Resubmissions
25-08-2024 01:15
240825-bl765azgkg 625-08-2024 01:07
240825-bgn8fszejd 1025-08-2024 01:01
240825-bdhlha1drm 1025-08-2024 00:58
240825-bb2atszbpf 1025-08-2024 00:56
240825-bavrna1cnl 1025-08-2024 00:53
240825-a8zmtszake 825-08-2024 00:51
240825-a7mxms1arj 425-08-2024 00:45
240825-a4djssyfre 325-08-2024 00:18
240825-alyr1sxfpf 10Analysis
-
max time kernel
1498s -
max time network
1483s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
25-08-2024 00:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win10-20240404-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___AN845E_.txt
cerber
http://xpcx6erilkjced3j.onion/C0BF-7F44-1486-0098-B330
http://xpcx6erilkjced3j.1n5mod.top/C0BF-7F44-1486-0098-B330
http://xpcx6erilkjced3j.19kdeh.top/C0BF-7F44-1486-0098-B330
http://xpcx6erilkjced3j.1mpsnr.top/C0BF-7F44-1486-0098-B330
http://xpcx6erilkjced3j.18ey8e.top/C0BF-7F44-1486-0098-B330
http://xpcx6erilkjced3j.17gcun.top/C0BF-7F44-1486-0098-B330
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (1143) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops startup file 4 IoCs
description ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD2FD5.tmp [email protected] File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD2FEC.tmp [email protected] File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LOGON.exe [email protected] File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ [email protected] -
Executes dropped EXE 64 IoCs
Processes:
taskdl.exe@[email protected]@[email protected]taskhsvc.exetaskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exeNavaShield.exeNavaBridge.exeNavaDebugger.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exe[email protected]taskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]pid process 2216 taskdl.exe 3904 @[email protected] 3036 @[email protected] 3644 taskhsvc.exe 3628 taskdl.exe 4900 taskse.exe 4596 @[email protected] 1348 taskdl.exe 2696 taskse.exe 4800 @[email protected] 4948 taskse.exe 4584 @[email protected] 4460 taskdl.exe 1408 taskse.exe 1672 @[email protected] 1484 taskdl.exe 2292 taskse.exe 4132 @[email protected] 4792 taskdl.exe 5800 taskse.exe 5828 @[email protected] 5888 taskdl.exe 5380 taskse.exe 5576 @[email protected] 5640 taskdl.exe 6040 taskse.exe 5644 @[email protected] 6072 taskdl.exe 3296 taskse.exe 1544 @[email protected] 3988 taskdl.exe 6132 taskse.exe 5168 @[email protected] 5412 taskdl.exe 4396 taskse.exe 5532 @[email protected] 5372 taskdl.exe 5836 taskse.exe 5904 @[email protected] 5996 taskdl.exe 1636 NavaShield.exe 1000 NavaBridge.exe 996 NavaDebugger.exe 2228 taskse.exe 5696 @[email protected] 5844 taskdl.exe 5924 taskse.exe 5904 @[email protected] 5580 taskdl.exe 5496 taskse.exe 4212 @[email protected] 5352 taskdl.exe 3544 taskse.exe 1076 @[email protected] 5936 taskdl.exe 3888 [email protected] 2240 taskse.exe 2180 @[email protected] 3360 taskdl.exe 216 taskse.exe 3912 @[email protected] 6084 taskdl.exe 4476 taskse.exe 4396 @[email protected] -
Loads dropped DLL 24 IoCs
Processes:
taskhsvc.exeNavaShield.exeNavaBridge.exeNavaDebugger.exeYouAreAnIdiot.exepid process 3644 taskhsvc.exe 3644 taskhsvc.exe 3644 taskhsvc.exe 3644 taskhsvc.exe 3644 taskhsvc.exe 3644 taskhsvc.exe 3644 taskhsvc.exe 3644 taskhsvc.exe 1636 NavaShield.exe 1636 NavaShield.exe 1636 NavaShield.exe 1636 NavaShield.exe 1636 NavaShield.exe 1636 NavaShield.exe 1000 NavaBridge.exe 1000 NavaBridge.exe 1000 NavaBridge.exe 1000 NavaBridge.exe 1000 NavaBridge.exe 996 NavaDebugger.exe 3348 YouAreAnIdiot.exe 3348 YouAreAnIdiot.exe 3348 YouAreAnIdiot.exe 3348 YouAreAnIdiot.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exe[email protected]description ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svgirwyi764 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Temp1_WannaCrypt0r.zip\\tasksche.exe\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\NavaShield = "c:\\Nava Labs\\Nava Shield\\navashield.exe" [email protected] -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
description ioc process File opened (read-only) \??\k: [email protected] File opened (read-only) \??\m: [email protected] File opened (read-only) \??\o: [email protected] File opened (read-only) \??\r: [email protected] File opened (read-only) \??\v: [email protected] File opened (read-only) \??\z: [email protected] File opened (read-only) \??\g: [email protected] File opened (read-only) \??\i: [email protected] File opened (read-only) \??\l: [email protected] File opened (read-only) \??\q: [email protected] File opened (read-only) \??\s: [email protected] File opened (read-only) \??\u: [email protected] File opened (read-only) \??\x: [email protected] File opened (read-only) \??\a: [email protected] File opened (read-only) \??\b: [email protected] File opened (read-only) \??\e: [email protected] File opened (read-only) \??\n: [email protected] File opened (read-only) \??\w: [email protected] File opened (read-only) \??\y: [email protected] File opened (read-only) \??\h: [email protected] File opened (read-only) \??\j: [email protected] File opened (read-only) \??\p: [email protected] File opened (read-only) \??\t: [email protected] -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
Processes:
flow ioc 304 raw.githubusercontent.com 305 raw.githubusercontent.com 306 raw.githubusercontent.com 307 raw.githubusercontent.com 3364 raw.githubusercontent.com 46 raw.githubusercontent.com 47 raw.githubusercontent.com 55 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
description ioc process File opened for modification \??\PhysicalDrive0 [email protected] -
Drops file in System32 directory 38 IoCs
Processes:
description ioc process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word [email protected] -
Sets desktop wallpaper using registry 2 TTPs 3 IoCs
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp1F1B.bmp" [email protected] -
Drops file in Program Files directory 20 IoCs
Processes:
description ioc process File opened for modification \??\c:\program files (x86)\excel [email protected] File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server [email protected] File opened for modification \??\c:\program files (x86)\microsoft\outlook [email protected] File opened for modification \??\c:\program files (x86)\office [email protected] File opened for modification \??\c:\program files (x86)\the bat! [email protected] File opened for modification \??\c:\program files (x86)\ [email protected] File opened for modification \??\c:\program files (x86)\microsoft sql server [email protected] File opened for modification \??\c:\program files (x86)\microsoft\excel [email protected] File opened for modification \??\c:\program files (x86)\microsoft\office [email protected] File opened for modification \??\c:\program files (x86)\microsoft\powerpoint [email protected] File opened for modification \??\c:\program files (x86)\steam [email protected] File opened for modification \??\c:\program files (x86)\thunderbird [email protected] File opened for modification \??\c:\program files (x86)\bitcoin [email protected] File opened for modification \??\c:\program files (x86)\microsoft\onenote [email protected] File opened for modification \??\c:\program files (x86)\outlook [email protected] File opened for modification \??\c:\program files (x86)\powerpoint [email protected] File opened for modification \??\c:\program files (x86)\word [email protected] File opened for modification \??\c:\program files\ [email protected] File opened for modification \??\c:\program files (x86)\onenote [email protected] File opened for modification \??\c:\program files (x86)\microsoft\word [email protected] -
Drops file in Windows directory 64 IoCs
Processes:
[email protected]taskmgr.exedescription ioc process File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents [email protected] File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird [email protected] File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\documents [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint [email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
@[email protected]@[email protected]@[email protected]cmd.exe@[email protected]@[email protected]vssadmin.exe[email protected]@[email protected]cmd.exe@[email protected]@[email protected]@[email protected]AcroRd32.exe@[email protected]mshta.exePING.EXE@[email protected]@[email protected]@[email protected]@[email protected]attrib.exe@[email protected]@[email protected]@[email protected]NavaShield.exe@[email protected]reg.exe@[email protected]@[email protected]@[email protected]@[email protected][email protected]cmd.exe@[email protected]@[email protected]@[email protected]WMIC.exe@[email protected]@[email protected]@[email protected][email protected][email protected]attrib.execmd.exe@[email protected][email protected]@[email protected]@[email protected]NavaDebugger.exe[email protected]NOTEPAD.EXEYouAreAnIdiot.exe[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]NavaBridge.exe@[email protected]@[email protected][email protected]@[email protected]description ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NavaShield.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NavaDebugger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YouAreAnIdiot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NavaBridge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 500 cmd.exe 5808 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
msinfo32.exetaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 22 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exeNavaShield.exeYouAreAnIdiot.exefirefox.exefirefox.exefirefox.exeAcroRd32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString NavaShield.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz YouAreAnIdiot.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 NavaShield.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 YouAreAnIdiot.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 10 IoCs
Processes:
msinfo32.exechrome.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMinorRelease msinfo32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMajorRelease msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msinfo32.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 4888 vssadmin.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 6068 taskkill.exe -
Processes:
explorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133690187495892576" chrome.exe -
Modifies registry class 64 IoCs
