Analysis
-
max time kernel
421s -
max time network
424s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250218-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250218-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
28/02/2025, 17:13
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win10ltsc2021-20250218-en
General
-
Target
Infected.exe
-
Size
63KB
-
MD5
4283bcbe5bea251f8568efc572d431dd
-
SHA1
dee1cb4e0519ebcf092161ff125902aca428a4f1
-
SHA256
cfcc492a4c21493b0a1ca52ed0a0552f3388dabb40bfa1db94061269fe3afa4f
-
SHA512
2270742d31151236ff0a80b9a371a63bfe6bac8e8622a498324c9956711e31292ec61b95714a9f91f5dd9178eb1c22d43a82a7a81e8e0675a4b8bfee1e1296b4
-
SSDEEP
768:iqWcYBjjj78ZIC8A+X0iazcBRL5JTk1+T4KSBGHmDbD/ph0oXhpwq5vNlSuwdpqM:MZjLXdSJYUbdh9/DvKuwdpqKmY7
Malware Config
Extracted
asyncrat
Default
6.tcp.ngrok.io:17720
-
delay
1
-
install
true
-
install_file
sigma.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000027e4c-11.dat family_asyncrat -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000\Control Panel\International\Geo\Nation Infected.exe Key value queried \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000\Control Panel\International\Geo\Nation sigma.exe -
Executes dropped EXE 1 IoCs
pid Process 3188 sigma.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sigma.exe Key opened \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sigma.exe Key opened \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sigma.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\desktop\desktop.ini sigma.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 14 6.tcp.ngrok.io -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 icanhazip.com 52 ip-api.com 74 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
pid Process 2540 ARP.EXE -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4476 tasklist.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\CbsTemp TiWorker.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2676 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 18 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 6 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4136 cmd.exe 3632 netsh.exe 2764 cmd.exe 528 netsh.exe 1196 cmd.exe 1244 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 sigma.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier sigma.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4524 timeout.exe 2772 timeout.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 1216 ipconfig.exe 4716 NETSTAT.EXE 3244 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1044 systeminfo.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 4972 Infected.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe 3188 sigma.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4972 Infected.exe Token: SeDebugPrivilege 3188 sigma.exe Token: SeSecurityPrivilege 4204 TiWorker.exe Token: SeRestorePrivilege 4204 TiWorker.exe Token: SeBackupPrivilege 4204 TiWorker.exe Token: SeDebugPrivilege 4476 tasklist.exe Token: SeDebugPrivilege 4716 NETSTAT.EXE Token: SeSecurityPrivilege 4204 TiWorker.exe Token: SeRestorePrivilege 4204 TiWorker.exe Token: SeBackupPrivilege 4204 TiWorker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4040 4972 Infected.exe 80 PID 4972 wrote to memory of 4040 4972 Infected.exe 80 PID 4972 wrote to memory of 2288 4972 Infected.exe 82 PID 4972 wrote to memory