Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Bot Communication Details:
- Server DNS Name: apotheke-stiepel.com Service Port: 80 Signature Name: Trojan.TeslaCrypt
- Direction Command User-Agent Host Connection Pragma
- GET /tmp/misc.php?C11C3B537C7D807D855777DB654F6A0BDC1591D647A14248AAA4E20F179A91CC2C
- CDBDE434B01781911FA635784514AAB62D4170DF3C21CFEABD6267274BE93AFE6105571E31C0A
- 3F06C4123D7E295E92D5FCB0D8ABFEFC426C3306BF4B0FFB78BFDAA459739683A5271F9229605
- 7426B147C4E97BEC4E3DC9A8AA8FF59BC8B17B6CD31261628F39EDF335A52E68DFB4EF2EDA48A
- F2D2C167C54BFF8EDF6010BCAB3DC95525DD29FA65F853576EC0E681E27BAE7A21A69E74048DF
- 5C89377C521324C6719C7116EF1CEF0DB8484EE4F07AECB845DB8FB81F2FA8AA14F10BDBC99BD
- 49A60BBDF83417106A0D1568F7E11835FC51442D97B633E2DF8AADC00DC035CA69D949A619F98
- D202C67130EA12CD9D7DC8A5D75852BAE0B21BB5F9434F93419D26496D608F3D9743896BB0F00
- C2CC0AF2F1D2702700CABD29065CC05A9779A4C66416AEBC3E67808542F930534B61AE3F808C5
- AB5633B016EDFD83AC0F94 HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko apotheke-stiepel.com Keep-Alive
- GET /tmp/misc.php?572A56481F78D91A71F483FAC3626A6F3F0B199F77247528100DF8D9FB4CBD158E
- BD9497F2B1EDDF97B66305AF836A15BFE7901D398BA1ADEA745BB88F4B4C2D71FDEAB1AA019AF
- 9A37F7E8B1F6BD99597AA53B1922D67FF6FDE3E5C3C740A2FC47EF3F3B1A5D6A665F0CB44DEC8
- 60DC3927DC27FA84E55C9DB4F1CDD48426281322B32C98B97E673668F8F882E5F0EE8B30D7B0F
- 0EC773C56AA20784A1C69A0576AFCDE80C5A0A37558533541801B8685CED94DF94C18D8A9630F
- E57EC9497F67E677FE56C8847B7D999A3D0F503E813A0A2D421CCBB0F83651FFB681D3D8FC231
- B2928C2C7036183AEADF90BB3965297ADAD041F68CE543A79118915ED6EF72D55633A57934EF8
- EB9A5DA3E1FE5863F7208C52BD9BB8958BCA4B099315FFCAF873395A915D9D89BFEBCD3AAEC28
- 52F44183B63D1E173A28E91F96C432632987744191699096A6CB81CDEDB8FFBC2A3371273794D
- 308CCD62AA630BB553512B HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko apotheke-stiepel.com Keep-Alive
- GET /tmp/misc.php?D75E24DAF74403E668692C761F1277D3DEE05B23699A462E770EF7C2B412992CF5
- 79C27ED71DDFF27867BA8FE680524E9DC1B12FA8A608C8E3C714A816B5B6ECB39828673488886
- EDD684BB273BD5EE7FA6879A277F0ED2BCFFBAA66BD0EC300BB314DFB89A428EA39102CBE12A8
- 5690DB42544535A414366FFF6475337D8827FA5E03CCCCC178BF2D1E4CEB5CF2D983F4CE37903
- A867E050EDD8AB2663B433D5366DD07CDB93063457352CC78B1D963808544AE0B2FA25C22729A
- AAFA1A675B2AB24793ECF5FFDB44C2DF35303DDC11F60C961E92F7E05C60D8C3AABE63EF88C31
- F619BC083B6192D4E67006512603847927A299AA1E205B0722E6F577D6772FEBB773675FFB634
- 419B548E84D34B69CC48EABAB159BA3CCE08D47E04E061E3E0F289E104B86DC1227513A7F0026
- 7FFB40A26D9F8B2D029418D54DFCE65F971E9818E24B4511F3627FBD8B95CD49B600E36A22736
- 183A6B341C90EC4BB2CD03 HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko apotheke-stiepel.com Keep-Alive
- Server DNS Name: leboudoirdesbrunettes.com Service Port: 80 Signature Name: Trojan.TeslaCrypt
- Direction Command User-Agent Host Connection Pragma
- GET /wp-content/uploads/misc.php?572A56481F78D91A71F483FAC3626A6F3F0B199F77247528100
- DF8D9FB4CBD158EBD9497F2B1EDDF97B66305AF836A15BFE7901D398BA1ADEA745BB88F4B4C2D
- 71FDEAB1AA019AF9A37F7E8B1F6BD99597AA53B1922D67FF6FDE3E5C3C740A2FC47EF3F3B1A5D
- 6A665F0CB44DEC860DC3927DC27FA84E55C9DB4F1CDD48426281322B32C98B97E673668F8F882
- E5F0EE8B30D7B0F0EC773C56AA20784A1C69A0576AFCDE80C5A0A37558533541801B8685CED94
- DF94C18D8A9630FE57EC9497F67E677FE56C8847B7D999A3D0F503E813A0A2D421CCBB0F83651
- FFB681D3D8FC231B2928C2C7036183AEADF90BB3965297ADAD041F68CE543A79118915ED6EF72
- D55633A57934EF8EB9A5DA3E1FE5863F7208C52BD9BB8958BCA4B099315FFCAA323B761D1D190
- E8CAB3E1442891A31A1DC476B04BCA261904E95C497043794C841EA9578FCE15497BCB559670C
- 379AB137012A649B0BCDAA5CA14762D69939C HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko leboudoirdesbrunettes.com Keep-Alive
- GET /wp-content/uploads/misc.php?C11C3B537C7D807D855777DB654F6A0BDC1591D647A14248AAA
- 4E20F179A91CC2CCDBDE434B01781911FA635784514AAB62D4170DF3C21CFEABD6267274BE93A
- FE6105571E31C0A3F06C4123D7E295E92D5FCB0D8ABFEFC426C3306BF4B0FFB78BFDAA4597396
- 83A5271F92296057426B147C4E97BEC4E3DC9A8AA8FF59BC8B17B6CD31261628F39EDF335A52E
- 68DFB4EF2EDA48AF2D2C167C54BFF8EDF6010BCAB3DC95525DD29FA65F853576EC0E681E27BAE
- 7A21A69E74048DF5C89377C521324C6719C7116EF1CEF0DB8484EE4F07AECB845DB8FB81F2FA8
- AA14F10BDBC99BD49A60BBDF83417106A0D1568F7E11835FC51442D97B633E2DF8AADC00DC035
- CA69D949A619F98D202C67130EA12CD9D7DC8A5D75852BAE0B21BB5F9434F93608462E7D7FABD
- 7E61E72BE32036A170D9974292B0C8638664073D4E68ED2EF2DA35B8E0E10E4F55DAEE4C59C75
- 618C65EF8CB9B0FF1D4E457F18EE7DA2B2060 HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko leboudoirdesbrunettes.com Keep-Alive
- GET /wp-content/uploads/misc.php?D75E24DAF74403E668692C761F1277D3DEE05B23699A462E770
- EF7C2B412992CF579C27ED71DDFF27867BA8FE680524E9DC1B12FA8A608C8E3C714A816B5B6EC
- B39828673488886EDD684BB273BD5EE7FA6879A277F0ED2BCFFBAA66BD0EC300BB314DFB89A42
- 8EA39102CBE12A85690DB42544535A414366FFF6475337D8827FA5E03CCCCC178BF2D1E4CEB5C
- F2D983F4CE37903A867E050EDD8AB2663B433D5366DD07CDB93063457352CC78B1D963808544A
- E0B2FA25C22729AAAFA1A675B2AB24793ECF5FFDB44C2DF35303DDC11F60C961E92F7E05C60D8
- C3AABE63EF88C31F619BC083B6192D4E67006512603847927A299AA1E205B0722E6F577D6772F
- EBB773675FFB634419B548E84D34B69CC48EABAB159BA3CCE08D47E04E061E34764A023F2D2D6
- 64607F1590B855E6D4264C0E8440CECCA7EFDAC7F93269C7A3682C2E784DF76277ECD19B7DB16
- A7BB6CE6881215579872C8BD570CE43C678BC HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko leboudoirdesbrunettes.com Keep-Alive
- Server DNS Name: myexternalip.com Service Port: 80 Signature Name: Trojan.TeslaCrypt
- Direction Command User-Agent Host Connection Pragma
- GET /raw HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko myexternalip.com
- GET /raw HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko myexternalip.com
- Server DNS Name: regiefernando.me Service Port: 80 Signature Name: Trojan.TeslaCrypt
- Direction Command User-Agent Host Connection Pragma
- GET /images/slideshow/sysmisc.php?C11C3B537C7D807D855777DB654F6A0BDC1591D647A14248AA
- A4E20F179A91CC2CCDBDE434B01781911FA635784514AAB62D4170DF3C21CFEABD6267274BE93
- AFE6105571E31C0A3F06C4123D7E295E92D5FCB0D8ABFEFC426C3306BF4B0FFB78BFDAA459739
- 683A5271F92296057426B147C4E97BEC4E3DC9A8AA8FF59BC8B17B6CD31261628F39EDF335A52
- E68DFB4EF2EDA48AF2D2C167C54BFF8EDF6010BCAB3DC95525DD29FA65F853576EC0E681E27BA
- E7A21A69E74048DF5C89377C521324C6719C7116EF1CEF0DB8484EE4F07AECB845DB8FB81F2FA
- 8AA14F10BDBC99BD49A60BBDF83417106A0D1568F7E11835FC51442D97B633E2DF8AADC00DC03
- 5CA69D949A619F98D202C67130EA12CD9D7DC8A5D75852BAE0B21BB5F9434F9358ACC50820886
- D3CB707006675EC6EDE50EDFAFD1DFA022DCC45B4E04A175B4506B811A0C6E5C172DF55C96E66