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{088e3905-0323-4b02-9826-5d99428e115f}\Instance explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = 020000000100000000000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\FFlags = "18874369" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\Mode = "4" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\4\NodeSlot = "8" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\Rev = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\LogicalViewMode = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000070000001800000030f125b7ef471a10a5f102608c9eebac0a000000f000000030f125b7ef471a10a5f102608c9eebac04000000a0000000e0cc8de8b3b7d111a9f000aa0060fa310600000080000000e0cc8de8b3b7d111a9f000aa0060fa31020000005000000030f125b7ef471a10a5f102608c9eebac0c00000080000000e0cc8de8b3b7d111a9f000aa0060fa31040000005000000030f125b7ef471a10a5f102608c9eebac0e000000a0000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\GroupByDirection = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\5 = 5a003200d521000019591c0420004d454d5a2e7a69700000420009000400efbe19591c0419591c042e000000000000000000000000000000000000000000000000003b3636004d0045004d005a002e007a0069007000000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\3 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\FFlags = "18874385" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\2 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = 03000000020000000100000000000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\5\NodeSlot = "9" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\GroupByKey:PID = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings [email protected] Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = 0400000003000000020000000100000000000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\GroupView = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\5\MRUListEx = ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\3\NodeSlot = "7" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\4 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\4\MRUListEx = ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\GroupView = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\Rev = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\2 = 60003100000000001959ce0310004345524245527e310000480009000400efbe1959ca031959ce032e000000e3ad010000001b0000000000000000000000000000000b315f0043006500720062006500720020003500280031002900000018000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = 050000000400000003000000020000000100000000000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616209" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\3 = 6c00320014d502001959bc0320004345524245527e322e5a49500000500009000400efbe1959bc031959bc032e00000000000000000000000000000000000000000000000000e532c800430065007200620065007200200035002800310029002e007a006900700000001c000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\2\NodeSlot = "6" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" explorer.exe -
Modifies registry key 1 TTPs 1 IoCs
-
NTFS ADS 6 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\NavaShield(1).zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\DeriaLock.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\Cerber 5.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\Cerber 5(1).zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\YouAreAnIdiot.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\MEMZ.zip:Zone.Identifier firefox.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 5620 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 5 IoCs
Processes:
explorer.exeexplorer.exepid process 5832 explorer.exe 5832 explorer.exe 1144 explorer.exe 1144 explorer.exe 1144 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
pid process 3728 chrome.exe 3728 chrome.exe 3676 chrome.exe 3676 chrome.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 3644 taskhsvc.exe 3644 taskhsvc.exe 3644 taskhsvc.exe 3644 taskhsvc.exe 4252 taskmgr.exe 4252 taskmgr.exe 3644 taskhsvc.exe 3644 taskhsvc.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 3456 chrome.exe 3456 chrome.exe 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] 828 [email protected] -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
Processes:
msinfo32.exeNavaShield.exeexplorer.exeexplorer.exepid process 436 msinfo32.exe 1636 NavaShield.exe 5832 explorer.exe 1144 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exechrome.exepid process 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exetaskmgr.exepid process 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe 4252 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
@[email protected]@[email protected]@[email protected]AcroRd32.exe@[email protected]@[email protected]@[email protected]firefox.exe@[email protected]firefox.exe@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected][email protected]NavaShield.exeNavaBridge.exeNavaDebugger.exe@[email protected]@[email protected]@[email protected]explorer.exe@[email protected]@[email protected]@[email protected]@[email protected]explorer.exe@[email protected]YouAreAnIdiot.exe@[email protected]@[email protected]pid process 3904 @[email protected] 3904 @[email protected] 3036 @[email protected] 3036 @[email protected] 4596 @[email protected] 4596 @[email protected] 1560 AcroRd32.exe 1560 AcroRd32.exe 1560 AcroRd32.exe 1560 AcroRd32.exe 4800 @[email protected] 4584 @[email protected] 1672 @[email protected] 4276 firefox.exe 4276 firefox.exe 4276 firefox.exe 4276 firefox.exe 4132 @[email protected] 352 firefox.exe 5828 @[email protected] 5576 @[email protected] 5644 @[email protected] 352 firefox.exe 352 firefox.exe 352 firefox.exe 1544 @[email protected] 5168 @[email protected] 5532 @[email protected] 5904 @[email protected] 6076 [email protected] 1636 NavaShield.exe 1000 NavaBridge.exe 996 NavaDebugger.exe 5696 @[email protected] 352 firefox.exe 352 firefox.exe 352 firefox.exe 5904 @[email protected] 4212 @[email protected] 352 firefox.exe 352 firefox.exe 352 firefox.exe 5832 explorer.exe 5832 explorer.exe 1076 @[email protected] 5832 explorer.exe 5832 explorer.exe 2180 @[email protected] 3912 @[email protected] 4396 @[email protected] 352 firefox.exe 352 firefox.exe 352 firefox.exe 1144 explorer.exe 1144 explorer.exe 1804 @[email protected] 1144 explorer.exe 1144 explorer.exe 3348 YouAreAnIdiot.exe 3360 @[email protected] 352 firefox.exe 352 firefox.exe 352 firefox.exe 1520 @[email protected] -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3728 wrote to memory of 204 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 204 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 712 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3736 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3736 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 3924 3728 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 4844 attrib.exe 2316 attrib.exe 1580 attrib.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Endermanch/MalwareDatabase1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffacf5d9758,0x7ffacf5d9768,0x7ffacf5d97782⤵PID:204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:22⤵PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1756 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:82⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:12⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:82⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4316 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:82⤵PID:312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4424 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:12⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5404 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:12⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:82⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5736 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:82⤵PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 --field-trial-handle=1840,i,14150659011170687949,3528284664728315513,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5072
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\[email protected]"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
PID:392 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1580
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:496
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:2216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 107861724545322.bat2⤵PID:4444
-
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs3⤵PID:1288
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:3904
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /b @[email protected] vs2⤵
- System Location Discovery: System Language Discovery
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:3036
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵
- System Location Discovery: System Language Discovery
PID:4208 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:4888
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- System Location Discovery: System Language Discovery
PID:2232
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "svgirwyi764" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\tasksche.exe\"" /f2⤵
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "svgirwyi764" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\tasksche.exe\"" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:5800
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5828
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5888
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:5380
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5576
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5640
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:6040
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5644
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:6072
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:3296
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:6132
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5412
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5532
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:5836
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5996
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5696
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5844
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:5924
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5580
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:5496
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5352
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5936
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:6084
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:5692
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:5716
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:5644
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:5784
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:5692
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:5940
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:512
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:804
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:5128
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:5780
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:3904
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:5652
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:5940
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:356
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:5140
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:5408
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:5424
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE2⤵
- Views/modifies file attributes
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:5800
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:3904
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:5428
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:6104
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:5604
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:5576
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:3576
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:5968
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskse.exePID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]PID:6132
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\taskdl.exetaskdl.exe2⤵PID:2532
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:4252
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3016
