Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe
Resource
win10v2004-20240802-en
General
-
Target
8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe
-
Size
1.1MB
-
MD5
f1424e5b9810a4a9c33506aa784fca89
-
SHA1
4ad6287fe149832551afbcb1113db50cd133777b
-
SHA256
8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed
-
SHA512
e03432137a7c12c03d34302fe4e1774a3a08935d39f665e4086fd8637f4ea961a645e2a8bb3cd85dd24c54861e4f01b0500a70641e2fa3a4a09e2e89a3b77380
-
SSDEEP
12288:JYYjzzONcuuIYsYNeaCbU6sKySaVQ4pBgncu7EKHCBbsCU/hpgmxCBbsCUXEGnF9:eg9uurUngnBU97EniCUppoiCUXfF9
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.252.232.158:7812
64.23.232.116:7812
vsvf
-
delay
1
-
install
true
-
install_file
Windows Security Health Service.exe
-
install_folder
%AppData%
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7074211690:AAFHdtGIEk1j3FpHjh6_p8Xjh9rfZDo4uSc/sendMessage?chat_id=6291749148
https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
xworm
5.0
146.190.29.250:7812
165.227.91.90:7812
167.99.94.206:7812
4chIqEbR5Rq6U6EI
-
Install_directory
%AppData%
-
install_file
Windows Defender Service Host.exe
-
telegram
https://api.telegram.org/bot7074211690:AAFHdtGIEk1j3FpHjh6_p8Xjh9rfZDo4uSc/sendMessage?chat_id=6291749148
Extracted
quasar
2.1.0.0
Office04
146.190.29.250:7812
VNM_MUTEX_h1gQxrpyccCFZq7JPS
-
encryption_key
V5fWyT4tQqXFouaUUxe2
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update
-
subdirectory
SubDir34
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Window Security.exe disable_win_def behavioral2/memory/5040-76-0x0000000000BA0000-0x0000000000C2C000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe family_xworm behavioral2/memory/1904-74-0x0000000000300000-0x0000000000312000-memory.dmp family_xworm -
Processes:
Window Security.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Window Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Window Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Window Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Window Security.exe -
Quasar payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Window Security.exe family_quasar behavioral2/memory/5040-76-0x0000000000BA0000-0x0000000000C2C000-memory.dmp family_quasar -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\svchost.exe family_stormkitty C:\Users\Admin\AppData\Roaming\update.exe family_stormkitty behavioral2/memory/1428-72-0x0000000000820000-0x000000000085E000-memory.dmp family_stormkitty behavioral2/memory/940-73-0x00000000007B0000-0x00000000007E0000-memory.dmp family_stormkitty -
Async RAT payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Cracked.exe family_asyncrat C:\Users\Admin\AppData\Roaming\svchost.exe family_asyncrat C:\Users\Admin\AppData\Roaming\update.exe family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exeCracked.exeWindows Defender Service Host.exeWindow Security.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation Cracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation Windows Defender Service Host.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation Window Security.exe -
Drops startup file 2 IoCs
Processes:
Windows Defender Service Host.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Service Host.lnk Windows Defender Service Host.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Service Host.lnk Windows Defender Service Host.exe -
Executes dropped EXE 11 IoCs
Processes:
crack.exeCracked.exesvchost.exeupdate.exeWindow Security.exeWindows Defender Service Host.exeWindows Security.exeWindows Security Health Service.exeWindow Security.exeWindows Defender Service Host.exeWindows Defender Service Host.exepid process 4120 crack.exe 4832 Cracked.exe 940 svchost.exe 1428 update.exe 5040 Window Security.exe 1904 Windows Defender Service Host.exe 3240 Windows Security.exe 3004 Windows Security Health Service.exe 4856 Window Security.exe 3040 Windows Defender Service Host.exe 1944 Windows Defender Service Host.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
Window Security.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Window Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Window Security.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows Defender Service Host.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender Service Host = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Defender Service Host.exe" Windows Defender Service Host.exe -