of 2288 4972 Infected.exe 82 PID 4040 wrote to memory of 3216 4040 cmd.exe 84 PID 4040 wrote to memory of 3216 4040 cmd.exe 84 PID 2288 wrote to memory of 4524 2288 cmd.exe 85 PID 2288 wrote to memory of 4524 2288 cmd.exe 85 PID 2288 wrote to memory of 3188 2288 cmd.exe 90 PID 2288 wrote to memory of 3188 2288 cmd.exe 90 PID 3188 wrote to memory of 4136 3188 sigma.exe 107 PID 3188 wrote to memory of 4136 3188 sigma.exe 107 PID 4136 wrote to memory of 2324 4136 cmd.exe 109 PID 4136 wrote to memory of 2324 4136 cmd.exe 109 PID 4136 wrote to memory of 3632 4136 cmd.exe 110 PID 4136 wrote to memory of 3632 4136 cmd.exe 110 PID 4136 wrote to memory of 224 4136 cmd.exe 111 PID 4136 wrote to memory of 224 4136 cmd.exe 111 PID 3188 wrote to memory of 4476 3188 sigma.exe 112 PID 3188 wrote to memory of 4476 3188 sigma.exe 112 PID 4476 wrote to memory of 2100 4476 cmd.exe 114 PID 4476 wrote to memory of 2100 4476 cmd.exe 114 PID 3188 wrote to memory of 2764 3188 sigma.exe 115 PID 3188 wrote to memory of 2764 3188 sigma.exe 115 PID 4476 wrote to memory of 3608 4476 cmd.exe 117 PID 4476 wrote to memory of 3608 4476 cmd.exe 117 PID 2764 wrote to memory of 3756 2764 cmd.exe 118 PID 2764 wrote to memory of 3756 2764 cmd.exe 118 PID 2764 wrote to memory of 528 2764 cmd.exe 119 PID 2764 wrote to memory of 528 2764 cmd.exe 119 PID 2764 wrote to memory of 4184 2764 cmd.exe 120 PID 2764 wrote to memory of 4184 2764 cmd.exe 120 PID 3188 wrote to memory of 3040 3188 sigma.exe 121 PID 3188 wrote to memory of 3040 3188 sigma.exe 121 PID 3040 wrote to memory of 1796 3040 cmd.exe 123 PID 3040 wrote to memory of 1796 3040 cmd.exe 123 PID 3040 wrote to memory of 2652 3040 cmd.exe 124 PID 3040 wrote to memory of 2652 3040 cmd.exe 124 PID 3188 wrote to memory of 3152 3188 sigma.exe 125 PID 3188 wrote to memory of 3152 3188 sigma.exe 125 PID 3152 wrote to memory of 1044 3152 cmd.exe 127 PID 3152 wrote to memory of 1044 3152 cmd.exe 127 PID 3152 wrote to memory of 2064 3152 cmd.exe 131 PID 3152 wrote to memory of 2064 3152 cmd.exe 131 PID 3152 wrote to memory of 4688 3152 cmd.exe 132 PID 3152 wrote to memory of 4688 3152 cmd.exe 132 PID 4688 wrote to memory of 1264 4688 net.exe 133 PID 4688 wrote to memory of 1264 4688 net.exe 133 PID 3152 wrote to memory of 3764 3152 cmd.exe 134 PID 3152 wrote to memory of 3764 3152 cmd.exe 134 PID 3764 wrote to memory of 896 3764 net.exe 135 PID 3764 wrote to memory of 896 3764 net.exe 135 PID 3152 wrote to memory of 4776 3152 cmd.exe 136 PID 3152 wrote to memory of 4776 3152 cmd.exe 136 PID 4776 wrote to memory of 2944 4776 net.exe 137 PID 4776 wrote to memory of 2944 4776 net.exe 137 PID 3152 wrote to memory of 2812 3152 cmd.exe 138 PID 3152 wrote to memory of 2812 3152 cmd.exe 138 PID 2812 wrote to memory of 1552 2812 net.exe 139 PID 2812 wrote to memory of 1552 2812 net.exe 139 PID 3152 wrote to memory of 1176 3152 cmd.exe 140 PID 3152 wrote to memory of 1176 3152 cmd.exe 140 PID 1176 wrote to memory of 1636 1176 net.exe 141 PID 1176 wrote to memory of 1636 1176 net.exe 141 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sigma.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sigma.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Infected.exe"C:\Users\Admin\AppData\Local\Temp\Infected.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sigma" /tr '"C:\Users\Admin\AppData\Roaming\sigma.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "sigma" /tr '"C:\Users\Admin\AppData\Roaming\sigma.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:3216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB565.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4524