- 29C6D5B3A55607AF46CA96C08D2369301A1B9E HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko regiefernando.me Keep-Alive
- GET /images/slideshow/sysmisc.php?D75E24DAF74403E668692C761F1277D3DEE05B23699A462E77
- 0EF7C2B412992CF579C27ED71DDFF27867BA8FE680524E9DC1B12FA8A608C8E3C714A816B5B6E
- CB39828673488886EDD684BB273BD5EE7FA6879A277F0ED2BCFFBAA66BD0EC300BB314DFB89A4
- 28EA39102CBE12A85690DB42544535A414366FFF6475337D8827FA5E03CCCCC178BF2D1E4CEB5
- CF2D983F4CE37903A867E050EDD8AB2663B433D5366DD07CDB93063457352CC78B1D963808544
- AE0B2FA25C22729AAAFA1A675B2AB24793ECF5FFDB44C2DF35303DDC11F60C961E92F7E05C60D
- 8C3AABE63EF88C31F619BC083B6192D4E67006512603847927A299AA1E205B0722E6F577D6772
- FEBB773675FFB634419B548E84D34B69CC48EABAB159BA3CCE08D47E04E061E3715A2A1665459
- 77BAC3040E4D08E3C3EDCBE49316159727545C42873003046D051792BEDD3DAE13BD786C5C82B
- 93F04C03C3E4C9AE4766346625AB28BA15E48E HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko regiefernando.me Keep-Alive
- Server DNS Name: schriebershof.de Service Port: 80 Signature Name: Trojan.TeslaCrypt
- Direction Command User-Agent Host Connection Pragma
- GET /tmp/misc.php?C11C3B537C7D807D855777DB654F6A0BDC1591D647A14248AAA4E20F179A91CC2C
- CDBDE434B01781911FA635784514AAB62D4170DF3C21CFEABD6267274BE93AFE6105571E31C0A
- 3F06C4123D7E295E92D5FCB0D8ABFEFC426C3306BF4B0FFB78BFDAA459739683A5271F9229605
- 7426B147C4E97BEC4E3DC9A8AA8FF59BC8B17B6CD31261628F39EDF335A52E68DFB4EF2EDA48A
- F2D2C167C54BFF8EDF6010BCAB3DC95525DD29FA65F853576EC0E681E27BAE7A21A69E74048DF
- 5C89377C521324C6719C7116EF1CEF0DB8484EE4F07AECB845DB8FB81F2FA8AA14F10BDBC99BD
- 49A60BBDF83417106A0D1568F7E11835FC51442D97B633E2DF8AADC00DC035CA69D949A619F98
- D202C67130EA12CD9D7DC8A5D75852BAE0B21BB5F9434F931ABA777D85BCE4587831E4F30B4E9
- 7EFC9E059A09F63E35D1F217B98E20ABF42858D57234306425B2E7BE3355035CB415A30B71097
- DEA1BDE6CF7405DADC1379 HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko schriebershof.de Keep-Alive
- GET /tmp/misc.php?D75E24DAF74403E668692C761F1277D3DEE05B23699A462E770EF7C2B412992CF5
- 79C27ED71DDFF27867BA8FE680524E9DC1B12FA8A608C8E3C714A816B5B6ECB39828673488886
- EDD684BB273BD5EE7FA6879A277F0ED2BCFFBAA66BD0EC300BB314DFB89A428EA39102CBE12A8
- 5690DB42544535A414366FFF6475337D8827FA5E03CCCCC178BF2D1E4CEB5CF2D983F4CE37903
- A867E050EDD8AB2663B433D5366DD07CDB93063457352CC78B1D963808544AE0B2FA25C22729A
- AAFA1A675B2AB24793ECF5FFDB44C2DF35303DDC11F60C961E92F7E05C60D8C3AABE63EF88C31
- F619BC083B6192D4E67006512603847927A299AA1E205B0722E6F577D6772FEBB773675FFB634
- 419B548E84D34B69CC48EABAB159BA3CCE08D47E04E061E3CE60098A9D0E1EC0A913E690C8AD5
- 74F3751CFB31D866987E554D48072BD0FE839B2EAB05A463A2456CED41CF35407C611165C3E85
- F0DE5739433E3537DF761D HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko schriebershof.de Keep-Alive
- Server DNS Name: woodenden.com Service Port: 80 Signature Name: Trojan.TeslaCrypt
- Direction Command User-Agent Host Connection Pragma
- GET /sysmisc.php?C11C3B537C7D807D855777DB654F6A0BDC1591D647A14248AAA4E20F179A91CC2CC
- DBDE434B01781911FA635784514AAB62D4170DF3C21CFEABD6267274BE93AFE6105571E31C0A3
- F06C4123D7E295E92D5FCB0D8ABFEFC426C3306BF4B0FFB78BFDAA459739683A5271F92296057
- 426B147C4E97BEC4E3DC9A8AA8FF59BC8B17B6CD31261628F39EDF335A52E68DFB4EF2EDA48AF
- 2D2C167C54BFF8EDF6010BCAB3DC95525DD29FA65F853576EC0E681E27BAE7A21A69E74048DF5
- C89377C521324C6719C7116EF1CEF0DB8484EE4F07AECB845DB8FB81F2FA8AA14F10BDBC99BD4
- 9A60BBDF83417106A0D1568F7E11835FC51442D97B633E2DF8AADC00DC035CA69D949A619F98D
- 202C67130EA12CD9D7DC8A5D75852BAE0B21BB5F9434F936BA028085EB42F08AB7F9F0C6708F2
- B1C07780E9B51A3543D3DC9434FB19E3E0658D925C2CC39288456432594B52BBFF HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko woodenden.com Keep-Alive
- GET /sysmisc.php?D75E24DAF74403E668692C761F1277D3DEE05B23699A462E770EF7C2B412992CF57
- 9C27ED71DDFF27867BA8FE680524E9DC1B12FA8A608C8E3C714A816B5B6ECB39828673488886E
- DD684BB273BD5EE7FA6879A277F0ED2BCFFBAA66BD0EC300BB314DFB89A428EA39102CBE12A85
- 690DB42544535A414366FFF6475337D8827FA5E03CCCCC178BF2D1E4CEB5CF2D983F4CE37903A
- 867E050EDD8AB2663B433D5366DD07CDB93063457352CC78B1D963808544AE0B2FA25C22729AA
- AFA1A675B2AB24793ECF5FFDB44C2DF35303DDC11F60C961E92F7E05C60D8C3AABE63EF88C31F
- 619BC083B6192D4E67006512603847927A299AA1E205B0722E6F577D6772FEBB773675FFB6344
- 19B548E84D34B69CC48EABAB159BA3CCE08D47E04E061E3DBE3FA33607B5B98A8AB3DA6EAF460
- 839BE1CADA38864B9DE1F2091F0CCB8C507FB8D3A80A2867E27161015EB4119FF8 HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko woodenden.com Keep-Alive
- Callback communication observed from VM:
- Server DNS Name: 199.16.199.3 Service Port: 80 Signature Name: Trojan.TeslaCrypt
- Direction Command User-Agent Host Connection Pragma
- GET /images/slideshow/sysmisc.php?D75E24DAF74403E668692C761F1277D3DEE05B23699A462E77
- 0EF7C2B412992CF579C27ED71DDFF27867BA8FE680524E9DC1B12FA8A608C8E3C714A816B5B6E
- CB39828673488886EDD684BB273BD5EE7FA6879A277F0ED2BCFFBAA66BD0EC300BB314DFB89A4
- 28EA39102CBE12A85690DB42544535A414366FFF6475337D8827FA5E03CCCCC178BF2D1E4CEB5
- CF2D983F4CE37903A867E050EDD8AB2663B433D5366DD07CDB93063457352CC78B1D963808544
- AE0B2FA25C22729AAAFA1A675B2AB24793ECF5FFDB44C2DF35303DDC11F60C961E92F7E05C60D
- 8C3AABE63EF88C31F619BC083B6192D4E67006512603847927A299AA1E205B0722E6F577D6772
- FEBB773675FFB634419B548E84D34B69CC48EABAB159BA3CCE08D47E04E061E3715A2A1665459
- 77BAC3040E4D08E3C3EDCBE49316159727545C42873003046D051792BEDD3DAE13BD786C5C82B
- 93F04C03C3E4C9AE4766346625AB28BA15E48E HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko regiefernando.me Keep-Alive
- GET /images/slideshow/sysmisc.php?C11C3B537C7D807D855777DB654F6A0BDC1591D647A14248AA
- A4E20F179A91CC2CCDBDE434B01781911FA635784514AAB62D4170DF3C21CFEABD6267274BE93
- AFE6105571E31C0A3F06C4123D7E295E92D5FCB0D8ABFEFC426C3306BF4B0FFB78BFDAA459739
- 683A5271F92296057426B147C4E97BEC4E3DC9A8AA8FF59BC8B17B6CD31261628F39EDF335A52
- E68DFB4EF2EDA48AF2D2C167C54BFF8EDF6010BCAB3DC95525DD29FA65F853576EC0E681E27BA
- E7A21A69E74048DF5C89377C521324C6719C7116EF1CEF0DB8484EE4F07AECB845DB8FB81F2FA
- 8AA14F10BDBC99BD49A60BBDF83417106A0D1568F7E11835FC51442D97B633E2DF8AADC00DC03
- 5CA69D949A619F98D202C67130EA12CD9D7DC8A5D75852BAE0B21BB5F9434F9358ACC50820886
- D3CB707006675EC6EDE50EDFAFD1DFA022DCC45B4E04A175B4506B811A0C6E5C172DF55C96E66
- 29C6D5B3A55607AF46CA96C08D2369301A1B9E HTTP/1.1 Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko regiefernando.me Keep-Alive
- Suspicious network behavior observed from VM:
- Download Source Headers
- GET
- /kldf/cachec50da2243ebb9d634cfad3427cafcc61/73.exe?1 HTTP/1.1
- Server
- Apache
- Host
- baneyconstruction.com
- Last-Modified
