Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
74s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/03/2025, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe
-
Size
503KB
-
MD5
bf113f021f87637db50876080626e59c
-
SHA1
cb51ccacb638adc682fd4867bd3df3aa0aecd77b
-
SHA256
01fc8aa528661928144684048e46f52296f1e954b8fba604b22a1015a2186e48
-
SHA512
99068202057c4ad82d4ce45c19821b9e9732dce9801b2d3318d03a12832b341a36d30b9acf4e58c33b036e34a2c76743c33b4980ad6a26c03d5c3a30722ca03d
-
SSDEEP
6144:Fj68DTayM6Ct4ejdwtaIfNHt6zxB/gaBIzD4iDZIO7Ouh992STjrBpZwfKIz6W:N6qaJ7F2wwHANV7BqjDZcGPTPiyw6W
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THI$_FILE_UMSEKDRQ_.txt
http://hjhqmbxyinislkkt.onion/5785-99F7-D2EB-0502-0230
http://hjhqmbxyinislkkt.1npg9s.top/5785-99F7-D2EB-0502-0230
http://hjhqmbxyinislkkt.1fy93v.top/5785-99F7-D2EB-0502-0230
http://hjhqmbxyinislkkt.13kn4l.top/5785-99F7-D2EB-0502-0230
http://hjhqmbxyinislkkt.14klmz.top/5785-99F7-D2EB-0502-0230
http://hjhqmbxyinislkkt.13eymq.top/5785-99F7-D2EB-0502-0230
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2181 2324 mshta.exe -
Contacts a large (1100) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2704 netsh.exe 2772 netsh.exe -
Deletes itself 1 IoCs
pid Process 752 cmd.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp703.bmp" 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\ 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\steam 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\bitcoin 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\excel 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\office 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\office 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\powerpoint 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files\ 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\excel 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\onenote 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\the bat! 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\thunderbird 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\program files (x86)\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\ 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1980 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 1440 taskkill.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005158e91772bfe24c86fb1b8a9a0b9851000000000200000000001066000000010000200000004a616a555f39cfa04398b953a5b4b7946e1725f426d03d395bb885071e79661b000000000e8000000002000020000000e00c143c8d2799c3fbb89db130b1fdf88eb89e5f62aff7e407f5fc7d698c908420000000f8f89bb2d67d4780cf7be86369d1ecb16a2de970af52af7fe9f4b6b67bcd9b444000000081a1a26f64c330ca610c64cb18124dd00cf83654ebee0062a9b387cae13d566bca98680f2a78a5a5ae0071c9377709b39b18f9ee823aeaf5aa1ce037303bf5a6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d283adeb96db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E5DC88A1-02DE-11F0-AD39-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1980 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2508 chrome.exe 2508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe Token: SeDebugPrivilege 1440 taskkill.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2948 DllHost.exe 956 iexplore.exe 956 iexplore.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 956 iexplore.exe 956 iexplore.exe 1428 IEXPLORE.EXE 1428 IEXPLORE.EXE 956 iexplore.exe 956 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2772 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 31 PID 1508 wrote to memory of 2772 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 31 PID 1508 wrote to memory of 2772 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 31 PID 1508 wrote to memory of 2772 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 31 PID 1508 wrote to memory of 2704 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 33 PID 1508 wrote to memory of 2704 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 33 PID 1508 wrote to memory of 2704 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 33 PID 1508 wrote to memory of 2704 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 33 PID 1508 wrote to memory of 2324 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 36 PID 1508 wrote to memory of 2324 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 36 PID 1508 wrote to memory of 2324 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 