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:3456 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffacf5d9758,0x7ffacf5d9768,0x7ffacf5d97782⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1752,i,9336785332245113781,9409871622793730849,131072 /prefetch:22⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1948 --field-trial-handle=1752,i,9336785332245113781,9409871622793730849,131072 /prefetch:82⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1752,i,9336785332245113781,9409871622793730849,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1752,i,9336785332245113781,9409871622793730849,131072 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1752,i,9336785332245113781,9409871622793730849,131072 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3968 --field-trial-handle=1752,i,9336785332245113781,9409871622793730849,131072 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3420
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:1560
-
C:\Windows\system32\msinfo32.exe"C:\Windows\system32\msinfo32.exe" "C:\Users\Admin\Desktop\ConvertCopy.nfo"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
PID:436
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:3028
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:4276 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4276.0.1147942419\213616007" -parentBuildID 20221007134813 -prefsHandle 1692 -prefMapHandle 1672 -prefsLen 18084 -prefMapSize 231738 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da578eda-17c4-4e91-9db1-4d38f61abc70} 4276 "\\.\pipe\gecko-crash-server-pipe.4276" 1764 1a591406c58 socket3⤵
- Checks processor information in registry
PID:4784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4276.1.1172373716\295451311" -parentBuildID 20221007134813 -prefsHandle 2368 -prefMapHandle 1780 -prefsLen 19118 -prefMapSize 231738 -appDir "C:\Program Files\Mozilla Firefox\browser" - {849536ca-6b1e-498d-b7ea-7c4bbfa4a2bb} 4276 "\\.\pipe\gecko-crash-server-pipe.4276" 2380 1a592217c58 gpu3⤵PID:4568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4276.2.1086895347\608933690" -childID 1 -isForBrowser -prefsHandle 3352 -prefMapHandle 3348 -prefsLen 19793 -prefMapSize 231738 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f7c7eb4-cda2-4802-a060-46160bee4edf} 4276 "\\.\pipe\gecko-crash-server-pipe.4276" 3328 1a594fa0858 tab3⤵PID:660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4276.3.1680719467\1658865119" -childID 2 -isForBrowser -prefsHandle 3772 -prefMapHandle 3768 -prefsLen 19980 -prefMapSize 231738 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c13f2199-8c9e-4328-b256-883767cec529} 4276 "\\.\pipe\gecko-crash-server-pipe.4276" 3784 1a5f8f6dc58 tab3⤵PID:4600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4276.4.1783248846\995834164" -childID 3 -isForBrowser -prefsHandle 4316 -prefMapHandle 4312 -prefsLen 26345 -prefMapSize 231738 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6f93e63-53f0-44e7-9e97-754a04670372} 4276 "\\.\pipe\gecko-crash-server-pipe.4276" 3960 1a5962ec658 tab3⤵PID:1420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4276.5.1272178148\1826058413" -parentBuildID 20221007134813 -prefsHandle 4852 -prefMapHandle 4848 -prefsLen 27512 -prefMapSize 231738 -appDir "C:\Program Files\Mozilla Firefox\browser" - {12562fd2-b7ce-4cbd-afdf-d0f3a6552d55} 4276 "\\.\pipe\gecko-crash-server-pipe.4276" 4860 1a5983b0b58 rdd3⤵PID:3424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4276.6.613069720\760446923" -childID 4 -isForBrowser -prefsHandle 5132 -prefMapHandle 5144 -prefsLen 27633 -prefMapSize 231738 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {79551336-60fc-43ea-b8ef-5beaf66bb11a} 4276 "\\.\pipe\gecko-crash-server-pipe.4276" 5148 1a592f96e58 tab3⤵PID:3352
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4276.7.1544532751\1361143586" -childID 5 -isForBrowser -prefsHandle 5284 -prefMapHandle 5288 -prefsLen 27633 -prefMapSize 231738 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {161b3876-0460-4457-8344-7ac0f2339635} 4276 "\\.\pipe\gecko-crash-server-pipe.4276" 5368 1a592f99258 tab3⤵PID:516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4276.8.1262443342\342289581" -childID 6 -isForBrowser -prefsHandle 5504 -prefMapHandle 5508 -prefsLen 27633 -prefMapSize 231738 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa038b47-d75c-482e-bf4b-f8ce08e30c21} 4276 "\\.\pipe\gecko-crash-server-pipe.4276" 5168 1a5983aed58 tab3⤵PID:4200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4276.9.300442089\861300518" -childID 7 -isForBrowser -prefsHandle 5812 -prefMapHandle 5960 -prefsLen 27729 -prefMapSize 231738 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b1d4d776-ee25-48f5-a469-6bc965272ac4} 4276 "\\.\pipe\gecko-crash-server-pipe.4276" 5976 1a598741558 tab3⤵PID:1348
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:3004
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:352 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.0.1916394217\2127258726" -parentBuildID 20221007134813 -prefsHandle 1604 -prefMapHandle 1588 -prefsLen 21141 -prefMapSize 233207 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e9df3370-77f4-4a16-8ff8-b60365585c2a} 352 "\\.\pipe\gecko-crash-server-pipe.352" 1684 230a09fb358 gpu3⤵PID:1288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.1.152599705\482765730" -parentBuildID 20221007134813 -prefsHandle 1992 -prefMapHandle 1988 -prefsLen 21186 -prefMapSize 233207 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4d083f8-992f-4e08-9f71-d958183a11a8} 352 "\\.\pipe\gecko-crash-server-pipe.352" 2004 230a063a258 socket3⤵
- Checks processor information in registry
PID:1280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.2.205668409\113771220" -childID 1 -isForBrowser -prefsHandle 2700 -prefMapHandle 2696 -prefsLen 21646 -prefMapSize 233207 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0db3c2f-f74f-4562-9f17-d223c0d5cf15} 352 "\\.\pipe\gecko-crash-server-pipe.352" 2708 230a4549358 tab3⤵PID:3248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.3.1675922778\340099431" -childID 2 -isForBrowser -prefsHandle 3436 -prefMapHandle 3432 -prefsLen 26916 -prefMapSize 233207 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {88c3b29e-4c8f-4eeb-911a-929ded8f5188} 352 "\\.\pipe\gecko-crash-server-pipe.352" 3448 230a5a14558 tab3⤵PID:3672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.4.663015283\200710072" -childID 3 -isForBrowser -prefsHandle 4000 -prefMapHandle 3988 -prefsLen 26916 -prefMapSize 233207 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b8095d7-d94e-4d4e-827e-01f2a289d3bf} 352 "\\.\pipe\gecko-crash-server-pipe.352" 4012 230a5a16058 tab3⤵PID:1800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.5.1355499352\630520491" -childID 4 -isForBrowser -prefsHandle 4460 -prefMapHandle 4464 -prefsLen 26916 -prefMapSize 233207 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e567dd2-a046-4d01-bd77-42d5e0a23313} 352 "\\.\pipe\gecko-crash-server-pipe.352" 4476 2308e761058 tab3⤵PID:1636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.6.152160265\1432303728" -childID 5 -isForBrowser -prefsHandle 4632 -prefMapHandle 4636 -prefsLen 26916 -prefMapSize 233207 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a8915a2-a568-49a8-8712-2728f9edab04} 352 "\\.\pipe\gecko-crash-server-pipe.352" 4624 230a6f63b58 tab3⤵PID:1936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.7.1541293743\1890902128" -childID 6 -isForBrowser -prefsHandle 4820 -prefMapHandle 4824 -prefsLen 26916 -prefMapSize 233207 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {50d63a08-7d62-4eb9-ab34-38ff2effe9d6} 352 "\\.\pipe\gecko-crash-server-pipe.352" 4812 230a6f63e58 tab3⤵PID:2284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.8.488296887\268282448" -childID 7 -isForBrowser -prefsHandle 5156 -prefMapHandle 5152 -prefsLen 26916 -prefMapSize 233207 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0670765-359b-4103-9706-bd67fdcf9b06} 352 "\\.\pipe\gecko-crash-server-pipe.352" 5168 230a7e76858 tab3⤵PID:4432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.9.1493743397\1532546181" -parentBuildID 20221007134813 -prefsHandle 5520 -prefMapHandle 5516 -prefsLen 26916 -prefMapSize 233207 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c71f793b-e508-4cd5-8d18-a3ad2fb375d5} 352 "\\.\pipe\gecko-crash-server-pipe.352" 5532 230a8557d58 rdd3⤵PID:928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.10.1249547589\982565337" -parentBuildID 20221007134813 -sandboxingKind 1 -prefsHandle 5664 -prefMapHandle 5660 -prefsLen 26916 -prefMapSize 233207 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f62521a-56ed-4ba6-93a0-48d253a43e51} 352 "\\.\pipe\gecko-crash-server-pipe.352" 5648 230a8559258 utility3⤵PID:4076
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.11.1773611978\363478360" -childID 8 -isForBrowser -prefsHandle 5984 -prefMapHandle 5980 -prefsLen 26916 -prefMapSize 233207 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e89933b6-dfd6-41c5-8730-f46d5c1ba6d9} 352 "\\.\pipe\gecko-crash-server-pipe.352" 5992 230a8815158 tab3⤵PID:2128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.12.180890864\222471889" -childID 9 -isForBrowser -prefsHandle 6016 -prefMapHandle 6012 -prefsLen 26916 -prefMapSize 233207 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {83cfc4ef-4342-40e2-98ed-b868eaa53a9c} 352 "\\.\pipe\gecko-crash-server-pipe.352" 6132 230a8815d58 tab3⤵PID:2824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.13.1806643722\1669289219" -childID 10 -isForBrowser -prefsHandle 5068 -prefMapHandle 4444 -prefsLen 26916 -prefMapSize 233207 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bdfd9cf6-dd99-40bb-8e2f-8868797223fb} 352 "\\.\pipe\gecko-crash-server-pipe.352" 5064 230a8559858 tab3⤵PID:1668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="352.14.952809342\512028838" -childID 11 -isForBrowser -prefsHandle 6348 -prefMapHandle 6532 -prefsLen 26925 -prefMapSize 233207 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd52fac2-a456-45db-b3cb-3c465ce93d49} 352 "\\.\pipe\gecko-crash-server-pipe.352" 4988 230a83cdf58 tab3⤵PID:5176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_NavaShield(1).zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_NavaShield(1).zip\[email protected]"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6076 -
C:\Nava Labs\Nava Shield\NavaShield.exe"C:\Nava Labs\Nava Shield\NavaShield.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Nava Labs\Nava Shield\NavaBridge.exe"C:\Nava Labs\Nava Shield\NavaBridge.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1000
-
-
C:\Nava Labs\Nava Shield\NavaDebugger.exe"C:\Nava Labs\Nava Shield\NavaDebugger.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:996
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x40c1⤵PID:5276
-
C:\Users\Admin\AppData\Local\Temp\Temp1_DeriaLock.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_DeriaLock.zip\[email protected]"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:828
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5844
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:5872
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5832 -
C:\Users\Admin\Downloads\Cerber 5(1)\[email protected]"C:\Users\Admin\Downloads\Cerber 5(1)\[email protected]"2⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:3888 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___MS750TWD_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:5988
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___3V3C_.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:5620
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "E" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:500 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "E"4⤵
- Kills process with taskkill
PID:6068