- Thu, 03 Dec 2015 09:50:03 GMT
- User-Agent
- Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0
- ETag
- "61c00-525fb509feb78"
- Accept
- text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
- Accept-Ranges
- bytes
- Accept-Language
- de,en-US;q=0.7,en;q=0.3
- Content-Length
- 400384
- Accept-Encoding
- gzip, deflate
- Keep-Alive
- timeout=5, max=100
- Connection
- keep-alive
- Connection
- Keep-Alive
- HTTP
- 1.1 200 OK
- Content-Type
- application/x-msdownload
- Date
- Thu, 03 Dec 2015 09:51:45 GMT
- OS Change Detail (version: 1.1290) | Items: 997 | OS Info: Microsoft Windows7 64-bit 6.1 sp1 15.0826 Top
- Type Mode/Class Details (Path/Message/Protocol/Hostname/Qtype/ListenPort etc.) Process ID Parent ID File Size
- Analysis
- Malware
- Application
- 3 Repeated items skipped
- Config Update
- Uac
- Service
- Multimedia Class Scheduler
- Process
- Started
- C:\Users\Administrator\AppData\Local\Temp\73.exe
- Parentname: C:\Windows\explorer.exe
- Command Line: "C:\Users\Administrator\AppData\Local\Temp\73.exe"
- MD5: 446071be407efeb4e0d7c83bb504774a
- SHA1: ef06d2b504ce08b2d6570ca4b4f923a1ad428f7a
- 2252 1092 400384
- Uac
- Service
- Windows Error Reporting Service
- File
- Failed
- C:\Windows\System32\WOW64LOG.DLL
- 2252
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 2252
- File
- Failed
- C:\Users\ADMINI~1\AppData\Local\Temp\A.CONFIG
- 2252
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: kernel32.dll
- 2252
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: kernel32.dll
- 2252
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: kernel32.dll
- 2252
- File
- Failed
- C:\Users\ADMINI~1\AppData\Local\Temp\A
- 2252
- File
- Failed
- C:\Users\Administrator\AppData\Local\Temp\MPR.DLL
- 2252
- Mutex
- \Sessions\1\BaseNamedObjects\DBWinMutex
- 2252
- File
- Failed
- C:\Windows\SysWOW64\RPCSS.DLL
- 2252
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: kernel32.dll
- 2252
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: kernel32.dll
- 2252
- 5 Repeated items skipped
- API Call
- API Name: GetSystemDirectoryW Address: 0x7732f96e
- Params: [0x77396420, 260]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: kernel32.dll
- 2252
- Mutex
- \Sessions\1\BaseNamedObjects\AMResourceMutex3
- 2252
- File
- Failed
- C:\Users\Administrator\AppData\Local\Temp\DWMAPI.DLL
- 2252
- File
- Failed
- C:\Users\Administrator\AppData\Local\Temp\MSVFW32.DLL
- 2252
- File
- Failed
- C:\Users\Administrator\AppData\Local\Temp\PROFAPI.DLL
- 2252
- API Call
- API Name: NtAdjustPrivilegesToken Address: 0x7584ca4f
- Params: [SeDebugPrivilege, Enabled]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: ntdll.dll
- 2252
- API Call
- API Name: GetTokenInformation Address: 0x0041e934
- Params: [0x1bc, 0x19]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: advapi32.dll
- 2252
- API Call
- API Name: GetTokenInformation Address: 0x0041e976
- Params: [0x1bc, 0x19]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: advapi32.dll
- 2252
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: kernel32.dll
- 2252
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: kernel32.dll
- 2252
- 4 Repeated items skipped
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\73.EXE
- 2252
- File
- Created
- C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2252
- Malicious Alert
- Malicious Directory
- Message: Executable file created in suspicious location Detail: Process creating executable file in suspicious location
- Malicious Alert
- Misc Anom
- Message: Generic Trojan Behavior Detail: Generic Trojan Behavior
- File
- Open
- C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2252
- File
- Date Change
- C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2252 400384
- File
- Close
- C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 446071be407efeb4e0d7c83bb504774a
- SHA1: ef06d2b504ce08b2d6570ca4b4f923a1ad428f7a
- 2252 400384
- Process
- Started
- C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Parentname: C:\Users\Administrator\AppData\Local\Temp\73.exe
- Command Line: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 446071be407efeb4e0d7c83bb504774a
- SHA1: ef06d2b504ce08b2d6570ca4b4f923a1ad428f7a
- 328 2252 400384
- Malicious Alert
- Process Cloned
- Message: Process clones and starts itself Detail: Process clones and starts itself
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\UI\SWDRM.DLL
- 2252
- API Call
- API Name: ShellExecuteW Address: 0x0041f88d
- Params: [0x0, NULL, C:\Windows\system32\cmd.exe, /c DEL C:\Users\ADMINI~1\AppData\Local\Temp\73.exe, NULL, 0]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: Shell32.dll
- 2252
- Malicious Alert
- Generic Anomalous Activity
- Message: Hidden ShellExecute call made Detail: Hidden ShellExecute call made
- File
- Failed
- C:\Users\Administrator\AppData\Local\Temp\PROPSYS.DLL
- 2252
- File
- Failed
- C:\Windows\System32\WOW64LOG.DLL
- 328
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Local\Microsoft\Windows\Caches
- 2252
- File
- Failed
- C:\Users\Administrator\AppData\Local\Temp\NTMARTA.DLL
- 2252
- File
- Failed
- C:\Users\Administrator\AppData\Local\Temp\CRYPTSP.DLL
- 2252
- File
- Failed
- C:\Users\Administrator\AppData\Local\Temp\RPCRTREMOTE.DLL
- 2252
- API Call
- API Name: Sleep Address: 0x7760d98d
- Params: [60000]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: kernel32.dll
- 2252
- File
- Failed
- C:\Users\Administrator\AppData\Local\Temp\SECUR32.DLL
- 2252
- Mutex
- \Sessions\1\BaseNamedObjects\ZonesCacheCounterMutex
- 2252
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"ProxyBypass"
- 2252
- Regkey
- Deleteval
- \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"P
- roxyBypass"
- 2252
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"IntranetName"
- 2252
- Regkey
- Deleteval
- \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"I
- ntranetName"
- 2252
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000000
- 2252
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001
- 2252
- Mutex
- \Sessions\1\BaseNamedObjects\ZonesLockedCacheCounterMutex
- 2252
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"ProxyBypass"
- 2252
- Regkey
- Deleteval
- \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"P
- roxyBypass"
- 2252
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"IntranetName"
- 2252
- Regkey
- Deleteval
- \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"I
- ntranetName"
- 2252
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000000
- 2252
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001
- 2252
- Folder
- Open
- C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