36 PID 1508 wrote to memory of 2324 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 36 PID 1508 wrote to memory of 2388 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 37 PID 1508 wrote to memory of 2388 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 37 PID 1508 wrote to memory of 2388 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 37 PID 1508 wrote to memory of 2388 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 37 PID 1508 wrote to memory of 752 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 39 PID 1508 wrote to memory of 752 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 39 PID 1508 wrote to memory of 752 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 39 PID 1508 wrote to memory of 752 1508 2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe 39 PID 752 wrote to memory of 1440 752 cmd.exe 41 PID 752 wrote to memory of 1440 752 cmd.exe 41 PID 752 wrote to memory of 1440 752 cmd.exe 41 PID 752 wrote to memory of 1440 752 cmd.exe 41 PID 752 wrote to memory of 1980 752 cmd.exe 43 PID 752 wrote to memory of 1980 752 cmd.exe 43 PID 752 wrote to memory of 1980 752 cmd.exe 43 PID 752 wrote to memory of 1980 752 cmd.exe 43 PID 2324 wrote to memory of 956 2324 mshta.exe 45 PID 2324 wrote to memory of 956 2324 mshta.exe 45 PID 2324 wrote to memory of 956 2324 mshta.exe 45 PID 2324 wrote to memory of 956 2324 mshta.exe 45 PID 956 wrote to memory of 1428 956 iexplore.exe 46 PID 956 wrote to memory of 1428 956 iexplore.exe 46 PID 956 wrote to memory of 1428 956 iexplore.exe 46 PID 956 wrote to memory of 1428 956 iexplore.exe 46 PID 956 wrote to memory of 2572 956 iexplore.exe 48 PID 956 wrote to memory of 2572 956 iexplore.exe 48 PID 956 wrote to memory of 2572 956 iexplore.exe 48 PID 956 wrote to memory of 2572 956 iexplore.exe 48 PID 956 wrote to memory of 3044 956 iexplore.exe 49 PID 956 wrote to memory of 3044 956 iexplore.exe 49 PID 956 wrote to memory of 3044 956 iexplore.exe 49 PID 956 wrote to memory of 3044 956 iexplore.exe 49 PID 2508 wrote to memory of 1724 2508 chrome.exe 51 PID 2508 wrote to memory of 1724 2508 chrome.exe 51 PID 2508 wrote to memory of 1724 2508 chrome.exe 51 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 PID 2508 wrote to memory of 2688 2508 chrome.exe 52 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ratings mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe"1⤵
- Drops startup file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_READ_THI$_FILE_H4I0P9E5_.hta"2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2324 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://hjhqmbxyinislkkt.1j9r76.top/5785-99F7-D2EB-0502-02303⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1428
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:406532 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:275468 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_READ_THI$_FILE_UMSEKDRQ_.txt2⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "2025-03-17_bf113f021f87637db50876080626e59c_cerber.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1980
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2948
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6589758,0x7fef6589768,0x7fef65897782⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:22⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1652 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2348 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:12⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2360 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:12⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1592 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:22⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3304 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:12⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1536 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:82⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3592 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:82⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3616 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:82⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3832 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3524 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:12⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3796 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:12⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3444 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2696 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:82⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2652 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:12⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=1300 --field-trial-handle=1408,i,16027742831241402366,16726109265337079144,131072 /prefetch:12⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1408