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5808
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding1⤵PID:3512
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
- Modifies registry class
PID:6004
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {515980c3-57fe-4c1e-a561-730dd256ab98} -Embedding1⤵PID:4464
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\Users\Admin\Downloads\YouAreAnIdiot\YouAreAnIdiot.exe"C:\Users\Admin\Downloads\YouAreAnIdiot\YouAreAnIdiot.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]"2⤵
- System Location Discovery: System Language Discovery
PID:5196 -
C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]" /watchdog3⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]" /watchdog3⤵
- System Location Discovery: System Language Discovery
PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]" /watchdog3⤵
- System Location Discovery: System Language Discovery
PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]" /watchdog3⤵
- System Location Discovery: System Language Discovery
PID:5820
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]" /main3⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:5716
-
-
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\9015db195f394c0180374100b858e792 /t 5876 /p 59881⤵PID:3192
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
4Pre-OS Boot
1Bootkit
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
2Query Registry
5Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5831295342c47b770bf7cc591a6916fa7
SHA12c9063fbf3f3363526abdc241bf90618b82446d1
SHA2568341ecc0938ca6d90b7e0f02af2d7e6b571c948a03a99d54af61c4557c78d656
SHA51201419defe963a987989cddb0e21cf651ec3eefeae97cf4b257d4caa8da26436a647e8e4d95cdad22bbb0657171f6d3d9c41dc6fb217ffc7d5172ebc9a409d36e
-
Filesize
10.0MB
MD547ef848562a159b2ce98d527ec968db2
SHA156b34310e8ede0437c422531bb89b2255a03cb3d
SHA2567d899d2d33bde1c7f55ba0fcd4630b817e42e5cd1ceb8739511a990455275f90
SHA512ac05354eacab4252e57151e98b8845d142b258590269ef92a724818623f2912b48341555ccc604a810e89ced3178ffc896ba116805ec3d129d9f6932296d935a
-
Filesize
72KB
MD5de5eefa1b686e3d32e3ae265392492bd
SHA17b37b0ac1061366bf1a7f267392ebc0d606bb3db
SHA256a50e56dfb68410a7927ecd50f55044756b54868e920e462671162d1961bfe744
SHA512c71270a5275f91214444449be4923a70243a9e2cd06afcc6fd28ab9f2cd2d930219ce8ed9ec008750b2611b62ed26b65cb57a75c6035201cd9657263d157d508
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\update-config.json
Filesize102B
MD57d1d7e1db5d8d862de24415d9ec9aca4
SHA1f4cdc5511c299005e775dc602e611b9c67a97c78
SHA256ffad3b0fb11fc38ea243bf3f73e27a6034860709b39bf251ef3eca53d4c3afda
SHA5121688c6725a3607c7b80dfcd6a8bea787f31c21e3368b31cb84635b727675f426b969899a378bd960bd3f27866023163b5460e7c681ae1fcb62f7829b03456477
-
Filesize
136KB
MD5bac048fa024a61120ae311d4aa91799e
SHA19cc5e0f5400e98843ba140143c543082260f66ad
SHA25634676aaf3fa6aa8e9e9919e71ccbd51649d068ece73cd53b0de7c2744c78a654
SHA51284e5dc340b44e603f2e300a42470e646e1134a8ca6781da89278940be61da6a8b9169df7cfe667523a7b572c51cb2a56d66ad6fa0e39044b1dd9cea82f6ce181
-
Filesize
40B
MD58f3843a9da63a7c396a894b5865b2f67
SHA12e7f9776d1ba8b15aea00d84eff977929ed70022
SHA25676841dc7ebcb954ee1442bff5ef2356159574207e77f9b74b5303d298980b26a
SHA51206c417f3f8a5010105ced178e9d478c82253cc2ffb08135827ea8a5b905101b684d532d7f6cd776adce49200d4e719242bf44b88311c5d3f7ccdb6bbcba200ba
-
Filesize
3.3MB
MD5e58fdd8b0ce47bcb8ffd89f4499d186d
SHA1b7e2334ac6e1ad75e3744661bb590a2d1da98b03
SHA256283f40e9d550833bec101a24fd6fd6fbd9937ed32a51392e818ffff662a1d30a
SHA51295b6567b373efa6aec6a9bfd7af70ded86f8c72d3e8ba75f756024817815b830f54d18143b0be6de335dd0ca0afe722f88a4684663be5a84946bd30343d43a8c
-
Filesize
2KB
MD5a5fced9a17ca39e9e7c35eaaea21c7e5
SHA1004f44a1ee08f303eca9413b44f698b514efbab2
SHA256932f0702271e2421cc0cbf52c0996298c7d9d4f9e06bb47c1fdd4795a8403b93
SHA512acdf4e87e6dfe6168d88f4860ca4a74678c9140fe415d0ab8796e115b9da722df127ab820a24963cc9a02459260cf32f4ec53ff1b841cf2e4309cb2564571a7e
-
Filesize
2KB
MD539685e2f1022cb37a373d9b9c9cf0257
SHA1ea14df8a9251afc4fd2c0d295762617ec06277f9
SHA256bf7f394acbde641e97be563ee2c2a65a0d37a3549f5e0a151ea1260d7eab272d
SHA51274278a518a8c3250345fd8dd1034b90bc7b40eb23feb3f242eb3916aa9e91a6cad0e289ff0b47749155d1c04f3f1a2310cdd2dcd4e7145ccfc736f5feed21020
-
Filesize
264KB
MD54fa78989f782b5c8c78c13787e108bc7
SHA1bb78c563cee8692a9baf33c47875994b122dd831
SHA25656050043d0979c83e237828dfaf20572fc071ab884ec0b096406ecb04f9a0897
SHA512a7f253ac6e4576fdc12bf987b1d0ab63088b612fd7c7af3cbc4880935de51d5c703c486f2211af70644777612e3f8d8c986159a6972cff5d7bfef551a5edac72
-
Filesize
1KB
MD5e8980262a855a2649cac8286881d3578
SHA15c44267a5a53f09ac918798d4b67be0eb0c62d01
SHA2562f899cf1cb7406492f3bf3d26052de7d51fc5c6deafa55b11b32042903b4a61a
SHA5122a5623ff7e1f1534c85f2cf74784815b0e05c62dc3d4798abc2e562fa9260e73a38d0243ed3626a032ecd14dd7ce1e836c0ca9676a049893fda6d4be3919cc28
-
Filesize
1KB
MD5118137286c1182415333c400fa24d444
SHA1def01259cd46d9f0f137d385ebcd909cdc90476f
SHA25639ca3509d630ed56c2995df86ba2a52530ae69cb69b5fb0bb9470af413138b20
SHA512750f9aec8d2855a919fc9b3fb95416bbed1dd537e52c18f169ffb6720ea9af37e03c2fe7f26dcb401cf45a06d4b9f785853b5c3eb0d92fb79edf59add1f64ff9
-
Filesize
1KB
MD57f02f8a72fce5a8f85447bd73dfb6dda
SHA1ef635b655d1bf3c58fe4170c251606833d5769ad
SHA2565002312f6be2fddb6fd47b3d35efb9e5c7caca29ac94121257018d353ffa85e5
SHA512f127a01d808c009e75f1562476840832a0d15c3dee8f57390b71c6741746142ba18dbef04d380873d68dc7e5ec027854922c1ba1a3281e50464c88dc84f5b300
-
Filesize
1KB
MD524b721c96c06d5324bd092b9ce3acb71
SHA1bc7cb5bd6c491384b07ac35f6d3d6e1345826e30
SHA2561317ba6459d794645cd2c61cd3308b808075562953c51f3fd283bb455daaeff5
SHA512cd66fd4beef3a849f947f1f3bde0ec4ddbf8d88c14ad9867f6040624b3a22b07607e2574ebadcd7efc6cae9a30c6d1a6cedcd99199ce35b9ac5be281b4aa768a
-
Filesize
1KB
MD567ea74d379aa09c840751879f76b030e
SHA12472404b49fdd822edb14b13271aeb95424ff61e
SHA256a4d1b3bf88e1208b53471f6b4913bb339f144b418b1e344499c6b2e74db931f7
SHA5123c45cce35c4eca1bf5d9e6f716f9b88a2ffcbf0a80fef561d4040542687bd616b5ee7019b46a7748439870cdcc25eda84583f327a1a0eb5ad8b8819c331feabe
-
Filesize
1KB
MD556f5ad6d3e3a09a42d96742615cf370b
SHA1b2307eb9a9bb8c8a8f9cccf993a3536aaa7ce891
SHA256e5fd9e750f63596f305eaf19b71078a7ba2e0aef5a0e2060b9076dcb5bbe96f4
SHA512a72548db30fae66eaad023cf319a410ab59879bf1a0b229158f66eaaeb4c2d752c6529e2593ea9f8e4456df32f0052c9ccbfab157e14a83b038b124d92ac36c9
-
Filesize
1KB
MD5ecabdaee86e9157b24285f1b2ee9da69
SHA1fef459f39e9b2c850e15fa966f2fd8b50f42d15a
SHA25687c78a530aa7fa0cff4de5e0e4db4d5448d0ea2103a7b21c4df69d89812e54d4
SHA51210725702729101901a59f8f7e8a928e050ee258e2506e579d79fa29370c305017fbc132ea5c30a8700bc0a29cd3fdd115eae16e5b6af641482deeeea729d5ed1
-
Filesize
1KB
MD50c9be20b3df38b45c248ffa4c3905fa5
SHA150fb2e054095cd6dba8204eb544ba165099b4656
SHA2565806f08d474bf249c1ea66c10b66f86e9962d95c07bea67961898e6aac95d25c
SHA512f42085f8bfdaa31f9917765c20c3fdaf13971e0b16c17873a1235500e1498486fd097481d5bc1253969282c8ee19571ec061a8a25956ad5ca2a1b1875cd52f67
-
Filesize
1KB
MD5769379b288d38467c4d135237089fcb0
SHA11df771c2ca48b6768ba0e4b970f4e260e07fc91f
SHA2568812de1634ee82dae129cd9947991904a33ac25440ed263ddeab5158e7254bb8
SHA512c29a09e69b74a70946d0808b7ebd464c1df3970d20ccb667bce2d50355ff545c7bc433afeee64f0dca5394672060ac490185c58040457b8d8ac20ebbb3aa3a84
-
Filesize
1KB
MD5c044cc97f1a392ffebfc9917ab4bcf91
SHA11336e033670eeecb1548ede496c9bdd9dc3daeb7
SHA256254ff7062b53195ab7af0d9f3fec5e1a45f05c04c41291f8fdd3dccea1f17d61
SHA5124c1487fd5fe1ef9f5a6e341df8011a73febc10e0f0305bff99f152c2be2cd32fe6ed1246f2d6471d30036bc4e342d1afd5c3fb662f67cac59c2b5696e024d69f
-
Filesize
1KB
MD5175f6764a089e3b46fa0f34036eafe13
SHA18087cb22583c8302dfc2d1b1749262aee602d3ce
SHA256a8dfd08522180fc89dadd595ed64efa0de3fb9d1bebfc66861a571362e72a83c
SHA512615353590cf2986040839bc0590ab8d143b5b2f402866f9c0ca8c38406390dcf552447e952f7a7d999e8097af9b392733b81c5eda13ef46e35a0e9bdb5b5f3b7
-
Filesize
1KB
MD5a894eb77c08218e89b4d437ca643197a
SHA1d3a757e90c5a2b88c3e0ed4e61f176d4ce776885
SHA256a0a832e2c7c3eeac6c6ece64801d2fb5e5549cbe322cade026bfaad1f3a18e07
SHA5122b342e20379e1493078b0905dc94aef66a1360e92dabf77842896a28c63d14e5d10f883efc946fa7d81aa95327202106718654248e5dda5898d9ef452d2d1048
-
Filesize
1KB
MD517afa0c31b568d3ac67fa7706ec31c8d
SHA1aebfe0275438264e3f1f4922b0e301dfb3240cbb
SHA256c1ed5cb4ef14bebc1fe233b8c79626b8b660daea2febe1003fed0017159a8b41
SHA512a971459c1c0a06f12f3749f75e28f332245225019bcbf6be96115f8b425fb4be030fbb55a6d11cf9a34251ced7a36e77c7bda8f09522d38fbc13cf3e8e26ba03
-
Filesize
1KB
MD5c0c910f4e580198ec569d70b9096275a
SHA1b793cbe5e8ff1aaa0c500652a044683837256bf6
SHA256377b9b69c2987e2626ecc188eee071dcb217f5567ebc8e7b5ff4ccb5f1c9a0b9
SHA51208091c7b187d77dbdcc47118a93c7460af9eed9ee3e611d96db203613519de946d2ecf4c9d10a174258ed7d87e69835f3c4a689135a99f32b3f65a505d3daf2b
-
Filesize
6KB
MD57b87798dad15c76bf121a739d49bc028
SHA1f83ce57c3808ab3deaa50f50f82bc186b0de8111
SHA25698d46d8f44b5e19d7880fb702e2d85c6cffe72dd1fd9cc697c5ecaf06cdcf83a
SHA512fe947066ec55006307c36884448352fb4e73f25c54fa1a78025a6e49dab62a2326ff38a97f1b814976939a9e541942f2b4f3e92132a30348d4619bdcdab18327
-
Filesize
6KB
MD5e4c8dcea63bda91f29bdb082ac97130b
SHA14d089b61c525f1e41bc68b954b864ef54f2fb3ea
SHA2569ea65b2c2fee89daef0cf3c1c902d3c5d040c8abf7617cf988e553b76c0e7e12
SHA512248fbc9fd62aebd4fa466e0874d04fc3a213dc87724e4afc9c1ca0c5c94d188b7f468d5a89c15e4d1e636ba2910bb6155fb51fbce08617ea33e584d1cc5d7348
-
Filesize
6KB
MD5b507638076ab8523d6c29eb21f98b54a
SHA16961c910127b1d993bfbbf5f1b9797a2a4c8adbd
SHA2569fe65509a49ea37cac1cb0efbee7ac3829a8e8edae84978c108b3a136f142a7a
SHA512896412b1a0be7540aa11f5231138b153940fb0acce9302888f3db458b712fb9176cbafd17c3555b602414ef45ff4fe37ee1dd6c306adcd41acb4b3407c1fa2f8
-
Filesize
6KB
MD5264c560dc2f9fa2f1f4441f46d6c2719
SHA18b0a74eeccfa97ce68dc83f8c963a1a9a3059104
SHA25678ed2221933653d317f2127036822aa40c42b7b16b3622d81cbb685728c8d59c
SHA512e45a62a747f2bea4653bc5500eacae6be8f1c0a78405827a9e77c4fd3ff5453a160356e9117c9da7b57cfd902af296d6ba995a68f45fe05297173acdd4767a2c
-
Filesize
6KB
MD520ce94e4b1d5e3cae63fb1751f853a9f
SHA1f7a5fbbc64c8b9169d8ad6658ffa723128cd170d
SHA256a3d29e1ff76d3cf451e029da716c65ed9961a7177b137cfbcd735f7dae0a6662
SHA512eb76a3fbc3cb137105b31e3c70da6758739394ccae44013ad5ea65d877b21f9c1a3a4c13fd5f57c2cc8fd044ca189cbb17fe0ad9be9601566b1ba9c5077b2819
-
Filesize
6KB
MD5148b41ae676c73fe8076c780aff1a693
SHA1be109e22c46ed963c8dd006927fbbc48dd49e58d
SHA256146838689346fded7e986f18899ce9c52a215235f54248c61f75fdb3e1c09805
SHA51200b0dbd29ca0b807915ae236a32b90cbc67e78ceb808c94ea0fb310ca4bcf7a8d0e39e61ec15d5bd0cc485762b15c2ba073fa13f4a41e0825ec68e40fa77f516
-
Filesize
6KB
MD5d05ce2f7a21d6b526893de5a1fe5f22d
SHA1a7efa6dfa47febb9388165297a77d0e39e55cd46
SHA2564d6479b1e623d3db8c55576a4b0a8f8aaab600fb5ce9da5399dd5609d85d0fe6
SHA5128aea758bb27d51567c4c0d6b5fc4e4a4bfdb94c734e12f6070e500260225c93e87071539319bbf93dc3e12702f0dae4c9a120d3a1dc8386946645d70a8d808de
-
Filesize
136KB
MD52369ad4558fad45a7a16a8d3e6447b57
SHA1486044d97f7e6f6b56f8d58cea05a9d633bb323b
SHA2567a2e0a0ccfe3c00a321f9eeba7b42de174fb31f13a06a6edd1a1f14c22dd15ae
SHA51242d1e36a4761c49dbfe8e5627831a35d18e59b72b395d2ae64d5747effdf50d5354e858c3789cbd0f5c9cdd633fa266febccb5178ddee12692e0843757a06119
-
Filesize
136KB
MD5e404b1220c1d5099eace7482af508a12
SHA1f2bbcc977f8990e0e7daf783ce6a4d2a19e5afcf
SHA2565a80def917e5b3ff3c42bd5c0af1542dd980eefde5c9f33d9f04d297d5f320fb
SHA512c925f2f913b38023fa50a2f1751187614153205dc4f130ccba87e77a70868a8900cac2f75966d8e4a3f02fd95b5763d16dcdb627713b8275183c6c50520c0368
-
Filesize
295KB
MD5e08f7a91ddf364857f83b753bcb6e6fb
SHA18f7924e67eb9cf82e83f71f130233f7db3926afd
SHA2568b3aadec40096ff9195d5edabd9292585c4f6b1ad55ba1025402a62023559dc8