- 2252
- Process
- Started
- C:\Windows\SysWOW64\cmd.exe
- Parentname: C:\Users\Administrator\AppData\Local\Temp\73.exe
- Command Line: "C:\Windows\system32\cmd.exe" /c DEL C:\Users\ADMINI~1\AppData\Local\Temp\73.exe
- MD5: ad7b9c14083b52bc532fba5948342b98
- SHA1: ee8cbf12d87c4d388f09b4f69bed2e91682920b5
- 1748 2252 302592
- File
- Failed
- C:\Windows\SysWOW64\UI\SWDRM.DLL
- 2252
- API Call
- API Name: GetSystemDirectoryW Address: 0x77179cce
- Params: [0x2c1f6cc, 260]
- Imagepath: C:\Users\Administrator\AppData\Local\Temp\73.exe DLL Name: kernel32.dll
- 2252
- File
- Failed
- C:\Windows\System32\WOW64LOG.DLL
- 1748
- Process
- Terminated
- C:\Users\Administrator\AppData\Local\Temp\73.exe
- Parentname: C:\Windows\explorer.exe
- Command Line: N/A
- 2252 1092
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 1748
- File
- Delete
- C:\Users\Administrator\AppData\Local\Temp\73.exe
- MD5: 446071be407efeb4e0d7c83bb504774a
- SHA1: ef06d2b504ce08b2d6570ca4b4f923a1ad428f7a
- 1748 400384
- Malicious Alert
- Self Delete
- Message: Self deletion using batch file Detail: Process deleting itself using a batch file
- Malicious Alert
- Self Delete
- Message: Root process deleted Detail: Process deleting itself
- Process
- Terminated
- C:\Windows\SysWOW64\cmd.exe
- Parentname: C:\Users\Administrator\AppData\Local\Temp\73.exe
- Command Line: N/A
- 1748 2252
- File
- Failed
- C:\Users\ADMINI~1\AppData\Local\Temp\A.CONFIG
- 328
- File
- Failed
- C:\Users\ADMINI~1\AppData\Local\Temp\A
- 328
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\MPR.DLL
- 328
- Mutex
- \Sessions\1\BaseNamedObjects\DBWinMutex
- 328
- File
- Failed
- C:\Windows\SysWOW64\RPCSS.DLL
- 328
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- 7 Repeated items skipped
- API Call
- API Name: GetSystemDirectoryW Address: 0x7732f96e
- Params: [0x77396420, 260]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- Mutex
- \Sessions\1\BaseNamedObjects\AMResourceMutex3
- 328
- API Call
- API Name: NtAdjustPrivilegesToken Address: 0x7584ca4f
- Params: [SeDebugPrivilege, Enabled]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: ntdll.dll
- 328
- API Call
- API Name: GetTokenInformation Address: 0x0041e934
- Params: [0x1bc, 0x19]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: advapi32.dll
- 328
- API Call
- API Name: GetTokenInformation Address: 0x0041e976
- Params: [0x1bc, 0x19]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: advapi32.dll
- 328
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\DWMAPI.DLL
- 328
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\MSVFW32.DLL
- 328
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\PROFAPI.DLL
- 328
- Mutex
- \Sessions\1\BaseNamedObjects\78456214324124
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\BCDEDIT.EXE
- 328
- File
- Failed
- C:\Users\ADMINI~1\AppData\Local\Temp\bcdedit.exe
- 328
- Process
- Started
- C:\Windows\System32\bcdedit.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: bcdedit.exe /set {current} bootems off
- MD5: 780836bb63852990382df27de7fefd20
- SHA1: 6feedabbc6576a4bdc68935677b7a01f130b98f2
- 848 328 346112
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 848
- Regkey
- Added
- \REGISTRY\MACHINE\BCD00000000\Objects\{92102341-c2c1-11e2-b94a-fece50bdaf86}\Elements\16000020
- 848
- Regkey
- Setval
- \REGISTRY\MACHINE\BCD00000000\Objects\{92102341-c2c1-11e2-b94a-fece50bdaf86}\Elements\16000020\"Elem
- ent" = 00
- 848
- Process
- Terminated
- C:\Windows\System32\bcdedit.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: N/A
- 848 328
- API Call
- API Name: Sleep Address: 0x0041df48
- Params: [1000]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- Process
- Started
- C:\Windows\System32\bcdedit.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: bcdedit.exe /set {current} advancedoptions off
- MD5: 780836bb63852990382df27de7fefd20
- SHA1: 6feedabbc6576a4bdc68935677b7a01f130b98f2
- 1756 328 346112
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 1756
- Regkey
- Added
- \REGISTRY\MACHINE\BCD00000000\Objects\{92102341-c2c1-11e2-b94a-fece50bdaf86}\Elements\16000040
- 1756
- Regkey
- Setval
- \REGISTRY\MACHINE\BCD00000000\Objects\{92102341-c2c1-11e2-b94a-fece50bdaf86}\Elements\16000040\"Elem
- ent" = 00
- 1756
- Process
- Terminated
- C:\Windows\System32\bcdedit.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: N/A
- 1756 328
- API Call
- API Name: Sleep Address: 0x0041df48
- Params: [1000]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- Process
- Started
- C:\Windows\System32\bcdedit.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: bcdedit.exe /set {current} optionsedit off
- MD5: 780836bb63852990382df27de7fefd20
- SHA1: 6feedabbc6576a4bdc68935677b7a01f130b98f2
- 3048 328 346112
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 3048
- Regkey
- Added
- \REGISTRY\MACHINE\BCD00000000\Objects\{92102341-c2c1-11e2-b94a-fece50bdaf86}\Elements\16000041
- 3048
- Regkey
- Setval
- \REGISTRY\MACHINE\BCD00000000\Objects\{92102341-c2c1-11e2-b94a-fece50bdaf86}\Elements\16000041\"Elem
- ent" = 00
- 3048
- Process
- Terminated
- C:\Windows\System32\bcdedit.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: N/A
- 3048 328
- API Call
- API Name: Sleep Address: 0x0041df48
- Params: [1000]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- Process
- Started
- C:\Windows\System32\bcdedit.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: bcdedit.exe /set {current} bootstatuspolicy IgnoreAllFailures
- MD5: 780836bb63852990382df27de7fefd20
- SHA1: 6feedabbc6576a4bdc68935677b7a01f130b98f2
- 2604 328 346112
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 2604
- Regkey
- Added
- \REGISTRY\MACHINE\BCD00000000\Objects\{92102341-c2c1-11e2-b94a-fece50bdaf86}\Elements\250000e0
- 2604
- Regkey
- Setval
- \REGISTRY\MACHINE\BCD00000000\Objects\{92102341-c2c1-11e2-b94a-fece50bdaf86}\Elements\250000e0\"Elem
- ent" = 01 00 00 00 00 00 00 00
- 2604
- Process
- Terminated
- C:\Windows\System32\bcdedit.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: N/A
- 2604 328
- API Call
- API Name: Sleep Address: 0x0041df48
- Params: [1000]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- Process
- Started
- C:\Windows\System32\bcdedit.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: bcdedit.exe /set {current} recoveryenabled off
- MD5: 780836bb63852990382df27de7fefd20
- SHA1: 6feedabbc6576a4bdc68935677b7a01f130b98f2
- 2548 328 346112
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 2548
- Regkey
- Setval
- \REGISTRY\MACHINE\BCD00000000\Objects\{92102341-c2c1-11e2-b94a-fece50bdaf86}\Elements\16000009\"Elem
- ent" = 00
- 2548
- Process