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad3969c2934808f6dc8afae27c99995d
SHA11f1dd790fd14ca4b532f8941a225c0a50c3c638c
SHA256cdaaf4acea15c1a52f651c76774bd920f7b473a59d2f8607230d0078d3bf7090
SHA5121af009ddd3cb2e918a74612220b958c1795014f215dfe6223d852afeb8f4f9464c8a82e12bf6eb80b02665cbb4be406719a8a098cc080b0acb0fbbfd83dd3b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef268f17013921bb36061fda091cfa5c
SHA14ef7b58455d0ba1a4c86d1b7fee523f8530e86f6
SHA256c656a9c4473b6974f75fa24618213073ade80649395c93bb1fd8e4c00a0b44cc
SHA512e5adffe5f1d4fc1c9d22dc46e64c64a4dbe55b03b62bd7a81a076f22632d7aef5ae273f53ca5a20e3fb67d687d623fc0140e6cdb7622d0ae2b7eece5459a7112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551f2f560389064bbd89f8680169b362d
SHA1759127426aee74c1dbc4ea656dddc305f8a2dacd
SHA25640e1860e19fe7048a94d0c7a2bd79c5caca25c056836127bf9b083fe77e7d9ca
SHA512763be21b7c7b3fc1cfeb2365e45d5bc4f68d15384d24c6ef2951f775a6caaa71dd2e32e43bddabace8165f3fb763b2a2659e95528b1b4461a8038dd7b4d54dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579da305797daebcf1322fe9a264fe927
SHA144260b37f430bdc00b74991af42557a215ae2f1f
SHA256740598379e6a3fa918fc21d8deac734fc86ed0a52f7881bbcb14a3d19b4b3367
SHA5129673f967cea4216b1ac2c9c4e7cb0976b5254b4b9191741d81dbeafd9354a5e1adfe92690e5a4bfb4bdbea88bb193fb4f0e3f6f8141380823072ccecc236e07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b498bfc0bfbe6316a2f99032ed21eff3
SHA112012b9bdcc09a4238492dff3e958fe05b8e490a
SHA2569d348cc3bcdd7fae584c28e87c045e130d8eede65188d739ffbe4aa92b24d976
SHA5127d0ae5e460cf5c763d4a733f3d4a2dcfce70f683c5beb4538cf75fe136534c5160e99f21bfa6e5d68324ab80a82232743b886477a97688a8c0199b70f8dab291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53df0868c886c73f9c151e38943a204ab
SHA1380f14cf908c233564544c42c964a11e8cf22fef
SHA2561594103b504f1d740f024301ad33f669b3c624783f025fe68063471a81d7b98b
SHA512f1679006a99d9d1448ec657405b9aa3ff48b468c3c5294aac7fc437cb3ac70083dc319fd063a5ae2cbfd1cca6f9f7a3ef68b5b178366241ac598b768e9d0cce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57441f5928a8f33f47ae85a2e937b15ac
SHA105dc64795a8f3c2fc7cb71d80af1cd28e05a6262
SHA2568dd7c34da4a52e2261b48ad63951d8cda132a0d7597a9c7c872eb24baad1d28c
SHA512ebe3637c8e2cdfda57e9fb8b16816e079812cdf6271eabdeb318feaf260d303cb65cfe5c59aac0f863346ed5e2c9ba26d11d6d9adcfb44ba8c39c77ec338c0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518060f04727cfb00f5916254b7b4cdfb
SHA195818c6f6731419a7e539d0a12001195e24f42c8
SHA256b8060faef2eb6598d2508033c2a303da71e9bb3279203ea17364b7ea1d008669
SHA512e2a25496f1f49cdc692893fe221abb0c9636722249c8866e6fc7b4cdbefe177fb0d2e4698664558f69c1b24ae46213e71b0070dc348d61db86e34cc8f4408e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5150e7602ff19352bb15ee33391c0147b
SHA153e1326e3ac026d138c7a70c89d6ea0f13d6b0ec
SHA256bf183010aebcd6dd3412880a2faac611861b77e33b0bf46e60f06014a2f40443
SHA51254df5920ba2abc9dfe51f57a5e14837eb028e1ac147767a8a69e017b58cf77713f34bbcbe08839a74ec904eff0497bafc5a01c6f59ce1c95c431048744d69515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5391aef6b5f5ece049e6dc563618ef5db
SHA14738d85b0356a2e3c268ccc1b1903ca4780b067c
SHA25692221f826a6edaf14246561deadd086e1dd2a69e29291ab5d393c2ba17cc4dd8
SHA5125c8b62718e4dc9b5fc914dae05784e7556147005fb1eeda2e2a365185e2eee4a6a986a272c97ec1e5845499fc0bb5cbefa136666fefc6659ecc549ae2d3a3129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e57454114e8b029b0b9cde0be30edda8
SHA105dacd5535fcdeae98141c56bd381290380e65a4
SHA256ecfcb7a1e045caa54a52ba5ec980e5f5049436fc43c2641f5a1b4167f17b9caa
SHA512b7657eaaf289fcc756b6cd05c0ad6d9829b6c3de9cec3251de3897e18aa65bb49a0c14c50ba87b699608aff8b4d7b51ec01bed00e3953796043b75722241b587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5888fbb8ae661bc0fda1a8c34fc3e2788
SHA1925e63271bb425599f96bf8663ad75d122a8a49c
SHA256e9a8a7bf6b5abfe1ef090a90b8ab03a7b78941a033d79b2a0e7558b3360a9d67