SHA512c700fbd0133d4c1ed02e6fedae059c5341243f1788c387903b850e775e65e93be1ca3ba1d07d4566b51b07964823229389822f1cd0398f498948e92f5091a252
-
Filesize
109KB
MD57eceea8c1a0c55121d261e5072b1b680
SHA12f6f20cac48296eb20032b894cccba41203376b7
SHA256d33886f70fc63ac09934e5cd72e6566574def814b68fa40c183dc46ec98709b3
SHA512e7cf2d6f2bb4848b125c0ad4526d1b65a4bbc5b6406d991b94bacd1acfbc02472f6b865d0d7d2abe8bd638efa47c45576407d4d612d7d887fb82f3691011a2c4
-
Filesize
105KB
MD57747f61080b26a279e6d8c92b848224f
SHA1bda17c9d71e2f4afcc155048223c00adb3330717
SHA25692576eaee31e3e338d6cb6c7223528801deeec5b40d9a34713ce21a2c1f71920
SHA5129c9a4d6f015fb54b09b4a89c9da6416f690fa6344762e927c120c8ce9fc1e237e6cd00b004248932807830d422481d213fa1ce749f45b5b0d860bf7dcd45b250
-
Filesize
98KB
MD574dc73d71cb0365d5768a1ea619f85a2
SHA1b0dac9ff77dab465ea9e6893f9c454f1fa65de4c
SHA256bc3e2c6b7a231271aeacb257d3180b66d7a4e7dfde9629c9fa826631da0b17b6
SHA51283d93fba5afbcc07a4767fe992a96d7889c50fee7d7758aad9974f0c1af2a9022b45d4fc62321964ef50663befb41cde87f67de66ecbf8299c4b2d619836e3bd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
1KB
MD5ee9759bbadb07ab3083a52fcc0300712
SHA1744a4d8bcb44b5f81327f966df7cca12f289c679
SHA2560a1893f7ce82da2cb4b3ba36cccdaee116fef49b9d7b72e6b1ca0009c7967734
SHA5122490878bb8b4ac1333708eeb7f4c7395840e692a5aeedac157f981a94c0dd453269c529908eaef01132f99bb4ab61cd63e08758e3e998e57bf7838360447943e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\activity-stream.discovery_stream.json.tmp
Filesize49KB
MD57a64e8bb04bad219a1963113daf6eccb
SHA19c50ff5316a481d34a4ffcf1876c470cb0f2220f
SHA256d66366fa97eaf6f8154e0cd8b5c76f632e46c21c3df598d7d7846d38fef80904
SHA51270ff8e7dcd8f39557effe622030cb1d6b4b219cd3873c1c011dd44fde8db3ec820f310d2027b2e0f9b24bbec55cb7b64b4630378115c4942c794b2fddac730d5
-
Filesize
13KB
MD5f85004145e6f1740be931d5dc9a150a1
SHA19d0da58e94eb3b5ddd60cd48faaccf04cff25e15
SHA2566e163755377ff9d3cc0b56d21821b22ed78092e967185501f785412f33549708
SHA51228571824132ab8c2aebb8ec6b287d197da10ee6f003109df94a96021f6fa037ea8e70466d5f86a24d9a56627879ea757b5950c117ed21ee602d83563f1c09d43
-
Filesize
13KB
MD5d033a4a0485332621b830806db9adf48
SHA1bac4398730c1ad2613aa4ac4117a15ec53531a84
SHA256358c0ab0a97796d0e8f2201195ac5a4058aba92ffd1a554c7c1630647032cd73
SHA5126184431a6b19ef1ffc48c13e0acea72120b0d57fb1ae06487336251f47a91c44f383bd92e65b43b3c715944ca3f1d373560ddeb8396d676a3efa027572b65d44
-
Filesize
13KB
MD5885099ba317d0f0b4b907a9a1ba69910
SHA17e55e012367de124d796b5c37a60cfae1238eab7
SHA256d71d7912eccc310d3f311df6efa5842798459176228f1037eb23d1e3df3db182
SHA512fce879cae5d232d6e95d3440f3596516968f88df126dc139e0d1371da10588da54b81814726b1a872a0260327279cbb417ce594c76c2e836d939ec4fb32cec60
-
Filesize
15KB
MD5c6a222d23455bf02ec4af7be7e1e3932
SHA1f4a268b0a57ba31e7f55084d0c12a2f0c0c486f1
SHA256142ed94043a62439e17135bd680f2ca33a788c76da14aa82c74dc9c74efe1815
SHA512c5829c0f88162b79fbee00845f2a604221da716a107eba9decdc93909b545f883ee5024992cb295f3e4c2aeadda7c9cd9e2dbb4ecd061771effd7da438f469da
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\087F96B189611952C6B30E20692EACCCD08B35EE
Filesize87KB
MD5f9a94235a042aeb93d00d2ba5871415c
SHA1658c84f3c22aa475d612f3871ca1cd694b1cfbaf
SHA2560f06f5d324b4440e267c6bb0d11ccd64212e382981739eca4e4f081ca19c5dd5
SHA512182629403f750fcf7fd31657dbc9f9d47bc2d553731312d9bc122cf8c30a363d0110bce5f5e96f0a572cca72732a91ad6948a6440c71a7366677ffbf81fb44ae
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\333F6657EB02E4E81EF932E9611E5C1AFEA06660
Filesize26KB
MD58ce9162c8619d1cc277f8b3a69706c98
SHA120b6bf408c6d2f5b96a6ea0d0b8698f96d501ed7
SHA2563dead4a939e8c88595d1253d918080b3fd3ce0b8bb454414bd4ff37a562ada1c
SHA512673af9251d77549dc2f27a842d2f647a9540ac056fffe43f3ec624e9b51f1e798b8fbd2842b52076192c07680b478452453a6b9a49d931cfccd96411839bd02a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\3A06CD85D4E024D8A214D9C13F95DE8D2BDF4DEF
Filesize117KB
MD574341dd7ca78d625d2ad79ae01c6b60f
SHA1dca36d629fdeefdb45f0914a583cb466bb4efc13
SHA25663fa3b646db56cc009153061faac0d9a6692c4bcb518d4dbf9c19e6d89439d22
SHA5123d53f7a55a89eebb24a82811a3c1282bd329054311949071a592d6e5d595a2f8abc8c03907a8130cbea0054ffa864bd6c392cd0a2ef71c390db38da6f7b0387a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\49AF65C60E9467DC868F8EFFBC6F0E1FE2D6093D
Filesize18KB
MD57c7c60defc02d35d3732e1b86987d88c
SHA1f9e78e3c2c5279ab77f88757089adea1b7ede2fd
SHA2568ae54b437040abaec32c206bf25b67de82ce809d177228d67f1f2aa855433d93
SHA5120befd1744c3b5947c90a9cd544a68f4e7f1857b818eabaff2070a199224629c70933ae038f516777ef5881382aae4e0cbb80495169e2fcf155f456146e775ab3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\4BCF7D608B2663D7D1515223C0F13E5D72484770
Filesize14KB
MD5f1b365fdb88f89427854e8f538443cd0
SHA18c11755bec9561cd59f77e04aeecd22f709f6c8e
SHA256084f48c04f53d4e7ff2763ee54d36cc37c9dca1a3e1603c6f8f7ff127ec17aa8
SHA5129ac2fd01eb2cc3f875cef6da26e2db7ba2b155f73dbf124dbf9710da303596ceba0a20a420cf1a1a5db492121401b37d850fc8af7fdcbc3baec889175e405c62
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\6973955F832C3780D91B32513BB9D0AB49A2165F
Filesize66KB
MD52a647cdafa625c848cf898ed737a2007
SHA1b9bb4e04b463a5282c5416dd1541e12143d60978
SHA256f8355aea7802bb706a6d57fe61bbbacda80bc2cb4b9047546fcddfb18cd66782
SHA512657227d693053c467c3fdb3402520700748c8707831669188e597fbff9026898e603042197e59158eedf2f7b9774e73fdc850f374dd654130faa2b85afb54119
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\6EAB61949AA154B4D4B519A2E8B104821698EC45
Filesize47KB
MD5ed5bad8a596a03da4636383cd6f32ad8
SHA1f8681201e3ed7ef1cb74980b696c162061874a24
SHA256595dfec2571379e771d9312f8aca09e792b139ceea6e7fcfc14297638e2d35ee
SHA512d6f371e6c8b22f7db69d9f6f2cac7abe6f07067f7bcf4ca5c984ad28c40cd8a1caf16e9ee3d1df6c9a5822ef8973fa0d0c62f3c96cd8c38ce2ed721cd61ac966
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\720F9328EDCB687F180A61D6EE96A9CC79671A28
Filesize60KB
MD535437ca4d02ec10b5682fb3fe220ff59
SHA1bb85c73d91bc504b6be69974fb0f536dc162e3ab
SHA256cbc05e181807520ba5d1fd60ef4fcdbe186663cd984d378c8d03611dc4695977
SHA512403f82045f9f25ff872bb00fcbb45f3818dd291fe327ca980a05b4d031d952322404f073a1f8e25fb604bd3ae8fb615716d2a846bd664e3c878e340b28479d1d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\748B3C262E516F4D5B104DD3D63087F9C0F30C5A
Filesize81KB
MD515c74caaf377744ca55ea7f13087893e
SHA1cb832f3b7cf41b645b8fd9d4988818ccd56afee3
SHA2561d85ab8c5739668d645f495f2ab276e28b3656e1685bd54261345c5b828e57c0
SHA51234fb0303b81c71661f56e789e2be9e6fc3742a335eeb8718e78bfd051bce9919ff9714486e8e080fce46f48e0084d049911078ffcb9e8a848624baabd6b7bb64
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\7ABBC7011A8B281CD5A3EF520AF61CDD05FEF769
Filesize30KB
MD5c829602510c0dd3455ca53e1a4b06822
SHA136b303f2eac6ff0733f276a8476c760eb38403b3
SHA256191558bec017d71d27a61a091e71c8044ce6b80526f6ca2bf23ea5e1132b1707
SHA51247b8297d7bdae9bdf5611a0cc0598cd665aeac7869d14aa177d09b5cd883ebe6d72f7071d82634a3506793892c4c2aa645e7c9067ffdfb39f7c00b06da946b36
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\80E40493E66F98650D12C73CDEFE29BBACA89328
Filesize221KB
MD5073daeeef1f81df01d9a401c8fc3ed9c
SHA184e8c081b19d550d0e7a7f5eab63e639908cc41e
SHA256d6195d76bea662e87d84971ebb39450f862d56f61d968b00e932c01c9349f468
SHA512299afeed38f7747651e075cf4b15dcfb213b70e422cfce637f78f0f14014e2904cd0bab1e4195361dc9d31e5d97cd069ad039660b2d2485098e775e5c1ab8d59
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\AF6E7B7DB9908D7B867517AC33D094ABD56E38F7
Filesize14KB
MD5dbd7d92743f63984766484305831f8f6
SHA1a5fa27321010a8b29fe5d0d04f4f392e0c982c57
SHA25610e0a0511a8f501f6abadc81029276e14af4ca479a57b786a23091d95ed42fa9
SHA512ebb6aa78b7419b7432d0d38c8a5c82c417d9776797c089df352c8c2afa19283587926b14c519f6356672dc7974e6102a8c5ba7d9cbe853edd3f8cb4cd74a6eda
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\BCF6CE6CB5BED478EA71E9ABF7DAF4327D98FB77
Filesize47KB
MD569f0ea801e091455583c89fa10f7ec73
SHA11ee1191f0ed0307dd0ad671fb3881693d348bf8c
SHA25688bb3217a4f3210c0fa638534ee0c64cbb9b4edc21dc606950f57546f071fe38
SHA5123b51486eb71158363a93074b0d368bac5dbc6b0cc1c054d4393943647023c1aa48ae10871d50034b21a25db3f42ecd3897b5c675e3e02abb99899d11a21c94a1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\BF0923D6C9AC3F4148AB74C98E937ACD57DCEAD3
Filesize16KB
MD540b3e81276533a04153ab364e8ac6722
SHA13815005fa5ba25cadc9418003c64d1d8573315b4
SHA2569d7a294f0ee676ff8e8413604404289e4602e8413e370a1c9ad9db0355bdb853
SHA5122f4088c6dc69447a468cd82253668922147ac30a1c4afde3e5e99902607ab39b34dd73b3ae7748bcaeb282ebd9f431dc29d6ad79035d0a24c6d0a6edeebb4eb9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\E6C22A3DFCD18E3C6145370266896FF76AE3F7EC
Filesize39KB
MD59f59afd68f29e5eceaf360cdbbce3de5
SHA170e09b045771bd029caa2a4808c3b5ee0dd61a70
SHA256caf74abe14657296f53f171e906e3e25bcdacc38cbf8cee61b5dfaa50021948c
SHA51201db8eae6d4a9e4e1afe30ea57c325b070ee56ddefde46e6dae8137976bdce32b429dd6043449cdf53823cc40b6f882dca5c8b836f6668849c7577cf4b519f0f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\cache2\entries\EB7DD385477F8D3CCDE2B439033C907AA695EA66
Filesize32KB
MD519d47c08ae8492c5584f662f82856c94
SHA13eb55c102842915dcf2c46678e4b77e3a320840d
SHA256f69be790c9d8af27bca20b37920dabbf256293b8c1a8e8c09db8ae0498a00456
SHA512740ede0581cb3be59049cbfca0fb272dab7d464b3dfaebce6acbdd18c16409733b8ade61a480637b8ebdd7b1a02a53be57e3990f7802c60c48d4dee0b57851cf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\jumpListCache\B+E9oCxQjtfD5vafvXf+BQ==.ico
Filesize25KB
MD56b120367fa9e50d6f91f30601ee58bb3
SHA19a32726e2496f78ef54f91954836b31b9a0faa50
SHA25692c62d192e956e966fd01a0c1f721d241b9b6f256b308a2be06187a7b925f9e0
SHA512c8d55a2c10a2ef484dedded911b8f3c2f5ecb996be6f6f425c5bd4b4f53eb620a2baccd48bac1915a81da9a792971d95ff36c3f216075d93e5fd7a462ecd784f
-
Filesize
1.2MB
MD5f96faa6ec671eaabc66ef44d5a715db2
SHA171b08ba07e5cea3490daeb4b75b4262b1e8a9821
SHA2566beae61ac55708892f869336fbf24f5987b433d3abe54f00bb69a098715caa1f
SHA512ab02f785eb412004de71337a016861e790c643bffb7b1ff87d3c7f62e9ebe139fb13b04c4605ff8f069e9e0eb032427e864a6d98af5b8e25fef770bb84272838
-
C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]
Filesize14KB
MD519dbec50735b5f2a72d4199c4e184960
SHA16fed7732f7cb6f59743795b2ab154a3676f4c822
SHA256a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
SHA512aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
-
Filesize
136B
MD53e6e9a88f2fdfd060b337d1e38049b43
SHA1ba53939b0576b3bcf69ee3d7d216c9153c4d4329
SHA256a8e32055dec67615a7d25d6f0fbcfde1495fa9abbf2bd5145936a842935dec08
SHA512258699e0124ac5ed1afe782c7e3faf46ffa4b3c0666670dd9d161e51de7da23037358923b40f88c504961032d1111ad14e47988455e010623deb2cd7bdf76be0
-
Filesize
386B
MD54f328f9964cb23a802584c5c078ba721
SHA130a34d991a386e7f32b2c234ef4731d0605b9516
SHA2563089e9cd50dc6c3486d1ce4029ef026476cf03bd10dab76a63f2d70fa1e9979a
SHA512fc6b14db9f622f6a114b34f275c72a70b793ee7250591a43ef74ef58b8beddd9855ed12b8c499e657bef4e0918e5302cacf00a7d3e4b94ea6ef7c55243797f30
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]
Filesize933B
MD5f97d2e6f8d820dbd3b66f21137de4f09
SHA1596799b75b5d60aa9cd45646f68e9c0bd06df252
SHA2560e5ece918132a2b1a190906e74becb8e4ced36eec9f9d1c70f5da72ac4c6b92a
SHA512efda21d83464a6a32fdeef93152ffd32a648130754fdd3635f7ff61cc1664f7fc050900f0f871b0ddd3a3846222bf62ab5df8eed42610a76be66fff5f7b4c4c0
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]
Filesize1KB
MD58a27247526a14806ec84d7904d7b8dc6
SHA130ba259d6f2ef398e55d32fafd7cb314e058472f
SHA25686ece1c9bcf34c8c2cf187426186bd1f8c422fa3d523fd22ad6b047c70ec4df9
SHA5128001e63c9c3f3fc508297970bb20d2b18d829d4b1c2359deeed81239eee197cc2283dd44f3aea7098ee6402b9686f76cfd876ad987fa3bd0d41021c2aacd01f8
-
Filesize
702KB
MD590f50a285efa5dd9c7fddce786bdef25
SHA154213da21542e11d656bb65db724105afe8be688