- Terminated
- C:\Windows\System32\bcdedit.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: N/A
- 2548 328
- API Call
- API Name: Sleep Address: 0x0041df48
- Params: [1000]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\zsys\
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\NETAPI32.DLL
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\NETUTILS.DLL
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\SRVCLI.DLL
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\WKSCLI.DLL
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\SCHEDCLI.DLL
- 328
- API Call
- API Name: GetComputerNameExW Address: 0x76e7ce4b
- Params: [0, 0x76f10a6c, 0x76f101c0]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- API Call
- API Name: CryptAcquireContextW Address: 0x0041baf8
- Params: [NULL, NULL, 1, 4026531840]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: advapi32.dll
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\CRYPTSP.DLL
- 328
- API Call
- API Name: Process32First Address: 0x0041bda4
- Params: [0x208, 0x18d448]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- Malicious Alert
- Generic Anomalous Activity
- Message: Enumerating running processes Detail: Process is enumerating running processes
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\zsys\"ID" = e0 e6 ba c4 cd a3
- 3b b5
- 328
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\E0E6BAC4CDA33BB5
- 328
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\E0E6BAC4CDA33BB5\"data" = 31 3
- 2 45 53 37 6e 48 6d 4c 58 35 76 75 4a 38 33 62 70 36 33 45 4d 66 6d 42 4d 74 50 4d 78 57 52 51 51
- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 3d cc a6 85 98 f4 57 66 ea b1 ca 98 a2 67 20 6d af
- 5d 4f 5e 07 1e 38 8d 14 5a c3 24 34 66 c6 19 05 d5 02 34 fa 06 f0 c3 d6 41 ec 60 82 be cf c8 ef 6
- 1 4a ae b0 e3 5a 15 69 19 0a 14 b7 9b fb 96 00 00 33 37 34 43 34 34 45 39 44 39 37 35 35 46 31 36
- 44 45 37 39 39 37 35 38 30 41 30 45 32 31 38 32 34 37 43 42 41 30 37 46 36 34 36 44 35 39 33 36
- 31 45 39 39 35 33 46 35 37 31 43 39 39 42 44 41 39 37 33 34 33 33 37 44 38 34 34 45 35 42 44 45 3
- 9 31 37 36 31 34 32 45 41 33 45 41 45 33 35 42 32 34 42 35 44 37 33 34 45 31 46 46 37 33 31 33 38
- 37 34 32 30 43 39 38 39 36 45 34 45 34 38 44 00 00 00 00 04 47 b3 b7 5e 96 25 0e e6 c3 17 17 24
- 00 80 69 d2 b2 a9 7d ac 59 44 25 3f c3 ca 7a 8b 75 b2 84 6b 91 cd 9a 15 25 5e 8c 57 cb 21 1b c2 4
- 9 db 51 85 52 5e 61 05 17 84 ee 4a c7 14 4b 33 d1 45 59 75 00 00 00 00 00 00 00 00 db 4d 61 56 00
- 00 00 00
- 328
- Regkey
- Setval
- \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\"EnableLinkedConnections
- " = 0x00000001
- 328
- Malicious Alert
- Misc Anom
- Message: Process deleting itself Detail: Process deleting itself in any manor
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Run\"Acronis" = C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- API Call
- API Name: CryptAcquireContextA Address: 0x00412c1f
- Params: [NULL, NULL, 1, 4026531840]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: advapi32.dll
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\PROPSYS.DLL
- 328
- API Call
- API Name: GetSystemDirectoryW Address: 0x75f92cf2
- Params: [0x2aafa60, 260]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- API Call
- API Name: GetVolumeNameForVolumeMountPointW Address: 0x76220aaa
- Params: [NULL, \\?\Volume{a4dcb962-c2b8-11e2-8b83-806e6f6e6963}\]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- API Call
- API Name: GetSystemDirectoryW Address: 0x743b56d4
- Params: [0x2aaec30, 260]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- API Call
- API Name: GetSystemDirectoryW Address: 0x743b56d4
- Params: [0x2aaebf8, 260]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- API Call
- API Name: GetVolumeNameForVolumeMountPointW Address: 0x76220aaa
- Params: [NULL, \\?\Volume{a4dcb962-c2b8-11e2-8b83-806e6f6e6963}\]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Failed
- C:\Users\ADMINI~1\AppData\Local\Temp\VSSADMIN.EXE
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Local\Microsoft\Windows\Caches
- 328
- API Call
- API Name: GetSystemDirectoryW Address: 0x77179cce
- Params: [0x2d1f6cc, 260]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\NTMARTA.DLL
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\SECUR32.DLL
- 328
- Mutex
- \Sessions\1\BaseNamedObjects\ZonesCacheCounterMutex
- 328
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"ProxyBypass"
- 328
- Regkey
- Deleteval
- \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"P
- roxyBypass"
- 328
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"IntranetName"
- 328
- Regkey
- Deleteval
- \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"I
- ntranetName"
- 328
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000000
- 328
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001
- 328
- Mutex
- \Sessions\1\BaseNamedObjects\ZonesLockedCacheCounterMutex
- 328
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"ProxyBypass"
- 328
- Regkey
- Deleteval
- \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"P
- roxyBypass"
- 328
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"IntranetName"
- 328
- Regkey
- Deleteval
- \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"I
- ntranetName"
- 328
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000000
- 328
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001
- 328
- Folder
- Open
- C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
- 328
- File
- Created
- C:\Users\Administrator\Documents\recover_file_brvwbqpck.txt
- 328
- File
- Close
- C:\Users\Administrator\Documents\recover_file_brvwbqpck.txt
- MD5: ea9cb64cffd1adb09d964c1e202861d9
- SHA1: fe160fe8991773f9ca44999b34a398a5b32b0766
- 328 254
- Process
- Started
- C:\Windows\System32\vssadmin.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
- MD5: e23dd973e1444684eb36365deff1fc74
- SHA1: 09fafeb1b8404124b33c44440be7e3fdb6105f8a
- 2336 328 167424
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL
- 328
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Open
- C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
- 328 128
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 4
- 328
- Process
- Opened
- Target: C:\Windows\System32\smss.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 264
- 328
- Process
- Opened
- Target: C:\Windows\System32\csrss.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 348
- 328
- Process
- Opened
- Target: C:\Windows\System32\wininit.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 376
- 328
- Process
- Opened
- Target: C:\Windows\System32\csrss.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 396