SHA512c6830365d7ce29e567d66066bcfcc42bd31e85cdebf7ef015cab0f836729d92e48197e02b32cff87fff2a41b768542cb2e447e55ebac5c3ecd221bbe1dd71986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f75cf98a1b578924f42bff07f280a7ed
SHA167dc72d1e058267490e80dee26cd8aa0d3fd0418
SHA25662ce2895c13982b3830715e6b77844e731bfafabe3480c26aea3f431433d85bd
SHA51230fb5ffeafa793b044b4412ceec67bcb210c29c28239bc8cbe104175cf6ccabbac118fce108ec194c1fcb11bdaa3a91ab6f2fa513a0590cf74a811c939eda671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535f8c008676e06b829ec9b895ce5d4da
SHA108b02210c28ae87bf2001918bf787a144296ce0c
SHA2561d872fb228b75dbc35721955812870d1a9115bb9908e310160c3e28808d675ed
SHA5121ee793fca0efd2e8140d5ac945fd4f091b89515339c2c8cd3081774e53b0934636c59fbfad2dc51bfa1d844a9f009651b983cc2a259ba87f930034eaa1adc2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbd4327ee7cbc3de823658ff1035c93d
SHA173458458ec87787149aa09d8a7b8c574ff26cba8
SHA2560bae066e2b5cdfe69821f1b0fb6a9aece53901053ebf49bdedc582a4097dc7e5
SHA512e02387b30b874ee39b40abcebc80b4152c4c3043c991b9e18e826e729c55ce5a70b26d3fc8e38eeb65beee543e62adecdfea0daee51d20de5792fb6d76a2405f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab86ee14955640b253b8255d64cc624e
SHA1254578f2d480c6d739d61c8aa28407c2a58c89f1
SHA256d126164ad233c3b5a732d184a02651c85073f255effc5e7f6be1b1b67ba27b3a
SHA512d8cb1897589afffa4f96e552780bc18a215e371442a6d214ed2334889b232b6e32f1304288f8e9ee0f95940a18189e94e15de45e2d4b368026dcfa076ef553df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6ea97d1b385e7ba1befc657ae5a972e
SHA1596c1b0763c595664fedc63bd614d9bb6d53e2f3
SHA25606698249d4387599aa122d06c9ae35aac84fb8b1ba4de282e525ce9f6139c745
SHA51262703790eaa134ebb398847e83ae81cfc05110f28d276a742229d21044d7d4d74677406f1fbf57466c988bbb027db6b8ba16a117ba1ddb02cf4a4bd905de9872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515b124082c85c9865b5a2c584001ece1
SHA1d38e9c7b18cbe44d20fb8c57b6c28d1492f0b110
SHA2567d9d1bb9f65be07f0661f06194142b1df430174953f6a2b4c5e7f67371ca3e26
SHA512c8ac3ee038f3954ea99b8fa445325506be3061961a4241f0db73b962f4f14062a36feb6f7110dc8b745cc84473485a31b13cae56667d4cf87b76302d059da04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fdde89bf0177667382f168a0d11ab27
SHA1d0bca3d36a9c911c1af4303aa305bda8bcb26d53
SHA256584caaf6740b1d8534245730fecc303fd8ca4228e06f88c0990b18f7bb22abe3
SHA51251221c3f5bf15406e09c6219e8e7d4d21fd042981f6cee32449c21da1476cc9691c2c4f98b013d0c7d9619734be244d954e48000ae93618dd8bf3ef7c83c8ee8
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD53d3fea7498a244e486d3a60ed08fb961
SHA1255e9090bd7a393ff0382a2b5bc01177bec98f38
SHA25681402f3b7e6b05dcf6157b2b6b992910ebe9759b6083ee5820de39427ee22b36
SHA512ba1908df70d5b1ad8672ddb12f5107aa644f378a256c3a1e234568624361cfc6957ab624ee5e69d403b96c48bd5287d60341d0bd84ec90b77783af0f9f2e83f6
-
Filesize
6KB
MD5a6afec8b1142de0333e447f2125dbc85
SHA10813d8f10337bb24481bc288b703e50b532ca862
SHA25670fc263f70de173d038fc91bf7b72d4f3b6d05d810e256c85cffa32efe8cbac1
SHA51291579aa6aed3d738f968c2a1e52f4cd5c389c85c2a8b1775c59a7d3dad0b28192468f7f0c73882006e642a48d298e7ad059314bd9d8cd7ca46ca6a24184e791f
-
Filesize
6KB
MD52a88e541fb0bfcabaa0ae4158a79d126
SHA139a3a2b4e4c69501b9c5a471a0ffc72216380668
SHA2567688c3809caf942db327bd0697c704798b67389dc52a27aa975ed23bfc31a461
SHA512c28d1c26f1e7f35e77e499a1df107f858e51135f5855eb02d8847c367a5c5bc2e627b17d9c9118be88f868ffe178d4c96b40c1ac8d2eb29fdf9d69023aad4f56
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
75KB
MD55b5b6d2a93c08ad770ded764d79e1d10
SHA146df45a3f4efe442f07f1151840a3adf59c5db50
SHA2569d895fb6e70c9e5d11a7d8bd90644d577e2a68a55ad03aba2f6a69188a4ee60f
SHA512935ad03db7ae8629b7150fd47cf5f69177fd7cf026ad572d10d4cb65c56ad2e92987d1f90a5ad340b79806237eedae5529aacce119290f85f306eca78b58a699
-
Filesize
150KB
MD520bf8684e26950d9332c5cb4a4c096c0
SHA1515c76c65de5b4578e92abd7225d8c7f80a69cd4
SHA256785be66b8f55809f54440fa33cc2a978471c615d6180b45e97dbdc768bc195e7
SHA5128dad0ca645166f617872acffb2ce5091a92b5a8c9ff481a1d3240a9d60442bc930b2a58a65ab8c9dd6324274d52e917af41b6d2430bd0fd0ae4a770ee8352837
-
Filesize
1KB
MD58a851a7e4152db15520c643279d121a3
SHA1c38472b57d215913cea7e55dd97dd631cc289f33
SHA256d2a4ad7f7da3fd55ee2ab854d32188e723354be7785f8dbffc62dd5295a7b953
SHA512de6ec8ce793b8b904445985e6f49e63292225fe5506787c60c000d65c2c8c24ee86fb1f7f5ca27d5fc004c332c48ed2abd2abac5247dfc329891d8e9cdccd5c3