Drops desktop.ini file(s) 14 IoCs
Processes:
svchost.exeupdate.exedescription ioc process File created C:\Users\Admin\AppData\Local\244afb72866c8b52ebeea553725abc3a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\cd715dd0cb9123424d92f63e0c63e92a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini update.exe File opened for modification C:\Users\Admin\AppData\Local\244afb72866c8b52ebeea553725abc3a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\cd715dd0cb9123424d92f63e0c63e92a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini update.exe File created C:\Users\Admin\AppData\Local\cd715dd0cb9123424d92f63e0c63e92a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini update.exe File created C:\Users\Admin\AppData\Local\cd715dd0cb9123424d92f63e0c63e92a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini update.exe File created C:\Users\Admin\AppData\Local\cd715dd0cb9123424d92f63e0c63e92a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini update.exe File created C:\Users\Admin\AppData\Local\244afb72866c8b52ebeea553725abc3a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\cd715dd0cb9123424d92f63e0c63e92a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini update.exe File created C:\Users\Admin\AppData\Local\244afb72866c8b52ebeea553725abc3a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\244afb72866c8b52ebeea553725abc3a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\244afb72866c8b52ebeea553725abc3a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\244afb72866c8b52ebeea553725abc3a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\cd715dd0cb9123424d92f63e0c63e92a\Admin@KZYBFHMK_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini update.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ip-api.com 36 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exedescription ioc process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
chcp.comschtasks.exepowershell.exeschtasks.execmd.execmd.execmd.exechcp.comcmd.execmd.exenetsh.exesvchost.exePING.EXEnetsh.exeWindow Security.exeWindows Security.execmd.exetimeout.exechcp.comnetsh.exenetsh.execmd.exeWindow Security.exeupdate.exechcp.comchcp.comfindstr.execrack.exefindstr.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Window Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Window Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
Processes:
cmd.exenetsh.execmd.exenetsh.exepid process 212 cmd.exe 808 netsh.exe 2152 cmd.exe 1828 netsh.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
update.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier update.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 4576 timeout.exe 2304 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1196 schtasks.exe 4488 schtasks.exe 4772 schtasks.exe 2240 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Windows Defender Service Host.exepid process 1904 Windows Defender Service Host.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Cracked.exepowershell.exeWindows Defender Service Host.exeWindows Security Health Service.exepid process 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 4832 Cracked.exe 3396 powershell.exe 3396 powershell.exe 1904 Windows Defender Service Host.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe 3004 Windows Security Health Service.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
Cracked.exeWindows Defender Service Host.exeupdate.exesvchost.exeWindow Security.execrack.exepowershell.exeWindows Security.exeWindows Security Health Service.exeWindow Security.exeWindows Defender Service Host.exeWindows Defender Service Host.exedescription pid process Token: SeDebugPrivilege 4832 Cracked.exe Token: SeDebugPrivilege 1904 Windows Defender Service Host.exe Token: SeDebugPrivilege 1428 update.exe Token: SeDebugPrivilege 940 svchost.exe Token: SeDebugPrivilege 4832 Cracked.exe Token: SeDebugPrivilege 5040 Window Security.exe Token: SeDebugPrivilege 4120 crack.exe Token: SeDebugPrivilege 3396 powershell.exe Token: SeDebugPrivilege 3240 Windows Security.exe Token: SeDebugPrivilege 3004 Windows Security Health Service.exe Token: SeDebugPrivilege 3240 Windows Security.exe Token: SeDebugPrivilege 3004 Windows Security Health Service.exe Token: SeDebugPrivilege 4856 Window Security.exe Token: SeDebugPrivilege 3040 Windows Defender Service Host.exe Token: SeDebugPrivilege 1944 Windows Defender Service Host.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