- 328
- Process
- Opened
- Target: C:\Windows\System32\winlogon.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 432
- 328
- Process
- Opened
- Target: C:\Windows\System32\services.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 476
- 328
- Process
- Opened
- Target: C:\Windows\System32\lsass.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 492
- 328
- Process
- Opened
- Target: C:\Windows\System32\lsm.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 500
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 612
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 684
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 756
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 828
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 868
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 904
- 328
- Process
- Opened
- Target: C:\Windows\System32\spoolsv.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 968
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1064
- 328
- Process
- Opened
- Target: C:\Windows\System32\taskhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1164
- 328
- Process
- Opened
- Target: C:\Windows\System32\dwm.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1244
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1340
- 328
- Process
- Opened
- Target: C:\Windows\explorer.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1092
- 328
- Process
- Opened
- Target: C:\Windows\System32\wbem\WmiPrvSE.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 940
- 328
- Process
- Opened
- Target: C:\Program Files\Internet Explorer\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1976
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 384
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1460
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1312
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer9\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1324
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer9\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1852
- 328
- Process
- Opened
- Target: C:\Windows\System32\wbem\WmiPrvSE.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2056
- 328
- Process
- Opened
- Target: C:\Windows\System32\taskhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2220
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2456
- 328
- Process
- Opened
- Target: C:\Windows\System32\vssadmin.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2336
- 328
- Process
- Opened
- Target: C:\Windows\System32\conhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2168
- 328
- API Call
- API Name: GetVolumeNameForVolumeMountPointW Address: 0x76220e20
- Params: [NULL, \\?\Volume{a4dcb965-c2b8-11e2-8b83-806e6f6e6963}\]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- API Call
- API Name: GetVolumeNameForVolumeMountPointW Address: 0x76220e20
- Params: [NULL, \\?\Volume{a4dcb962-c2b8-11e2-8b83-806e6f6e6963}\]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\IPHLPAPI.DLL
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\WINNSI.DLL
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 4
- 328
- Process
- Opened
- Target: C:\Windows\System32\smss.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 264
- 328
- Process
- Opened
- Target: C:\Windows\System32\csrss.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 348
- 328
- Process
- Opened
- Target: C:\Windows\System32\wininit.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 376
- 328
- Process
- Opened
- Target: C:\Windows\System32\csrss.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 396
- 328
- Process
- Opened
- Target: C:\Windows\System32\winlogon.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 432
- 328
- Process
- Opened
- Target: C:\Windows\System32\services.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 476
- 328
- Process
- Opened
- Target: C:\Windows\System32\lsass.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 492
- 328
- Process
- Opened
- Target: C:\Windows\System32\lsm.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 500
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 612
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 684
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 756
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 828
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 868
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 904
- 328
- Process
- Opened
- Target: C:\Windows\System32\spoolsv.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 968
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1064
- 328
- Process
- Opened
- Target: C:\Windows\System32\taskhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1164
- 328
- Process
- Opened
- Target: C:\Windows\System32\dwm.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1244
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1340
- 328
- Process
- Opened
- Target: C:\Windows\explorer.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1092
- 328
- Process
- Opened
- Target: C:\Windows\System32\wbem\WmiPrvSE.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 940
- 328
- Process
- Opened
- Target: C:\Program Files\Internet Explorer\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1976
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 384
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1460
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1312
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer9\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1324
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer9\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1852
- 328
- Process
- Opened
- Target: C:\Windows\System32\wbem\WmiPrvSE.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2056
- 328
- Process
- Opened
- Target: C:\Windows\System32\taskhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2220
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2456
- 328
- Process
- Opened
- Target: C:\Windows\System32\vssadmin.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2336
- 328
- Process
- Opened
- Target: C:\Windows\System32\conhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2168
- 328
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\"ProxyEnable" = 0x00000000
- 328
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\"ProxyServer" = 10.0.0.2:8080
- 328
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\"ProxyOverride"
- 328
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\"AutoConfigURL"
- 328
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\"AutoDetect"