SHA25677a250e81fdaf9a075b1244a9434c30bf449012c9b647b265fa81a7b0db2513f
SHA512746422be51031cfa44dd9a6f3569306c34bbe8abf9d2bd1df139d9c938d0cba095c0e05222fd08c8b6deaebef5d3f87569b08fb3261a2d123d983517fb9f43ae
-
Filesize
510KB
MD573d4823075762ee2837950726baa2af9
SHA1ebce3532ed94ad1df43696632ab8cf8da8b9e221
SHA2569aeccf88253d4557a90793e22414868053caaab325842c0d7acb0365e88cd53b
SHA5128f4a65bd35ed69f331769aaf7505f76dd3c64f3fa05cf01d83431ec93a7b1331f3c818ac7008e65b6f1278d7e365ed5940c8c6b8502e77595e112f1faca558b5
-
Filesize
3.0MB
MD5fe7eb54691ad6e6af77f8a9a0b6de26d
SHA153912d33bec3375153b7e4e68b78d66dab62671a
SHA256e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb
SHA5128ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f
-
Filesize
1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c
-
Filesize
780B
MD5383a85eab6ecda319bfddd82416fc6c2
SHA12a9324e1d02c3e41582bf5370043d8afeb02ba6f
SHA256079ce1041cbffe18ff62a2b4a33711eda40f680d0b1d3b551db47e39a6390b21
SHA512c661e0b3c175d31b365362e52d7b152267a15d59517a4bcc493329be20b23d0e4eb62d1ba80bb96447eeaf91a6901f4b34bf173b4ab6f90d4111ea97c87c1252
-
Filesize
265B
MD5ba6f59fde07f1793125c22894197a9e5
SHA10e778c94464e0bdd535c7aa8693a90e0a93ae95f
SHA2562284ebff84da9accea9c25c805a9cb5bfb1946af1313901b545fa3a321df7f98
SHA512990e203c2f189ab5e61e76896bd19532c268074555248363266af8ea92396644c8772fd8e6d3d34209558ab9e246943aebc61df48cb660d7a50705d52f846b6e
-
Filesize
46KB
MD595673b0f968c0f55b32204361940d184
SHA181e427d15a1a826b93e91c3d2fa65221c8ca9cff
SHA25640b37e7b80cf678d7dd302aaf41b88135ade6ddf44d89bdba19cf171564444bd
SHA5127601f1883edbb4150a9dc17084012323b3bfa66f6d19d3d0355cf82b6a1c9dce475d758da18b6d17a8b321bf6fca20915224dbaedcb3f4d16abfaf7a5fc21b92
-
Filesize
53KB
MD50252d45ca21c8e43c9742285c48e91ad
SHA15c14551d2736eef3a1c1970cc492206e531703c1
SHA256845d0e178aeebd6c7e2a2e9697b2bf6cf02028c50c288b3ba88fe2918ea2834a
SHA5121bfcf6c0e7c977d777f12bd20ac347630999c4d99bd706b40de7ff8f2f52e02560d68093142cc93722095657807a1480ce3fb6a2e000c488550548c497998755
-
Filesize
77KB
MD52efc3690d67cd073a9406a25005f7cea
SHA152c07f98870eabace6ec370b7eb562751e8067e9
SHA2565c7f6ad1ec4bc2c8e2c9c126633215daba7de731ac8b12be10ca157417c97f3a
SHA5120766c58e64d9cda5328e00b86f8482316e944aa2c26523a3c37289e22c34be4b70937033bebdb217f675e40db9fecdce0a0d516f9065a170e28286c2d218487c
-
Filesize
38KB
MD517194003fa70ce477326ce2f6deeb270
SHA1e325988f68d327743926ea317abb9882f347fa73
SHA2563f33734b2d34cce83936ce99c3494cd845f1d2c02d7f6da31d42dfc1ca15a171
SHA512dcf4ccf0b352a8b271827b3b8e181f7d6502ca0f8c9dda3dc6e53441bb4ae6e77b49c9c947cc3ede0bf323f09140a0c068a907f3c23ea2a8495d1ad96820051c
-
Filesize
39KB
MD5537efeecdfa94cc421e58fd82a58ba9e
SHA13609456e16bc16ba447979f3aa69221290ec17d0
SHA2565afa4753afa048c6d6c39327ce674f27f5f6e5d3f2a060b7a8aed61725481150
SHA512e007786ffa09ccd5a24e5c6504c8de444929a2faaafad3712367c05615b7e1b0fbf7fbfff7028ed3f832ce226957390d8bf54308870e9ed597948a838da1137b
-
Filesize
36KB
MD52c5a3b81d5c4715b7bea01033367fcb5
SHA1b548b45da8463e17199daafd34c23591f94e82cd
SHA256a75bb44284b9db8d702692f84909a7e23f21141866adf3db888042e9109a1cb6
SHA512490c5a892fac801b853c348477b1140755d4c53ca05726ac19d3649af4285c93523393a3667e209c71c80ac06ffd809f62dd69ae65012dcb00445d032f1277b3
-
Filesize
36KB
MD57a8d499407c6a647c03c4471a67eaad7
SHA1d573b6ac8e7e04a05cbbd6b7f6a9842f371d343b
SHA2562c95bef914da6c50d7bdedec601e589fbb4fda24c4863a7260f4f72bd025799c
SHA512608ef3ff0a517fe1e70ff41aeb277821565c5a9bee5103aa5e45c68d4763fce507c2a34d810f4cd242d163181f8341d9a69e93fe32aded6fbc7f544c55743f12
-
Filesize
36KB
MD5fe68c2dc0d2419b38f44d83f2fcf232e
SHA16c6e49949957215aa2f3dfb72207d249adf36283
SHA25626fd072fda6e12f8c2d3292086ef0390785efa2c556e2a88bd4673102af703e5
SHA512941fa0a1f6a5756ed54260994db6158a7ebeb9e18b5c8ca2f6530c579bc4455918df0b38c609f501ca466b3cc067b40e4b861ad6513373b483b36338ae20a810
-
Filesize
36KB
MD508b9e69b57e4c9b966664f8e1c27ab09
SHA12da1025bbbfb3cd308070765fc0893a48e5a85fa
SHA256d8489f8c16318e524b45de8b35d7e2c3cd8ed4821c136f12f5ef3c9fc3321324
SHA512966b5ed68be6b5ccd46e0de1fa868cfe5432d9bf82e1e2f6eb99b2aef3c92f88d96f4f4eec5e16381b9c6db80a68071e7124ca1474d664bdd77e1817ec600cb4
-
Filesize
37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
Filesize
37KB
MD54e57113a6bf6b88fdd32782a4a381274
SHA10fccbc91f0f94453d91670c6794f71348711061d
SHA2569bd38110e6523547aed50617ddc77d0920d408faeed2b7a21ab163fda22177bc
SHA5124f1918a12269c654d44e9d394bc209ef0bc32242be8833a2fba437b879125177e149f56f2fb0c302330dec328139b34982c04b3fefb045612b6cc9f83ec85aa9
-
Filesize
36KB
MD53d59bbb5553fe03a89f817819540f469
SHA126781d4b06ff704800b463d0f1fca3afd923a9fe
SHA2562adc900fafa9938d85ce53cb793271f37af40cf499bcc454f44975db533f0b61
SHA51295719ae80589f71209bb3cb953276538040e7111b994d757b0a24283aefe27aadbbe9eef3f1f823ce4cabc1090946d4a2a558607ac6cac6faca5971529b34dac
-
Filesize
47KB
MD5fb4e8718fea95bb7479727fde80cb424
SHA11088c7653cba385fe994e9ae34a6595898f20aeb
SHA256e13cc9b13aa5074dc45d50379eceb17ee39a0c2531ab617d93800fe236758ca9
SHA51224db377af1569e4e2b2ebccec42564cea95a30f1ff43bcaf25a692f99567e027bcef4aacef008ec5f64ea2eef0c04be88d2b30bcadabb3919b5f45a6633940cb
-
Filesize
36KB
MD53788f91c694dfc48e12417ce93356b0f
SHA1eb3b87f7f654b604daf3484da9e02ca6c4ea98b7
SHA25623e5e738aad10fb8ef89aa0285269aff728070080158fd3e7792fe9ed47c51f4
SHA512b7dd9e6dc7c2d023ff958caf132f0544c76fae3b2d8e49753257676cc541735807b4befdf483bcae94c2dcde3c878c783b4a89dca0fecbc78f5bbf7c356f35cd
-
Filesize
36KB
MD530a200f78498990095b36f574b6e8690
SHA1c4b1b3c087bd12b063e98bca464cd05f3f7b7882
SHA25649f2c739e7d9745c0834dc817a71bf6676ccc24a4c28dcddf8844093aab3df07
SHA512c0da2aae82c397f6943a0a7b838f60eeef8f57192c5f498f2ecf05db824cfeb6d6ca830bf3715da7ee400aa8362bd64dc835298f3f0085ae7a744e6e6c690511
-
Filesize
79KB
MD5b77e1221f7ecd0b5d696cb66cda1609e
SHA151eb7a254a33d05edf188ded653005dc82de8a46
SHA2567e491e7b48d6e34f916624c1cda9f024e86fcbec56acda35e27fa99d530d017e
SHA512f435fd67954787e6b87460db026759410fbd25b2f6ea758118749c113a50192446861a114358443a129be817020b50f21d27b1ebd3d22c7be62082e8b45223fc
-
Filesize
89KB
MD56735cb43fe44832b061eeb3f5956b099
SHA1d636daf64d524f81367ea92fdafa3726c909bee1
SHA256552aa0f82f37c9601114974228d4fc54f7434fe3ae7a276ef1ae98a0f608f1d0
SHA51260272801909dbba21578b22c49f6b0ba8cd0070f116476ff35b3ac8347b987790e4cc0334724244c4b13415a246e77a577230029e4561ae6f04a598c3f536c7e
-
Filesize
40KB
MD5c33afb4ecc04ee1bcc6975bea49abe40
SHA1fbea4f170507cde02b839527ef50b7ec74b4821f
SHA256a0356696877f2d94d645ae2df6ce6b370bd5c0d6db3d36def44e714525de0536
SHA5120d435f0836f61a5ff55b78c02fa47b191e5807a79d8a6e991f3115743df2141b3db42ba8bdad9ad259e12f5800828e9e72d7c94a6a5259312a447d669b03ec44
-
Filesize
36KB
MD5ff70cc7c00951084175d12128ce02399
SHA175ad3b1ad4fb14813882d88e952208c648f1fd18
SHA256cb5da96b3dfcf4394713623dbf3831b2a0b8be63987f563e1c32edeb74cb6c3a
SHA512f01df3256d49325e5ec49fd265aa3f176020c8ffec60eb1d828c75a3fa18ff8634e1de824d77dfdd833768acff1f547303104620c70066a2708654a07ef22e19
-
Filesize
38KB
MD5e79d7f2833a9c2e2553c7fe04a1b63f4
SHA13d9f56d2381b8fe16042aa7c4feb1b33f2baebff
SHA256519ad66009a6c127400c6c09e079903223bd82ecc18ad71b8e5cd79f5f9c053e
SHA512e0159c753491cac7606a7250f332e87bc6b14876bc7a1cf5625fa56ab4f09c485f7b231dd52e4ff0f5f3c29862afb1124c0efd0741613eb97a83cbe2668af5de
-
Filesize
37KB
MD5fa948f7d8dfb21ceddd6794f2d56b44f
SHA1ca915fbe020caa88dd776d89632d7866f660fc7a
SHA256bd9f4b3aedf4f81f37ec0a028aabcb0e9a900e6b4de04e9271c8db81432e2a66
SHA5120d211bfb0ae953081dca00cd07f8c908c174fd6c47a8001fadc614203f0e55d9fbb7fa9b87c735d57101341ab36af443918ee00737ed4c19ace0a2b85497f41a
-
Filesize
50KB
MD5313e0ececd24f4fa1504118a11bc7986
SHA1e1b9ae804c7fb1d27f39db18dc0647bb04e75e9d
SHA25670c0f32ed379ae899e5ac975e20bbbacd295cf7cd50c36174d2602420c770ac1
SHA512c7500363c61baf8b77fce796d750f8f5e6886ff0a10f81c3240ea3ad4e5f101b597490dea8ab6bd9193457d35d8fd579fce1b88a1c8d85ebe96c66d909630730
-
Filesize
46KB
MD5452615db2336d60af7e2057481e4cab5
SHA1442e31f6556b3d7de6eb85fbac3d2957b7f5eac6
SHA25602932052fafe97e6acaaf9f391738a3a826f5434b1a013abbfa7a6c1ade1e078
SHA5127613dc329abe7a3f32164c9a6b660f209a84b774ab9c008bf6503c76255b30ea9a743a6dc49a8de8df0bcb9aea5a33f7408ba27848d9562583ff51991910911f
-
Filesize
40KB
MD5c911aba4ab1da6c28cf86338ab2ab6cc
SHA1fee0fd58b8efe76077620d8abc7500dbfef7c5b0
SHA256e64178e339c8e10eac17a236a67b892d0447eb67b1dcd149763dad6fd9f72729
SHA5123491ed285a091a123a1a6d61aafbb8d5621ccc9e045a237a2f9c2cf6049e7420eb96ef30fdcea856b50454436e2ec468770f8d585752d73fafd676c4ef5e800a
-
Filesize
36KB
MD58d61648d34cba8ae9d1e2a219019add1
SHA12091e42fc17a0cc2f235650f7aad87abf8ba22c2
SHA25672f20024b2f69b45a1391f0a6474e9f6349625ce329f5444aec7401fe31f8de1
SHA51268489c33ba89edfe2e3aebaacf8ef848d2ea88dcbef9609c258662605e02d12cfa4ffdc1d266fc5878488e296d2848b2cb0bbd45f1e86ef959bab6162d284079
-
Filesize
37KB
MD5c7a19984eb9f37198652eaf2fd1ee25c
SHA106eafed025cf8c4d76966bf382ab0c5e1bd6a0ae
SHA256146f61db72297c9c0facffd560487f8d6a2846ecec92ecc7db19c8d618dbc3a4
SHA51243dd159f9c2eac147cbff1dda83f6a83dd0c59d2d7acac35ba8b407a04ec9a1110a6a8737535d060d100ede1cb75078cf742c383948c9d4037ef459d150f6020
-
Filesize
41KB
MD5531ba6b1a5460fc9446946f91cc8c94b
SHA1cc56978681bd546fd82d87926b5d9905c92a5803
SHA2566db650836d64350bbde2ab324407b8e474fc041098c41ecac6fd77d632a36415
SHA512ef25c3cf4343df85954114f59933c7cc8107266c8bcac3b5ea7718eb74dbee8ca8a02da39057e6ef26b64f1dfccd720dd3bf473f5ae340ba56941e87d6b796c9
-
Filesize
91KB
MD58419be28a0dcec3f55823620922b00fa
SHA12e4791f9cdfca8abf345d606f313d22b36c46b92
SHA2561f21838b244c80f8bed6f6977aa8a557b419cf22ba35b1fd4bf0f98989c5bdf8
SHA5128fca77e54480aea3c0c7a705263ed8fb83c58974f5f0f62f12cc97c8e0506ba2cdb59b70e59e9a6c44dd7cde6adeeec35b494d31a6a146ff5ba7006136ab9386
-
Filesize
864B
MD53e0020fc529b1c2a061016dd2469ba96
SHA1c3a91c22b63f6fe709e7c29cafb29a2ee83e6ade
SHA256402751fa49e0cb68fe052cb3db87b05e71c1d950984d339940cf6b29409f2a7c
SHA5125ca3c134201ed39d96d72911c0498bae6f98701513fd7f1dc8512819b673f0ea580510fa94ed9413ccc73da18b39903772a7cbfa3478176181cee68c896e14cf
-
Filesize
2.9MB
MD5ad4c9de7c8c40813f200ba1c2fa33083
SHA1d1af27518d455d432b62d73c6a1497d032f6120e
SHA256e18fdd912dfe5b45776e68d578c3af3547886cf1353d7086c8bee037436dff4b
SHA512115733d08e5f1a514808a20b070db7ff453fd149865f49c04365a8c6502fa1e5c3a31da3e21f688ab040f583cf1224a544aea9708ffab21405dde1c57f98e617
-
Filesize
64KB
MD55dcaac857e695a65f5c3ef1441a73a8f
SHA17b10aaeee05e7a1efb43d9f837e9356ad55c07dd
SHA25697ebce49b14c46bebc9ec2448d00e1e397123b256e2be9eba5140688e7bc0ae6
SHA51206eb5e49d19b71a99770d1b11a5bb64a54bf3352f36e39a153469e54205075c203b08128dc2317259db206ab5323bdd93aaa252a066f57fb5c52ff28deedb5e2
-
Filesize
20KB
MD54fef5e34143e646dbf9907c4374276f5
SHA147a9ad4125b6bd7c55e4e7da251e23f089407b8f
SHA2564a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79
SHA5124550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5
-
Filesize
20KB
MD58495400f199ac77853c53b5a3f278f3e
SHA1be5d6279874da315e3080b06083757aad9b32c23
SHA2562ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d
SHA5120669c524a295a049fa4629b26f89788b2a74e1840bcdc50e093a0bd40830dd1279c9597937301c0072db6ece70adee4ace67c3c8a4fb2db6deafd8f1e887abe4
-
Filesize
240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
Filesize
424KB
MD5e263c5b306480143855655233f76dc5a
SHA1e7dcd6c23c72209ee5aa0890372de1ce52045815
SHA2561f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69
SHA512e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx
Filesize434B
MD516ee008a0aab386d5d3a51d226b48d0f
SHA199e4041ca818ad20fa9ba3c3ddbcb8de1353903b
SHA256f0c994b07c7ab501be841c138ed38a20ef533cc6360eb9728bc7dbe04f633a54
SHA512c74dde51275257fcbd5987cc35eab62b04aa58e74a0ba22fef0aca8e64e854792885d913618d994d4e8d6b95f0008716da206c46532f19eee8719a1465243513