Windows Defender Service Host.exeWindows Security.exeWindows Security Health Service.exepid process 1904 Windows Defender Service Host.exe 3240 Windows Security.exe 3004 Windows Security Health Service.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exeCracked.execmd.execmd.exeWindow Security.execrack.exeWindows Defender Service Host.execmd.exeWindows Security.execmd.exeupdate.execmd.exedescription pid process target process PID 4220 wrote to memory of 4120 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe crack.exe PID 4220 wrote to memory of 4120 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe crack.exe PID 4220 wrote to memory of 4120 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe crack.exe PID 4220 wrote to memory of 4832 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe Cracked.exe PID 4220 wrote to memory of 4832 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe Cracked.exe PID 4220 wrote to memory of 940 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe svchost.exe PID 4220 wrote to memory of 940 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe svchost.exe PID 4220 wrote to memory of 940 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe svchost.exe PID 4220 wrote to memory of 1428 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe update.exe PID 4220 wrote to memory of 1428 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe update.exe PID 4220 wrote to memory of 1428 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe update.exe PID 4220 wrote to memory of 5040 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe Window Security.exe PID 4220 wrote to memory of 5040 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe Window Security.exe PID 4220 wrote to memory of 5040 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe Window Security.exe PID 4220 wrote to memory of 1904 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe Windows Defender Service Host.exe PID 4220 wrote to memory of 1904 4220 8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe Windows Defender Service Host.exe PID 4832 wrote to memory of 3632 4832 Cracked.exe cmd.exe PID 4832 wrote to memory of 3632 4832 Cracked.exe cmd.exe PID 4832 wrote to memory of 4312 4832 Cracked.exe cmd.exe PID 4832 wrote to memory of 4312 4832 Cracked.exe cmd.exe PID 4312 wrote to memory of 2304 4312 cmd.exe timeout.exe PID 4312 wrote to memory of 2304 4312 cmd.exe timeout.exe PID 3632 wrote to memory of 1196 3632 cmd.exe schtasks.exe PID 3632 wrote to memory of 1196 3632 cmd.exe schtasks.exe PID 5040 wrote to memory of 4488 5040 Window Security.exe schtasks.exe PID 5040 wrote to memory of 4488 5040 Window Security.exe schtasks.exe PID 5040 wrote to memory of 4488 5040 Window Security.exe schtasks.exe PID 5040 wrote to memory of 3240 5040 Window Security.exe Windows Security.exe PID 5040 wrote to memory of 3240 5040 Window Security.exe Windows Security.exe PID 5040 wrote to memory of 3240 5040 Window Security.exe Windows Security.exe PID 5040 wrote to memory of 3396 5040 Window Security.exe powershell.exe PID 5040 wrote to memory of 3396 5040 Window Security.exe powershell.exe PID 5040 wrote to memory of 3396 5040 Window Security.exe powershell.exe PID 4120 wrote to memory of 3572 4120 crack.exe cmd.exe PID 4120 wrote to memory of 3572 4120 crack.exe cmd.exe PID 4120 wrote to memory of 3572 4120 crack.exe cmd.exe PID 1904 wrote to memory of 4772 1904 Windows Defender Service Host.exe schtasks.exe PID 1904 wrote to memory of 4772 1904 Windows Defender Service Host.exe schtasks.exe PID 3572 wrote to memory of 4576 3572 cmd.exe timeout.exe PID 3572 wrote to memory of 4576 3572 cmd.exe timeout.exe PID 3572 wrote to memory of 4576 3572 cmd.exe timeout.exe PID 3240 wrote to memory of 2240 3240 Windows Security.exe