- 328
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\Connections\"SavedLegacySettings" = 46 00 00 00 21 00 00 00 09 00 00 00 0d 0
- 0 00 00 31 30 2e 30 2e 30 2e 32 3a 38 30 38 30 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00
- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 0a 00 00 42 00
- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
- 0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\DNSAPI.DLL
- 328
- File
- Find
- C:\*
- 328
- File
- Find
- C:\$Recycle.Bin\*
- 328
- File
- Created
- C:\$Recycle.Bin\S-1-5-21-2529703413-2662079939-3113469119-500\how_recover+sia.txt
- 328
- File
- Close
- C:\$Recycle.Bin\S-1-5-21-2529703413-2662079939-3113469119-500\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\5.0\Cache\Content\"CachePrefix" =
- 328
- File
- Failed
- C:\Users\Administrator
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Local
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files
- 328
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\5.0\Cache\Cookies\"CachePrefix" = Cookie:
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
- 328
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersi
- on\Internet Settings\5.0\Cache\History\"CachePrefix" = Visited:
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Local\Microsoft\Windows\History
- 328
- File
- Created
- C:\$Recycle.Bin\S-1-5-21-2529703413-2662079939-3113469119-500\how_recover+sia.html
- 328
- File
- Close
- C:\$Recycle.Bin\S-1-5-21-2529703413-2662079939-3113469119-500\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\$Recycle.Bin\how_recover+sia.txt
- 328
- File
- Close
- C:\$Recycle.Bin\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 2336
- File
- Created
- C:\$Recycle.Bin\how_recover+sia.html
- 328
- File
- Close
- C:\$Recycle.Bin\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 4
- 328
- Process
- Opened
- Target: C:\Windows\System32\smss.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 264
- 328
- Process
- Opened
- Target: C:\Windows\System32\csrss.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 348
- 328
- Process
- Opened
- Target: C:\Windows\System32\wininit.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 376
- 328
- Process
- Opened
- Target: C:\Windows\System32\csrss.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 396
- 328
- Process
- Opened
- Target: C:\Windows\System32\winlogon.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 432
- 328
- Process
- Opened
- Target: C:\Windows\System32\services.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 476
- 328
- Process
- Opened
- Target: C:\Windows\System32\lsass.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 492
- 328
- Process
- Opened
- Target: C:\Windows\System32\lsm.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 500
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 612
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 684
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 756
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 828
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 868
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 904
- 328
- Process
- Opened
- Target: C:\Windows\System32\spoolsv.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 968
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1064
- 328
- Process
- Opened
- Target: C:\Windows\System32\taskhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1164
- 328
- Process
- Opened
- Target: C:\Windows\System32\dwm.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1244
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1340
- 328
- Process
- Opened
- Target: C:\Windows\explorer.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1092
- 328
- Process
- Opened
- Target: C:\Windows\System32\wbem\WmiPrvSE.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 940
- 328
- Process
- Opened
- Target: C:\Program Files\Internet Explorer\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1976
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 384
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1460
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1312
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer9\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1324
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer9\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1852
- 328
- Process
- Opened
- Target: C:\Windows\System32\wbem\WmiPrvSE.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2056
- 328
- Process
- Opened
- Target: C:\Windows\System32\taskhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2220
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2456
- 328
- Process
- Opened
- Target: C:\Windows\System32\vssadmin.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2336
- 328
- Process
- Opened
- Target: C:\Windows\System32\conhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2168
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\DHCPCSVC6.DLL
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\RPCRTREMOTE.DLL
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 4
- 328
- Process
- Opened
- Target: C:\Windows\System32\smss.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 264
- 328
- Process
- Opened
- Target: C:\Windows\System32\csrss.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 348
- 328
- Process
- Opened
- Target: C:\Windows\System32\wininit.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 376
- 328
- Process
- Opened
- Target: C:\Windows\System32\csrss.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 396
- 328
- Process
- Opened
- Target: C:\Windows\System32\winlogon.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 432
- 328
- Process
- Opened
- Target: C:\Windows\System32\services.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 476
- 328
- Process
- Opened
- Target: C:\Windows\System32\lsass.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 492
- 328
- Process
- Opened
- Target: C:\Windows\System32\lsm.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 500
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 612
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 684
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 756
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 828
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 868
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 904
- 328
- Process
- Opened
- Target: C:\Windows\System32\spoolsv.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 968
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1064