-
-
C:\Users\Admin\AppData\Roaming\sigma.exe"C:\Users\Admin\AppData\Roaming\sigma.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3188 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:2324
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3632
-
-
C:\Windows\system32\findstr.exefindstr All5⤵PID:224
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid4⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:2100
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3608
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:3756
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:528
-
-
C:\Windows\system32\findstr.exefindstr All5⤵PID:4184
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid4⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:1796
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2652
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\system32\systeminfo.exesysteminfo5⤵
- Gathers system information
PID:1044
-
-
C:\Windows\system32\HOSTNAME.EXEhostname5⤵PID:2064
-
-
C:\Windows\system32\net.exenet user5⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user6⤵PID:1264
-
-
-
C:\Windows\system32\net.exenet localgroup5⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup6⤵PID:896
-
-
-
C:\Windows\system32\net.exenet localgroup administrators5⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators6⤵PID:2944
-
-
-
C:\Windows\system32\net.exenet user guest5⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest6⤵PID:1552
-
-
-
C:\Windows\system32\net.exenet user administrator5⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator6⤵PID:1636
-
-
-
C:\Windows\system32\tasklist.exetasklist /svc5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
C:\Windows\system32\ipconfig.exeipconfig /all5⤵
- Gathers network information
PID:1216
-
-
C:\Windows\system32\ROUTE.EXEroute print5⤵PID:4984
-
-
C:\Windows\system32\ARP.EXEarp -a5⤵
- Network Service Discovery
PID:2540
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -an5⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Windows\system32\ipconfig.exeipconfig /displaydns5⤵
- Gathers network information
PID:3244
-
-
C:\Windows\system32\sc.exesc query type= service state= all5⤵
- Launches sc.exe
PID:2676
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1196 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:2376
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1244
-
-
C:\Windows\system32\findstr.exefindstr All5⤵PID:1112
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid4⤵PID:1044
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:1264
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2832
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "sigma"4⤵PID:2224
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "sigma"5⤵PID:1272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9F0B.tmp.bat""4⤵PID:4760
-
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:2772
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵PID:4832
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.4467_none_7e0f83e07c8c1985\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.4467_none_7e0f83e07c8c1985\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4204