schtasks.exe PID 3240 wrote to memory of 2240 3240 Windows Security.exe schtasks.exe PID 3240 wrote to memory of 2240 3240 Windows Security.exe schtasks.exe PID 4312 wrote to memory of 3004 4312 cmd.exe Windows Security Health Service.exe PID 4312 wrote to memory of 3004 4312 cmd.exe Windows Security Health Service.exe PID 5040 wrote to memory of 3364 5040 Window Security.exe cmd.exe PID 5040 wrote to memory of 3364 5040 Window Security.exe cmd.exe PID 5040 wrote to memory of 3364 5040 Window Security.exe cmd.exe PID 3364 wrote to memory of 4868 3364 cmd.exe cmd.exe PID 3364 wrote to memory of 4868 3364 cmd.exe cmd.exe PID 3364 wrote to memory of 4868 3364 cmd.exe cmd.exe PID 1428 wrote to memory of 212 1428 update.exe cmd.exe PID 1428 wrote to memory of 212 1428 update.exe cmd.exe PID 1428 wrote to memory of 212 1428 update.exe cmd.exe PID 212 wrote to memory of 448 212 cmd.exe chcp.com PID 212 wrote to memory of 448 212 cmd.exe chcp.com PID 212 wrote to memory of 448 212 cmd.exe chcp.com PID 212 wrote to memory of 808 212 cmd.exe netsh.exe PID 212 wrote to memory of 808 212 cmd.exe netsh.exe PID 212 wrote to memory of 808 212 cmd.exe netsh.exe PID 212 wrote to memory of 2384 212 cmd.exe findstr.exe PID 212 wrote to memory of 2384 212 cmd.exe findstr.exe PID 212 wrote to memory of 2384 212 cmd.exe findstr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe"C:\Users\Admin\AppData\Local\Temp\8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Roaming\crack.exe"C:\Users\Admin\AppData\Roaming\crack.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6DFC.tmp.cmd""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4576
-
-
-
-
C:\Users\Admin\AppData\Roaming\Cracked.exe"C:\Users\Admin\AppData\Roaming\Cracked.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:1196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6A43.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2304
-
-
C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:940 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2152 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:3508
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1828
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:1356
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
PID:4532 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1552
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
-
C:\Users\Admin\AppData\Roaming\update.exe"C:\Users\Admin\AppData\Roaming\update.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:808
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
PID:884 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:936
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3396
-
-
-
-
C:\Users\Admin\AppData\Roaming\Window Security.exe"C:\Users\Admin\AppData\Roaming\Window Security.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Window Security.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4488
-
-
C:\Users\Admin\AppData\Roaming\SubDir34\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir34\Windows Security.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir34\Windows Security.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2240
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵
- System Location Discovery: System Language Discovery
PID:4868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8EMMncIdEZHV.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3156 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1480
-
-
C:\Users\Admin\AppData\Roaming\Window Security.exe"C:\Users\Admin\AppData\Roaming\Window Security.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender Service Host" /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4772
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\244afb72866c8b52ebeea553725abc3a\Admin@KZYBFHMK_en-US\System\Process.txt
Filesize4KB
MD53703dafe83ae78057f885bc7d275a7dd
SHA1f99d12945546f53cd9bbcb37c5cb7588b05bea6d
SHA256abb092b713575c8d8dca8cc159425b9901302aa331b4a1877edc71dc80464881
SHA512dd20da8a15f442aadcc6cce6a2c8cdd93caef857d4428efd635dcc4018908270d61eda692bdb7137be5a4542af4fa575ca3a0c09f60a4d146bfa0baf2ca81f87
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
209B
MD5c9d232718c48375a2c49d6f7064cf0b6