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx
Filesize133B
MD50c905b2eee6e6005f40bd15e4eb9883e
SHA14356d205622985c8f4c07cff594f2d633c6673bc
SHA256c117bbdf4477f96e11f40caef46afeb60b0c52270762b5af58399a958da8daf3
SHA5121cf08b4e8603299578264db4b95d80afb08cd1a3be3843337343e35ead2495c7b0c5dbd20c78fc94d5678af6ab9733afef9ec4388b67a679496724faec337aa7
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx
Filesize46B
MD5474b98dcc92ff3820ac89c4960288390
SHA11882a610e32eea87b5d36df1b37f9b092c24eed2
SHA25690cb9360e98292b3670d4f43b6d95c3638c22639add54903c099c446781bc69f
SHA512df9dbbe469017ce49f2245a10fe59cd0370dfeed9a599a8a1f9ef711c171ec0715a046a320026052907952045a68e6a9b824ec194eaac360ae4ca26641475427
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx
Filesize133B
MD59edfaa23726b685a5c4ed83c46848f37
SHA1ae2f4da4fc06c3eaf2e6f199489469ffb949b1a9
SHA2568d35b1a74f506b7a0815d2d59609a8cd76e7437e657608bbc3a4ca4b26d4c247
SHA5127b2f1903e5131f93dfe6cf51880b79195f8a00e8f9caa11f1f823947fb00e87e0abde70327cf16e4f4d5921346d3a2f6bdd42643023f168b57349ddcdb0fdfb9
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx
Filesize225B
MD5b20a92e19961e4143775986377d4c930
SHA15e9bfcb73a8e55f42e8008d21cd08920ca6a187d
SHA256982cc6746bacf13f548959b4f12603ddc2695c2a319b8ecf2ed8c59ebb31ba86
SHA512dce0c77d4bfd5730ec2576554812aaabf33bc089cb64ffa12c45f152b2bb040d7613f9fa7ad0d6805d1025ede83bd9eb8845f154f69adaad32f49b8857a54f05
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx
Filesize492B
MD5c8375cbbaf31024a332aad1b8188be0d
SHA111a531d4dbba019ba414f4b34f20ca5632832621
SHA256b0b4f9f85a0a28464e38482dcf1c0b4b30fc6608b20bd5b4e2dfa5d51ccfbca2
SHA512fb634e20ebc9624c938b28626d272586b06fae41d42342c3ac2f5a0a1e7d0158e5b6bd95376fbec39bfa2c7668ca30310ff7911afe2a99d7afb239277839b766
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx
Filesize492B
MD5576d9e5a2996a2c0c86cbdbb6a19f4da
SHA1a329995f39b3d43a24dbdda9124a5766583d679c
SHA256a2c819a5a789db53d842d2540814878eabf58ef84b7b15fbe50570aef76c3ecd
SHA512863e8cb6eeb62a56c365c35c70e7f6890a8466e77148dd6cd2f55227ed68813bbd71c7a631ac8277282f5aac78ec98cbdfad99600bcb90b48555aaf8af666282
-
Filesize
76KB
MD53c54fd05800d0c1fa3f651724f50f498
SHA1855ef95fb8f67fb96d2cdab04a989d8aa670dfd9
SHA256732fa25ae8805e94837065794f11195faa1ef373dca613d9229ad7530bfcd575
SHA512afcd0734b06aa698e8fb518f230632a353ade6520600a67fdc2f1af7b9900845c4457ec1c2f2355a59f782070c260fdf7c255c8252075461e1f04883c1cdd89e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Filesize8KB
MD5d20774a1909623897ca79318eff07de2
SHA1f040508df253992c70cf6c9c6503ad4bb331afc9
SHA256e2dec6471318bb8508ae49281910cd8074621169c2329fba494e32557fdd1a8b
SHA5121e66dd359ba080ed919c795cba0909f94f0697b2dbc7d1aa0ba536e9a5b3432bb7e1daf433594286821bbbde8de2bb3ce0ba5dcdc1fe74a918b4651679daf12b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Filesize9KB
MD5691e306f496e88fbfca06465958c8703
SHA1de3d41be4ef33ab3f5416f357d73fc077134d61c
SHA2567e0d9ad0e2759ad36ed3a2b907a350d7b9e90ff218b34b2308feae86f13455b1
SHA512f9f6caa45952a1530bc990fbd73ef588e84a45b659ca767dfdcd610cb5eb6a663f30ed3f6272582aa0802f39827f24c485d6b20ad099cbf00b677fcf230dbb00
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize20KB
MD59c7de61773203fe106b029a7d83b49db
SHA1b564463403de6c6116fa33f528e667cd0d8ad757
SHA256fb2f2b4172120131624f85b369c7f97b43c2f60839bd1ebede6b0862784be9fc
SHA5128f3e025441a19b898b00db2ce695c1c8a3d050edc86788de3c7a4052e8f19ada58f5f309dec9ba87427278b55898f45da805636928591d224c28d2f1c85c9267
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize20KB
MD58c56965c1c1fd40484e3581f030641a0
SHA19ea4729de1c76901cc7743c0f9d313e361f007ae
SHA256168ae3ed1f0c6464de3a97c917fbbf3f4fbe9246e8c7ebfa2a04d00d7256b514
SHA512f4b54543d19476c7f736efda22821cd5b7bce2fc709baa3fc45063e5514e729b55f7e91f03b48f45b5e250837eba33c45f545cdeddcdd3680331d66d803b55bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD52b631659377229fadcc94c613cfdb619
SHA178680302a36f568165d464d5bb6bd562f20c04f2
SHA25613507292df0a3b5e514d075da32973379e76b05f1fc2c0f7c512a37a89a4d7d1
SHA5124951951213f9462dcd3cf787e9c56928fe31eecc4a5e022d853eb43743ded2db7f52eab93dd34a77418b5fa7a08e0c4345d200924e835cedbf4e8b663377f4b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD54fe60118f367d4aa71306ac78f9c0091
SHA1320b0d7fac8ed7444095f333a46b39ba1773b316
SHA256ccecf3d53e1321cf07c0b7b482711754c28009267e67eaa03d9e75ee31b0432e
SHA512e008ac035cbf506c8e48bbeefd09283f7f06cc0cf335adce381aa1b128424d95c7d619327f6d5976d568fdd0897dd023e5f686f756b5db22f64fd35e19083cc3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\datareporting\glean\pending_pings\46c68f3f-dfc6-4663-bae1-dde4c425e546
Filesize767B
MD51e2c5252aa19c7c6dfd89a9478914712
SHA1ac7b110cd1a303b4b6fa15ef259f587c019f89f6
SHA256254fbbe721cbf14253d3cecfba4e11a2be8ff8e8c6ae9f2819c0481472a2eb71
SHA512984542ad4d8a3fab8f4016bf1c602dc4bb29b5084f8fa3a1b248f8e87cfbb7ee26a77a0a13991e006f20b08f459a5fcb2774f00e15e452c1e4503c3d835c8c1e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\datareporting\glean\pending_pings\5fc6a275-cccf-4061-85ab-8fb390e09174
Filesize790B
MD556ee19aeb6716a2cf8c355a3507f1cfe
SHA1348de63d9e03e297a9ca42674d29c6ea085accb3
SHA256442dacfb85288b59b9386b72c0f349baa7fd452761fa4225ffb0d9434bc8cb07
SHA5120d6d91d4789b86bb258e29d88569b3a510bb84cf9e9aa15dc87b9f73995bea0798458ed08f1df604d9d2cfe4487420915b98bfb7fad5da9ffc5810ea0c66ea31
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\datareporting\glean\pending_pings\97721cef-a913-4efa-81ee-a59147b70764
Filesize734B
MD5182f9c2482b4c41b3bd94aaab7a8ecc3
SHA16cd0b738ceebb7c452182abc747fecf946dae8a5
SHA256d4d3b8a109cc1c2c9c8143ef9235ed695cc0e624b4f6f27adf5408ff52448cc0
SHA512400ef06eb235a24382f0afe82e4db0a655ca383816ffb409d8eb9cec7f325fb60357bb634b950f1312cf2bec39a403a25e3701d5970b6f90a82fabec5a9a43ce
-
Filesize
898B
MD5df33b81fb9bd18bfd1ebd0e094cbfe97
SHA131d35bf126350b391b2c151a890244531dd44109
SHA256c491303151e35d133348990d714b84b5aa0011f5fa01e33da3549ea06296c15e
SHA51276dbb29676105b2568c42563464b2993d37cf38d44e40ae240a723a3f484ffefcc807d0c67d0e6463b54fc5eaa1e900bf7089a421a3ff3bc97e06c1a21cfbdc9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\extensions.json.tmp
Filesize41KB
MD50fb46332e41d39adbef531f7c411f909
SHA12065449e1d6672ce9af5b0911c68efa8a5005a6e
SHA2568f9364f32675bf448d4d740358f8e11a8cc3286533321079f92e8a36be9e4648
SHA512989bd1b6d81a1090c9030588eee174c4b99ab74b48d026529171c664035aead9cb8caab8b5ccb855b543aed65e13eece9439db8c38a614cd4375823514b1c656
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
5.0MB
MD5492b85ddd99c4700ed13b3d1f437cf7f
SHA1f16bf64e439887d1a24c0ecf4d154fa9128d5efd
SHA256fcf83e5f99f8d07ab6a3d508d1a360ffe1e71739b9f864847199fa9a837fe082
SHA5128d70bae7124d2461bac1373b955fb1ee83370b467bc272c1fe8640001cbdab439cf62386e4093f819e37e341eead0e94fbb9e3d4a1c7d806871e05df3e231841
-
Filesize
5KB
MD5a28f2e5855f299d9e80dacfcacb53bbf
SHA1754ac36ea2cdef551837db54a16b07c3ce30e482
SHA2560630c05715b4421556d30b87dd39ef2ddc8bcbf739bad5cdd721d81728683593
SHA51216483f56d58f8158f77866f9066806d5e7f55dd2759b51514f7e9011f398c3f7cc28daa968c74cebf7bfe312735fbf38c88e0c0d08196540db9e6c499a54c2cd
-
Filesize
6KB
MD56f678134b375442ea0c7c6f0cfdc355a
SHA177f43e37549eb8b8e3478c170cf1a7d167a6a00b
SHA2568569c43fe69981bf6488df5cce63731eb92933debca28ebda40b43c718c069ab
SHA5123a690975758423b52f6ac6c31c2dfe4040ace1660dc0f732653c18d143363039a1076cf6089b38912e69a1b5821d65fda9008265bacc282d6cfa55506eb1dd13
-
Filesize
6KB
MD53267061cbf92c534865d6b4ab533d410
SHA1ec96506327b6025b8d8f72fd29ba11976f778e84
SHA2566bdca88f2b8f4da81663abf9b282f6797a79d69362f5bb4ec4ce1a712fe9094e
SHA512320f66ead2f54e5257a46b9cf7082d54bbff4259db7dea03372d63a827599b6da8f69d607462a1c545ff14cd5549c2b93b8893f1a94719f4a68575d8cb608ea1
-
Filesize
6KB
MD5aa18b40b84fe2427ad328c2bf3b948c1
SHA14519357ef3158dab4aeb4acb641d43871aa5f160
SHA256e9e9bd6c368299db2160a60ce14d4cadcb0d79218dbd487b22d85ed19b1748e5
SHA5126c25ec1f3240760a025f916c8a51b8ad2151bc9d2bf28dfa38aaf9658856a8adfc83f34ecdbf8b08f74b6dac9638e73be1fbd90b13bcc5c13c8ceb777f3bc8cf
-
Filesize
5KB
MD596ad3e8ec35dacd192fac06217391a7e
SHA1ba985d8e06c9b8b27bec4cc3339ca014c5452429
SHA256718f23b84f97c9689a245feec086fe7c35f7e475a459f9afd1bfbcf5e7cee68e
SHA51275d8518042f04a14e8c79d5e4217f3ed7563d3aaa1d38824a6e96413fcb06cce33d0ae087276fd70300834e849078bc606108342e3bc47ea002435ce6acc4d70
-
Filesize
6KB
MD59402cb6193d956cae190703e00de692b
SHA10f4f1a1f3d4f949b12f3ab8b4ce1ed2a54db495d
SHA256ce64f3398ecdd2e457e0877c5d1356205c09bff16ea517d8fa39cc98d59bd834
SHA512f8b6505296e9883ce13bde64cb97fedef986dafdb0c93c228256f28ca45a500fd1749036bdaff1c8c3c90a1b8c7f9972cd01b14a76c81e93c3b339b7c642c4f1
-
Filesize
7KB
MD5488490ee4777f3f8ae5d40342262d2ff
SHA178617a109ecc4be43ce6b1fc2178a153056e598c
SHA256127dabc57fa47898640bd2965d051cd6defc6e7be9bccb04f2e55f28ee9d42d9
SHA5125207957dcfd03c86e4760892f6c14377f9ebf48b64a446c3686159655d3ed73c2468be067d7d187a7249245b0bf28dc868bbb88c6bcaf653da6bafab00fa9691
-
Filesize
517B
MD568788d135737a20776068a6be911c2e7
SHA137efeb537a68c97a7b85aa3316710a5b2185e977
SHA2561ccfaf52cea0395961ee08eabc671dd37731c6a8e8709fe3f4e8539d2f6f7010
SHA512b0ee32bac9e29a39a4b0d22d77f0b22a6c43768c4c32eb7aef323dfe4eb73deeca7fb7f7c2578d8fb7aafbca0ad5aabdf2187a22dd9bff2a083cdbdb8d57ea6f
-
Filesize
7KB
MD544379c8e68ecc909c03c1d555ad219d6
SHA1d2c078b6c8d57a0463fc8a7153b48b3d21455706
SHA2566455bfafbd6c58b1be433f637b827db4ee2b5dc648b3cb4baa0ce8df77c66e97
SHA512c90ce628f3fceaefb1e8ee9f673db01298a8defcb7606fcf3d5f666e1a9225b7610438ff45777a7a056a541535e6a64e99378a93842e732605f4fdbb08b53fe2
-
Filesize
4KB
MD53142648cfdf65bf5da87e55184ab7905
SHA19640e25e8d9474ceafbf6fb713649711ad05708f
SHA256f7d0f7b42cd685242e4363b8925fdf7f88d93f13190c8a0d9851c7dea3721d54
SHA512bb51475f2564ab7a36b121703b51ea6f07b47f8ee85162e270cad20ad00531736a3514cb7dd6af572326534df5f4e138a6d172ba2f4ed7921c86d8b85ed4e864
-
Filesize
280B
MD541d220d4783f67d2b57beec20c135229
SHA16e97765e77920b6010fac2cb4abf1e3cea106541
SHA2565d1881e74d76b95bad59439bb5c7676258a4ae6b6d853074e93b5247cf1715dc
SHA512dc30ddc4c8cfe598de5e24bc88cebbe4256fbb21a0b1db6c2ec15311053e7d8be6a93a0bcfcfd8a02543f8b9cf9b15a5840154b272a2df71d59d7dfd80984ac0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionCheckpoints.json.tmp
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionCheckpoints.json.tmp
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionCheckpoints.json.tmp
Filesize146B
MD565690c43c42921410ec8043e34f09079
SHA1362add4dbd0c978ae222a354a4e8d35563da14b4
SHA2567343d5a46e2fca762305a4f85c45484a49c1607ede8e8c4bd12bedd2327edb8d
SHA512c0208d51cf1586e75f22764b82c48ecbb42c1ff54aa412a85af13d686e0119b4e49e98450d25c70e3792d3b9c2cda0c5ab0c6931ebaf548693bb970a35ae62b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionCheckpoints.json.tmp
Filesize259B
MD5e6c20f53d6714067f2b49d0e9ba8030e
SHA1f516dc1084cdd8302b3e7f7167b905e603b6f04f
SHA25650a670fb78ff2712aae2c16d9499e01c15fddf24e229330d02a69b0527a38092
SHA512462415b8295c1cdcac0a7cb16bb8a027ef36ae2ce0b061071074ac3209332a7eae71de843af4b96bbbd6158ca8fd5c18147bf9a79b8a7768a9a35edce8b784bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionCheckpoints.json.tmp
Filesize288B
MD5948a7403e323297c6bb8a5c791b42866
SHA188a555717e8a4a33eccfb7d47a2a4aa31038f9c0
SHA2562fca1f29b73dd5b4159fa1eb16e69276482f5224ba7d2219a547039129a51f0e
SHA51217e2f65c33f47c8bb4beca31db2aff3d4bbb6c2d36924057f9f847e207bdcb85ffcbb32c80dd06862ffc9b7f0bd3f5e2e65b48bb1bc3363732751101d5596b1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionCheckpoints.json.tmp
Filesize193B
MD52ad4fe43dc84c6adbdfd90aaba12703f
SHA128a6c7eff625a2da72b932aa00a63c31234f0e7f
SHA256ecb4133a183cb6c533a1c4ded26b663e2232af77db1a379f9bd68840127c7933
