc9832097d4f3b306d1ba
SHA256bbefe4eda5b564f2e667329e4785c6b4c7d1fcd74c8100fa4339d1876b6e3a95
SHA51299afd7bb8a1d614d9b1dec9fb79f5d2d7c0f9c43cc0169386fb4c6d4c0c7e70900d0836facfaba4f6fd30fa9ea559933a8e7b305c53d43e5f6064d54c3f0c1c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5731c0e733fe1e3123d366af7c8e578ae
SHA19756304ea773dd9cd96e5996dc79de2ed6a9ae9c
SHA2568f426b4be5e3440fa14d37480f018b7dc3d1a547b0e91c2fbfc6e31d9054a359
SHA512d29e0f2356a3226f64692b390c122d4d70f09f677d9f5d086f2babaeba6574d670171edb24ff52f928871ec489680f57910e21fac1ca8ec08783a07d21b1f427
-
Filesize
6KB
MD50c17da44dc18dda205fe6fa3f2d93ed4
SHA11444a54617e1753bdc980112562cdf0bedb73254
SHA256af47b9d104c2714758ca89b324e667ca0b19337393243acb8e16b367539c1d6a
SHA512c3223f86e4544709e195f3790b71f64dcc4d1538d8c7391e766b405ce1a68026c64adb6b3d4e3d93f205a0e557bfb1c938f22fb46c9ba78b215b7e1b1bd7283c
-
Filesize
6KB
MD555d00137c358f3b3da88ccf6bf840516
SHA10e03bbef3e052c4987b776cc3d7bcd3f1eb3dbb0
SHA2567ea80cd5cecb38617eda6d4f9c1edeaf63eac810c85a82354f874448fd4b2429
SHA512f69834dcbfc1c3a8cdf7c228ca620973330b4cb8a9b7fce7d1eccb5149c88b0b0514cee4b84ce8d17076a1af527abd82488a6c3664ad715fadf07d0060c59b48
-
Filesize
6KB
MD58e55b5b79a7bd5f306f82819de2f899c
SHA17a64e7e329e5486074fdb3bf7def8fdcae0be906
SHA256e4d3823472191a002e0125f3ac208ff4ae45a4973e1741843acad7afd52acc7c
SHA512c4b33542b7fa69597ba9548cd081ad8fb30474bb44f103883c641f20ceebac1496205a29f6f551f655b98c284b26b9717e2ddf6bbfa92c5d66d5f88f064dcb66
-
Filesize
47KB
MD56ee28e65984ece7aad66e3ba071c1df1
SHA13e820f45d5ad32c461cb08548ed01e6b09b41c45
SHA2567ce6658149da4a2f9ca597745f6189fff27261ab54b3cfdf80d69b568ac60dc0
SHA5127972f1def4846d2f28287e72ce7da1a8fb5e56fc3a366151a0e3cbe738e4111090c65c63487cc3316cc067beedb7d0e912fe73fea49c91bb06bb747b66bab25c
-
Filesize
32KB
MD5d63f3eb960dc7b912368120baca0f579
SHA13aa3abf0dc6734c395c008d5974b3161f8e70521
SHA256a164f5665f91418a5bb1d4f5ece1ab195f7aae1e05bf8af0e06d875ec3d80a9c
SHA512d7118bf464c02feb5a7076cdb27f059c6b0e7fd45a9273abd88f42773242a44eaa3f7d24aa6dedec9860169e56478d0b3642012f7de0916c9f8320e5926f2145