SHA1b9bd50968372e3198a1c7d452378a4a3cf5b6fab
SHA2569c479d2db2dae74fbb8c164c9263d1d3851bed91445d4022237cd5f47082b95c
SHA5122f681ed3b1cdeb93edaf02e009e38be5bacb502a8aba70dcd7c8e41fddf89eaba3614a59183da3be15cb4cf885817370991367a03f018ffe66a27c4f7b9418ee
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.0MB
MD581412f7f844b75a6c65ed71eac0b9e61
SHA139b14eb48e13daaf94023482666fc9e13118ba72
SHA256e37ca7753860c60248b70828432c8e018a3788479808fdfdbc4d3b369b381019
SHA51263f2f6af6974091fb8de9dae945b392bb5f68abe66f7d9e3906089bb31f8e7ae2be03fcce44288514678b2b79eb309667b4607e9132183d1bb9a631ad65a983a
-
Filesize
175B
MD5fa0fe982a2a0a34b1750f7038f4ec163
SHA10396733e53449c883aa69aed731fd0eeb0c90064
SHA2569eae411ed0bc4856cd9f0522f52f00257a19cf77425c8da0f15011988e707ea2
SHA51264c0b7a478c70a03e450c86188156315c2d21b5df118ec0090fbfe4f72585d3f012f0902cbc87b62f4d25241fa3829760f90b2c15dd631fb34ec08bb7059c706
-
Filesize
151B
MD55afb73cfdc4b74b10e8891d9a6810152
SHA1663469a61215b25ab7f298799cb7b16e463a6808
SHA2567d5fcc3e59ff75380228ceb57737bc92f80f504379e330ec697d5a0b4e5e4e2a
SHA512f7aed2339dff6fc439809691b3b9372a48db84acb9e526e686739c637ffe5bd6ea176c01be991d2676b13aacad2fa48a75a40b198e8e8567741f011700908659
-
Filesize
114KB
MD5242b4242b3c1119f1fb55afbbdd24105
SHA1e1d9c1ed860b67b926fe18206038cd10f77b9c55
SHA2562d0e57c642cc32f10e77a73015075c2d03276dd58689944b01139b2bde8a62a1
SHA5127d1e08dc0cf5e241bcfe3be058a7879b530646726c018bc51cc4821a7a41121bcda6fbfdeeca563e3b6b5e7035bdd717781169c3fdbd2c74933390aa9450c684
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
C:\Users\Admin\AppData\Local\cd715dd0cb9123424d92f63e0c63e92a\Admin@KZYBFHMK_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\cd715dd0cb9123424d92f63e0c63e92a\Admin@KZYBFHMK_en-US\System\Process.txt
Filesize4KB
MD52be0849ffa6c34f5178edad59e3ca323
SHA15b446ffdf327e93c963a185fdf067c49cb42c104
SHA2566e415c1326d948fb7374cbf69e71fa1c77953e068b1152a53a2110771055f142
SHA512ded2e173d0e326cac3d7cf31b694a8ba7a45b2d8cdbebcc3440faf27647ef7ab795d19c2bcb183004f5c7b9561e7d5eb549a87f6557b6a45352a828b1743455e
-
Filesize
4B
MD599ba5c4097c6b8fef5ed774a1a6714b8
SHA1f1febaefe09fccf9243580f7522c1543012df210
SHA256a7c24c0bcfeeaa0ca9751a639c0606083df9faba7faa9ecfef9ba2342f4e5a0f
SHA51236d35281900b81e5f171e3fd7fc2cf7af38def70de5a8f28a1b3d310a0f33411f8111c3ffdfad3e482494f68fb12aecf7d3b3205df52fc7df38cb989694ba094
-
Filesize
74KB
MD50dfa83a82f6418c73406d78296de61be
SHA1dd7eceef8a434c43e0751e180bf714e08771d336
SHA2568d27369ffa8b29d561fa9daf485be14d2fc00287bb1c69d4c84d514891c8db5e
SHA5129a4b026250b18c29ab7dd48203f321c2ef2f12695bd2dcb52ebbc15001c8ddf019d5a7e04da056c50c1881ce269d1810259bf6d04b61f471e8751b7192fc73d4
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
534KB
MD581b2c5c64951b603480d40d321540ff2
SHA1314199ad92baeb203f5555ff3814e9b7a4f226f8
SHA256b893220d33f9b8a0f98702bb577e4459792253ae651bdc18a93145ccd008af54
SHA5123a57655bf7aa18a34364659553aad26a3d5b8946b957441f5fedebab5936b6bb2c71c6337837ead486a001b6a9227437cc5c4ec4a5de627f0e2db10dc6afdea6
-
Filesize
43KB
MD55322a12cb24e83bfa9746fbde06d07e7
SHA15263a4f26bda073e9f82dd4fa612eb494dd771c7
SHA2564957d607c2984f94a258dba088fa1ab85e508bfaabe9279bf8b6bf6f4b97a9bb
SHA51267bfaef1ddf4ad44218c82c5634e7f726304845fab1d5361353fdacd8d8d767fec32c871fa304f4199dde3f6224be76c67560a64c1d72bbe20e134c50d1bf058
-
Filesize
8KB
MD59215015740c937980b6b53cee5087769
SHA1a0bfe95486944f1548620d4de472c3758e95d36a
SHA256a5390a297f14ef8f5be308009ec436d2a58598188dbb92d7299795a10ba1c541
SHA5125b9bbf1836466d803d3e160a38e10c8397aa3966c120ab6435a52b7d0a09eb664ef2172bf0e7e2de1cc3eae261167c9355fa7ac3b1b7e4504a7e07b82c4b90e2
-
Filesize
170KB
MD596014694a042d8344b910bc47d79337b
SHA19d19ab2f110ae58f30965a5a3d608cbf51986edb
SHA2564950eb74909bd6e739e38e57d8c6465c76ef108d65cac9f130d3f5c6d2fe943f
SHA512fe308c42b3ad2c3d73a834399aa12ea23f336103389181dface80a81da8be1ffd9a950cac802dc8a806ad318eb90a6bb6021d1acd9206a07749f83f2bb6cd03d
-
Filesize
225KB
MD5b8df7316cc35a0fb6fe3a326b4283010
SHA1d49c11f5a95f72e37d6194df41178f2b7faa01ee
SHA256f243df692ee7552286d52b23e4993e07a27877aa86c63b84903a8e6cbd0d19f3
SHA5123ef92be29123695820970a003fd0561a57f87c8c6adae86781729027ce40ede4b63da30d0b0cc75376bd9ae90accaf674fc7ff799a8b73ab4bb45b2ca65ff120