SHA5122ee947dcf3eb05258c7a8c45cb60082a697dbe6d683152fe7117d20f7d3eb2beaaf5656154b379193cdc763d7f2f3b114cf61b4dd0f8a65326e662165ccf89cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionCheckpoints.json.tmp
Filesize122B
MD599601438ae1349b653fcd00278943f90
SHA18958d05e9362f6f0f3b616f7bfd0aeb5d37967c9
SHA25672d74b596f7fc079d15431b51ce565a6465a40f5897682a94a3f1dd19b07959a
SHA512ffa863d5d6af4a48aadc5c92df4781d3aacbf5d91b43b5e68569952ffec513ff95655b3e54c2161fe27d2274dd4778bad517c7a3972f206381ef292808628c55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD52e5cf2565e625f114d2c6b37961f6c03
SHA1f7db4f7a16586bc91158bde39ffed45f296dcdac
SHA2563e87b22bf8274c866a383fd8604b7c9d7023f746214673aabdb7d40138da8711
SHA512f16436b186aa92bf329c8e00100ee7a9b874dbc59ac26dde977f4f1f5c2c00c4d047beeea8ad66314a36139cb066a92781293bb3cc7f472ddc999c2e176669dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD516feb9c4d334bb60e8150fbb9e9e777d
SHA104a3b90a5b43be6c594d42bb25c0c30df0da81a9
SHA256bdffcc967d56125eef63db473bda63adf17a0a211123092fb65512acc5c02fbb
SHA512e04c70b71a108fb4976ef41a0764b2a7d87b12d3888fcf1adb16f831f1f29fd6317b5cc1fe6312df1de7fef42e13efb7526b4086d3b9b7333822cb7370ed5b65
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize6KB
MD5dbd3c42ae2c389c5620db5d33a3c4e08
SHA1f6ef731cb4c4c1582a357f4407a5dede9c0eea7d
SHA25622fdaadc013488cdd93d6e34a7c870dcf14c306f965970b8275d4ae739adc0d7
SHA512cebb678e42b0733fcd9b3d3a4080fc3462b634e2feb2719ca5d0b3d377bb6732798530de2e93270cd95bb09b2b131c0c2dc27f9db06a638b826c27d256cbe0ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize8KB
MD591e09b49e637992b221366d52e5d8c8b
SHA193a1ab5899031771b53e4705f3761077268f76a3
SHA256ab4e09e325bd3e4d2636e1c3f8d7f2be0b52fb0061ba01d160a6a58cacd05787
SHA5126d266a4af80d87e443b974d8e5996d8d25abe8deeb6d16b9f67e73180bd425f648ca14ab370e9475963631ac479a62049db12df26f8fd81dec8565b35d41ba19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD57a01e686e092199fe69c28579a4e6156
SHA14d2fc81507e876ed484dfc4c211523405631f812
SHA256bf2d9f1f17200c2b17bf61d42b02096477f03b0b302b812fa30a0e48b66ecf2b
SHA512941fe23a2d8bc347ccaf78ffc8de0fbc6a259f524f0f05f0558c8bffa0135972601a6dab418ae045e74fa3a5b9c72a5827108251edecb4db1fdddf69cfa8bea3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize5KB
MD5dfee1562b8e15c7bee02eafc04cd6c2c
SHA18cd1e6f83c1d4d11158f4f498a56aa09a91299f0
SHA25641055b51fcfece6206b1473fe4ece3ae0304c763a01f11c62208127fb0c1409c
SHA51251dbfc6c57e8fb04eceb5af8a214a8863e42a8196a3206a3e7d5d5872da7befa7efe96166da9e000cd0b1cec5c93c7959e4d815ce95df39a3f55110119fdb168
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD5f607d2ec202f9ad4004f59a83985594b
SHA1e46e421036a2a39cf5e75372b6434a880cd33e14
SHA256faf9acbc0542e3dde43723cf186c96a17281d31ce325c1a1f18fbba9e687c203
SHA5123dd2ca65c52cbfb206dd7ecbc1cf89f060656eff8f784ef224f9d9355f3f631916a430c6953bf55bea744120359a16d2178aeacb9a909118417b686650a94a84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD53f043852fa9d5bbba9442cc701d6fb8c
SHA197196392c753619af570969236caad1bcac63bc3
SHA2566a8f68a8c880f632d973b5358c02e3a6d5dcc9010d368e9a9ece81b778cb1a77
SHA5125883caf8919dbf473d817e22c0a5c318739359daf75248a0a63912fae27f1a5a8dbcfe3a8caad01f74cd270a2b96e641f83c3c739d6fe7c54a470b344f9c3c38
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize6KB
MD5e08b29234aff876330c39e6141af825f
SHA1a926bd9c748ee1b3df135802b5564fe2a85743c1
SHA25619d341a01d742acad7ce9623c9e6c09cae58f737a7931cc58353e88a004dd579
SHA5122c46fe37e480cbc29255a3c49a295643357967776b5b4d55510e0dc2c387f7a4d3c480306a81b0a989cb62d851872e7a87df31e9cd7a3ef720f4dcf0ea44b607
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD5b6530338885098021001cf4fe4272478
SHA1c0a948b92974b77ed5e985c4b19bee24cef2edf9
SHA256826993bbd48c82f2b9e723b2e4e12a80a2219b6a64603fbc25bcf778319d0970
SHA512fa346a7a93f2a3bdb95e200ee1cef0c6b17a33da5cd553af0ec541dfad73284c69a9b1a2898bfb595cf17608f014530a0b75ae6ba9640586f31a226491765362
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD574e5d193bc3541b3baa6317ca22066c4
SHA14bfda2931367dc62de9b71732ccad97b18eb4e0a
SHA256add5c2ef689eba2853eb418e9dc361f2758ff203cc1f15ea355ccca4fb87350b
SHA512f71c396d2b4589c2db56ba84aaaddbd8a149305556e19d41d2614dc4f226d6555e77c0aaab057b687400306e1a24ae37f6aeb40299d774a50d11810302c740d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD59a344e6b1bf91888cce83fc91f6f3424
SHA146dd827c445373026cd709c99388b9885202ae4b
SHA2561775d4a56f39a16bf0a25d749c77713b904464f5fcd1a544a3a4e7a30b3fa7a8
SHA5127694fba9ff16b617fee3b39a8cd4f593a358e2cd70f69e9184979e39b461603453bcd4a7cbad0c57ba36b4e9a555432ea427ef831258e4f919bac822befbc3f9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD58a3e4974055d582efb32251a21e934ca
SHA1d8ff20455dd9bcac36e2ef6ef7d38393c444c8f6
SHA25604ba2f6d3caaa18e8c359ca202c0c47f122ef6f614f1852000d35b56e6f37da8
SHA512f2d3ef8920d524c2ff2a03061e3643fc32ecab29b100cd8f00148397b7d6141521ef22112a05b0f66061d111b29cb7847dfd2fbb131515455996d5cec00d4c43
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD5f153c46bc84d89cbf02fe20f2bbdb130
SHA1d9fbd7bbe83679f3bd70dc122f69a33928f3ae15
SHA2560c8fb53985e8cdd6b9334ba1c598cf1aad8700341c857daa45df484cf3a07258
SHA5122aad3beb0f56546a10c4a789b6f45160e2959de0e40e6a55ae7079e01c42e7668bd3e1f5d68fffc3334fb667a5a5c8fc9dada6652136af988711033daf8218a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD5e010171c1b13bcd9e21f8bfa775cee95
SHA1f01c2f7c239fced3d567947b36597373eac999a8
SHA25607b6b6fa4fe64da69da453e4d34647708990a8f35460b0ccad4d664c42a2fc21
SHA5125d96d3ef1d0239e571f7b4973c46d5d600c00d8f9583b4cc29ae578fb686e4b2574771ff99022cce5911d63e1c8e1f65c8ff44a4555401db865b6fee72df7b5f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore.jsonlz4
Filesize4KB
MD547d349179a6e1d5528d5aa122c0c6788
SHA19ff0adb5ba6433451449c3336ba4d73193006570
SHA256c98242bb56f6fe99651db4a6616457b6871538be9d2f1d1511772dd34ecc8649
SHA5121bbc94bb56733f412717b94ce0cf487373de261f7dab494607c68fe5c22a5ba1b0f95952c65bbef1c7d1d853e205b7e3ac5a2ab998cf49059800b9016c1341e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore.jsonlz4
Filesize6KB
MD5cfb888c782222084de2c5a1709fe830d
SHA17aab7a2fc0263a94b2c13135e9adbd08e6ed1939
SHA2562fff22722d49e7cd44bee21fd61be24ae7d1a4d6336ac5a32154a1bb8d0a5c84
SHA51278bec38add19e812cc7562dc7bd53d863ce79f98e788445b96104da738d9cf0464cd632bc32c0e987f30423f013eaef94d1aa9ec6a3f1202ca9ee9e82a168a94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\storage\default\https+++www.youtube.com\cache\morgue\116\{c77e8dd7-e9a5-4e94-9044-a2fab53f6e74}.final
Filesize4KB
MD55ccf3a5e75c47dee5da09c3949184d77
SHA17f6234c46628d14182a4724d67bcd885ed00d812
SHA256201cd73fb60fcd87bf919607de81077e5b51a63662f93f358ed0dc4f81cc3a1c
SHA512cb0239638334d9a7589e8ef1feabf68efe43e203c1740d512c151ee876bff6167c524b132d9c7d8eb7bae358457727d6d2ec828c583cdec075d738d3ec042378
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\storage\default\https+++www.youtube.com\idb\276125747PCe7r%sCi7s%tae9n0t1E.sqlite
Filesize48KB
MD579bdd1d2a2cf3a3e28883bda560c54e5
SHA17204f9c639aa824b73fb558db42898147ec3908b
SHA25601f4c6548cbc440060f8f265b2abcb1f79d23e88c65a9f57a36e186cf3af6725
SHA5121508f053a8436a0c774184c50ec27f57f3a80c771793ad8bfa842fdf0c0fdc8351646f52251ffd88d33c0d350400add9d64d000b8fe374a1438851e0ff00a880
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\storage\default\https+++www.youtube.com\idb\3211250388sbwdpsunsohintoatciif.sqlite-wal
Filesize40KB
MD59c8c84c663cfa6ddd338ac4d9c258a8b
SHA13e05a9f8d0dc2e1fab8724234488e28148009347
SHA25611ad60c2e0a9ccb0957e23fc3fae27fc8d83a29bf8573e5b13b75aca23f163ab
SHA512437e4dea304a9a27167c6dae0e2a795dfd31684df697f0a109481182f3c371178cf7ada63ebb807058b0c7dadcfaf1d382c078e5fbced16c624e81ab53025265
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5e7d901ad03d22078f4c42ecc83c3bd45
SHA113ffe2ced2026e6b99c39a96d006c7832a72ba17
SHA256fddee54013f830a84e74dce5679f6e4c3c71b4c5c51ecdf58bcef7e27eba4f17
SHA5128e7373116183db845f03c74e28effbe85b53c6c109f0a1a867fc4daa2944c099846644c5b6ecfa6408091d097a08b3f1b8cedcbeffbdcfaa14147f6b76663ec9
-
Filesize
5.5MB
MD5383713ed042ed1733d46f9d499487868
SHA12ecadfdc8a423726c1d48f2ee24f7606a6e329d4
SHA256bbe91a5957faad6703f8e9eb8acf32ac1a3a0c95ed82f0693eb5dcd318888120
SHA51203568d80b1a2afc3d9da970e21f682d540eb838324ef0f2c3cd080b8bf7537e2c8377f0e9c7214ba82837ccea82127193fd6e43b66358609fbbc5dc5a99b85dc
-
C:\Users\Admin\Desktop\@[email protected]
Filesize944B
MD56ad7a0d271baddf5583b4f2e723fc8ae
SHA1aa48cef19f8b0a39ef08f83bb6bee80280b92e77
SHA256d7bff416803d0ec5730e514957eda9b0cf10be574488bdbb61f7ca5eb449ec96
SHA51276a10d82a619641f99520b44717362a59b9d06190d3bdd18fd328ebea99e3fa904fbc57b73ea2bbd90e55a98ae5e15f552f653dbde7a6a68be110216558bca99
-
C:\Users\Admin\Desktop\@[email protected]
Filesize240KB
MD5dafc8bc8b000ce212617d658f7cf11d2
SHA14a52017e2e049507707a024060c8e2b6e68d0252
SHA25645540d890d77cc16e84561280dd554b7c92bcd68aae32d4c0a6c42dbb41fc503
SHA5126da3e4ad16da505a8007e61ba3f941903dcd2631cd91634845d9a8a16e610085d8b5e47dcad9b5f99b1e0466f754d2804e4635d51b3a27295fbd0fca63c608c6
-
Filesize
210KB
MD5016d1ca76d387ec75a64c6eb3dac9dd9
SHA1b0a2b2d4d639c6bcc5b114b3fcbb56d7c7ddbcbe
SHA2568037a333dfeca754a46e284b8c4b250127daef6d728834bf39497df03006e177
SHA512f08653184d7caf48e971635699b17b9502addb33fb91cc6e0a563e6a000aeb57ac0a2edd5a9e21ef99a4770c0dbb65899150fa5842b0326976a299382f6be86e
-
Filesize
50B
MD5dce5191790621b5e424478ca69c47f55
SHA1ae356a67d337afa5933e3e679e84854deeace048
SHA25686a3e68762720abe870d1396794850220935115d3ccc8bb134ffa521244e3ef8
SHA512a669e10b173fce667d5b369d230d5b1e89e366b05ba4e65919a7e67545dd0b1eca8bcb927f67b12fe47cbe22b0c54c54f1e03beed06379240b05b7b990c5a641
-
C:\Users\Admin\Downloads\Cerber 5(1)\[email protected]
Filesize313KB
MD5fe1bc60a95b2c2d77cd5d232296a7fa4
SHA1c07dfdea8da2da5bad036e7c2f5d37582e1cf684
SHA256b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d
SHA512266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89
-
Filesize
8KB
MD569977a5d1c648976d47b69ea3aa8fcaa
SHA14630cc15000c0d3149350b9ecda6cfc8f402938a
SHA25661ca4d8dd992c763b47bebb9b5facb68a59ff0a594c2ff215aa4143b593ae9dc
SHA512ba0671c72cd4209fabe0ee241b71e95bd9d8e78d77a893c94f87de5735fd10ea8b389cf4c48462910042c312ddff2f527999cd2f845d0c19a8673dbceda369fd
-
Filesize
18KB
MD51a3a91df20b5ecad602bbfc2e0dfa2b8
SHA18360683b2ecaa65f094d167c6986d0ebd8e07463
SHA256f1ae52e46020e6aafe044cf479dc63ba90811ae48755e9835f06b74b22fb1431
SHA512a2df1666299440005c9b295607b5a3bd33798adcec90e17d753e85f73c19c43316c637ea42a629d7e3637c7877ac44798f12c2a5ef0d7271822c2aa2a4fb681a
-
Filesize
181KB
MD510d74de972a374bb9b35944901556f5f
SHA1593f11e2aa70a1508d5e58ea65bec0ae04b68d64
SHA256ab9f6ac4a669e6cbd9cfb7f7a53f8d2393cd9753cc1b1f0953f8655d80a4a1df
SHA5121755be2bd1e2c9894865492903f9bf03a460fb4c952f84b748268bf050c3ece4185b612c855804c7600549170742359f694750a46e5148e00b5604aca5020218
-
Filesize
3KB
MD5eb86f33fd150620cabacf2fca47902aa
SHA1510720b759d7161476b9b0c339159640fa6112e0
SHA256a53fb06a3d6085f4e0b969f37d67ac4d3e95f04a8ed774450f7f2adb83be79b9
SHA5128be5b7df134f5b1265d10fd847b017662be2e615ef99636650feeab7bb2bb2be4c33585163eb889a326a5f43d42d59f47d16762d016d951f162176a5e23e5b1f
-
Filesize
223KB
MD5a7a51358ab9cdf1773b76bc2e25812d9
SHA19f3befe37f5fbe58bbb9476a811869c5410ee919
SHA256817ae49d7329ea507f0a01bb8009b9698bbd2fbe5055c942536f73f4d1d2b612
SHA5123adc88eec7f646e50be24d2322b146438350aad358b3939d6ec0cd700fa3e3c07f2b75c5cd5e0018721af8e2391b0f32138ab66369869aaaa055d9188b4aa38d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
90KB
MD578581e243e2b41b17452da8d0b5b2a48
SHA1eaefb59c31cf07e60a98af48c5348759586a61bb
SHA256f28caebe9bc6aa5a72635acb4f0e24500494e306d8e8b2279e7930981281683f
SHA512332098113ce3f75cb20dc6e09f0d7ba03f13f5e26512d9f3bee3042c51fbb01a5e4426c5e9a5308f7f805b084efc94c28fc9426ce73ab8dfee16ab39b3efe02a