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5151c74200fc7a662b6bb8f7cdfe09790
SHA193142c32399880cee26dfd34e29671857231c82d
SHA2568e795c9808b627c1473cc7685e358ad9596151f752c542edebe433c8d15fa8c2
SHA512eebed9805386cdd083d2182628b8e4dd3e42bb6cb35f0d9b5c588525eb2c04a7c9870a0a0a090552e3827936eabeba6e6d4fcf3143a9f709dcebae06aaeb4ef9
-
Filesize
28KB
MD56caf0855f283bc6306f075478236eb2d
SHA12d6f6ab18bb50c7f77b25dd2c29c60c7dabe880d
SHA256bcfd0b25bdd2ae30bbcc30301103a074ac953a2fbbd4b1ea55b251b6541d6953
SHA512e82775387dc5cb9a7aabb82561a1dcfe50f8e7d6ed0d91c0bec807ae6be21a004e660503948a490782a1d7b328b5f0d539ade3bda989d3107a6fe114d815f76e
-
Filesize
5KB
MD505253de15e8e488bf5be560965314d28
SHA1e4693fa31ca5adaf2a2590adaf8389326789d804
SHA2567b024d6d8805312699d45c3370f43b0e2728722fb43a462e70bd27c72e175651
SHA51210c0cd6174403e42746f62d0ca53d29a3b68abf590c11e011fe0e24b3d07bdc334a53e2edbeec18280cd93d237bde18b4254e93c18c5a3ce06e652f40434e700
-
Filesize
154B
MD5e8ad402699b53a7d2ad531880e6e8b30
SHA1f4b01bbb4c06bbccf9f5bf350f050d41b392c2f5
SHA256b0db09143f61136c41bfaedbb841fe3a6920ac5ed7788f67438f6e30d1d7816d
SHA5127c5f948d0e1238390f34838671b75d06d00720839ba3226351adc5c5666f68ef5c67130f5fcc0893067b71d57999f904a7c5c1bd0bf6c858716821620c253019
-
Filesize
149B
MD5fe2da6dc66bcc266c6ed7fbbe5de0735
SHA1c222a7e71aa46088a900098b7d4817befda72995
SHA25685a5af7f3f4c46a217ee627ebc58a1df9342bc2b427b44107d14739dc0047ba4
SHA512454ab7a394f439dd3943532c2071aa64eabb508b7e022df9169da4bf6061fdb4f497b0cf4a2670d1d24d37463dc9122c27d232cac1bb43f18cbff656d2c30f0f
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\Browsers\Mozilla\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\Directories\OneDrive.txt
Filesize25B
MD5966247eb3ee749e21597d73c4176bd52
SHA11e9e63c2872cef8f015d4b888eb9f81b00a35c79
SHA2568ddfc481b1b6ae30815ecce8a73755862f24b3bb7fdebdbf099e037d53eb082e
SHA512bd30aec68c070e86e3dec787ed26dd3d6b7d33d83e43cb2d50f9e2cff779fee4c96afbbe170443bd62874073a844beb29a69b10c72c54d7d444a8d86cfd7b5aa
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\Directories\Startup.txt
Filesize24B
MD568c93da4981d591704cea7b71cebfb97
SHA1fd0f8d97463cd33892cc828b4ad04e03fc014fa6
SHA256889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483
SHA51263455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\System\Desktop.jpg
Filesize80KB
MD528415922c06d1a4c85f073d2137dfcea
SHA1eb78b1c033648d0e963e167da45e90644f156cad
SHA2567cdfe48b2c9a58ab52637748fb121577cb01738cadf26e9fa86de1b497546913
SHA51294247942045a1daeb6ac381c6de9ecf469e597818231d73255a03703d1c2b9e9cdfe74c2da7a6135e42fb644a39e8262df0e9894a5ce5b8f4a3d778dcc4b0d92
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\System\Process.txt
Filesize3KB
MD5a95f97089e9ebbba9cb2788e9faff853
SHA1f01d0c8189f7be87e52b7319149ebf6a83eb2dd6
SHA2560932af60909c08f6b7f896f83764732a6dedef236ea6463f7d1bce768589bcbe
SHA512ff2a5eca3775632e4cfb7e4d284351dd82ca57b7213c88ffdc5e37303be78da0a464928c43d171cf6dfcba4d7d6a096bbd5b081597271cf9a7386a3fcc7c954c
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\System\Process.txt
Filesize4KB
MD51e2f0fd7677be666bfcd561ef47e537f
SHA1d8df574394f872a018c239ca1adb90012cbe95d7
SHA256ea26e0e1e2205077f4c6b647294dbc8ec2b19060817fb8d0808fcbf08afe6854
SHA51254ac6deed2aaa7e8ae66ce9d13503417628e7e9d3cc253d43dc0d3e2ab81c268ff5c2401c008288c3e851ef5d3216986876e4e7508ac61d7b10ed93e40bf0227
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\System\Process.txt
Filesize747B
MD5f9cb56bf6558f82e6de057ae18f67239
SHA13a61b7c03597ef29a7e82fb91315991c413d2fa4
SHA2562f12e47e7ebad76b44d228f9b8aec7c72e328c7dacadf6d444f6b571aca5cf3b
SHA512e1125b6c409a307fc2551968b2a129faf30ecb406772baf2420c3923ce2aee34f60bf6422e561e5d1212ee818ebaf31535a05205acb0c330637a0ef59a4c406e
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\System\Process.txt
Filesize2KB
MD5237913e42145c47255e09afe15e0df79
SHA1906e81eb60bb5a6a4057f0759d360a278267dc41
SHA2569d74413b37b9117894ccc94a567017d5d8314bcd7f61dce82e5ead22df8eef31
SHA512e983729e2de4f3c79a0849e42ff4b2c144e739bf55cb5f90ee771d1023643433b71fd20128b0bbfd1146f1a5d8932d68653539a2872c5314c811242a002073e5
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\System\Process.txt
Filesize1KB
MD56e7721010c2b938c1cddbb5f1f172af9
SHA15b401c56d24281f391efb54ef04ac9529837cc86
SHA256a0817e700ef09ce6093b995e24dacbd8e31671491d02d3aca71b6a714ab1cc4f
SHA5121423937e9f1395ca77e50a9a6f57ced5138e973e198d60d86fa41b3ab78387782ad5d538e0d65c64fcb460ee44f0a02fd519161675924e005ec9fa2a9a36bee1
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\System\Process.txt
Filesize2KB
MD5fbfa796335469f62876765d9751cf99a
SHA1ba8687626008a7169bf17648e36d6aff5b815331
SHA2565e4ad0401dd7e81930550a4c218b04061a0bbfa534029182a13e8b7765c60383
SHA5121cbbb9d1726ad2ce2981dd3bf8e301a6c5975a241f023300bc592ac76c6e5b77d040f09ea2da29e1b1d3d28a94712675cdf9bcd2aa3fc283668bfb5721d7a00b
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\System\Process.txt
Filesize5KB
MD5dc96ad88a16958419a65316a03835c22
SHA1ca041d59af2cf473116f3ad01c76c90e37cc599a
SHA256fe1951bb4a2396dc5e408d40fb8731239dd919716db2440f8ba8b56c9685484c
SHA512e047108cb8bf50790a20aedf94fd9e1978879c0b0407be6ef129545e2c27665a34e6cb5a36b77144ec151516de72136caa3221a9e1537375aa60f9e34c63b55c
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\System\Process.txt
Filesize4KB
MD5078c028470e8289ee8ecfb335378f822
SHA1fc8f7f5573e9406cc43db367fdd992297a59261f
SHA256ac5c76818caca8cdb5b9e63e4096811923cc71b2928909da766902f7291aca90
SHA51264379a1cbf1b1e60ed3cebf6eb5459f32f84ccf157a8b279851b11f7e4e467405572f80579a062f5be36a70c808ddda906517626fbb58b0bcf29f92bcc7fe7a1
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\System\ProductKey.txt
Filesize29B
MD599f6d2bb21787807753c364f127cc9d7
SHA18c51232f94cc6507913dd898a224e823e879b95e
SHA256a35720e3555f25da224fe50e7b4faa53d7003190f556d121f02e4cb119d56a9c
SHA512e0c76103b51064f0a7c215dac2e9dafa421c608880c96cc5a7bf842a764a5c3202b48d4d71716eca4d6d9b3f55117e82b9a53bae9d6db7d4dc9087971d8bdf31
-
C:\Users\Admin\AppData\Local\c4ec4407eb7dd747003cc90dd0d41655\Admin@NNYNORND_en-US\System\Windows.txt
Filesize161B
MD57acc464c00f8a6a4103c817ff8f23d59
SHA1bda8041daf7667ad8e2c2c0007bee362c3a0165a
SHA2566b5e019c7ef0b56ada926bdee9c9e38036f3dcecded6504ceeca944a68ad4ecd
SHA5128fbd4e23db23e36732f6800df8ebbda2353ecfb8de6bda501a11096b833e1b85210cb163b252da0c9be0d7ee7424bb337a6f98f11594ac66260026c9ee24b10b
-
Filesize
63KB
MD54283bcbe5bea251f8568efc572d431dd
SHA1dee1cb4e0519ebcf092161ff125902aca428a4f1
SHA256cfcc492a4c21493b0a1ca52ed0a0552f3388dabb40bfa1db94061269fe3afa4f
SHA5122270742d31151236ff0a80b9a371a63bfe6bac8e8622a498324c9956711e31292ec61b95714a9f91f5dd9178eb1c22d43a82a7a81e8e0675a4b8bfee1e1296b4