- 328
- Process
- Opened
- Target: C:\Windows\System32\taskhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1164
- 328
- Process
- Opened
- Target: C:\Windows\System32\dwm.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1244
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1340
- 328
- Process
- Opened
- Target: C:\Windows\explorer.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1092
- 328
- Process
- Opened
- Target: C:\Windows\System32\wbem\WmiPrvSE.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 940
- 328
- Process
- Opened
- Target: C:\Program Files\Internet Explorer\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1976
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 384
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1460
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1312
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer9\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1324
- 328
- Process
- Opened
- Target: C:\Program Files (x86)\Internet Explorer9\iexplore.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 1852
- 328
- Process
- Opened
- Target: C:\Windows\System32\wbem\WmiPrvSE.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2056
- 328
- Process
- Opened
- Target: C:\Windows\System32\taskhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2220
- 328
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2456
- 328
- Process
- Opened
- Target: C:\Windows\System32\vssadmin.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2336
- 328
- Process
- Opened
- Target: C:\Windows\System32\conhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2168
- 328
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\DHCPCSVC.DLL
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 4
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 384
- 328
- Process
- Opened
- Target: N\AB Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2864
- 328
- Ransom
- C:\049IoqKhtkpT2\naEhPKZY.xls
- MD5: e20105be75fb0fac4e89425c38dfc2a8
- Malicious Alert
- Ransomware
- Message: Ransomware Activity Detail: Ransomware Activity
- Malicious Alert
- Misc Anom
- Message: Ransomware Activity Detail: Ransomware Activity
- File
- Failed
- C:\Users\Administrator\AppData\Roaming\RASADHLP.DLL
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 4
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 384
- 328
- Process
- Opened
- Target: C:\Windows\System32\VSSVC.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2864
- 328
- Network
- Dns Query
- Protocol Type: udp Qtype: Host Address Hostname: myexternalip.com
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Malicious Alert
- Network Activity
- Message: Network outbound communication attempted Detail: Process attempting connections via dns_query
- Malicious Alert
- Misc Anom
- Message: Persistance with Self Delete Activity Detail: Persistance with Self Delete Activity
- Network
- Dns Query Answer
- Protocol Type: udp IP Address: 199.16.199.2 Hostname: myexternalip.com
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- API Call
- API Name: GetSystemDirectoryA Address: 0x76049c36
- Params: [0x2f6c7d0, 260]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 4
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 384
- 328
- Process
- Opened
- Target: C:\Windows\System32\VSSVC.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2864
- 328
- Ransom
- C:\049IoqKhtkpT2\ogasoVZrY.jpg
- MD5: c58548677bcc532e32b8f700d45b43ab
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 4
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 384
- 328
- Process
- Opened
- Target: C:\Windows\System32\VSSVC.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2864
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 4
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 384
- 328
- 3 Repeated items skipped
- Process
- Opened
- Target: C:\Windows\System32\dllhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2960
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 4
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 384
- 328
- Process
- Opened
- Target: C:\Windows\System32\dllhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2960
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 4
- 328
- Process
- Opened
- Target: N/A Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 384
- 328
- Process
- Opened
- Target: C:\Windows\System32\dllhost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2960
- 328
- 2 Repeated items skipped
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2416
- 328
- 2 Repeated items skipped
- Ransom
- C:\049IoqKhtkpT2\RsaneooSm.ppt
- MD5: 84bf5c5ade2397b22f49adc6c6e02f0a
- Process
- Opened
- Target: C:\Windows\System32\svchost.exe Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2416
- 328
- 2 Repeated items skipped
- Ransom
- C:\049IoqKhtkpT2\yWdIhcc-.doc
- MD5: c3e6ea4347c76bdbb178869798a2bc0b
- File
- Created
- C:\049IoqKhtkpT2\how_recover+sia.txt
- 328
- Network
- Http Request
- Protocol Type: tcp Destination Port: 80 IP Address: 199.16.199.2
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- API Call
- API Name: Sleep Address: 0x7760d98d
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Close
- C:\049IoqKhtkpT2\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\049IoqKhtkpT2\how_recover+sia.html
- 328
- File
- Close
- C:\049IoqKhtkpT2\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- Ransom
- C:\a8bC-VnssffT1\JgieYN.txt
- MD5: 75d738faabeaef4927f3d8f9e16a5ee0
- Network
- Dns Query
- Protocol Type: udp Qtype: Host Address Hostname: regiefernando.me
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Dns Query Answer
- Protocol Type: udp IP Address: 199.16.199.3 Hostname: regiefernando.me
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Http Request
- Protocol Type: tcp Destination Port: 80 IP Address: 199.16.199.3
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Dns Query
- Protocol Type: udp Qtype: Host Address Hostname: schriebershof.de
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Dns Query Answer
- Protocol Type: udp IP Address: 199.16.199.4 Hostname: schriebershof.de
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Http Request
- Protocol Type: tcp Destination Port: 80 IP Address: 199.16.199.4
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Dns Query
- Protocol Type: udp Qtype: Host Address Hostname: apotheke-stiepel.com
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Dns Query Answer
- Protocol Type: udp IP Address: 199.16.199.5 Hostname: apotheke-stiepel.com
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Http Request
- Protocol Type: tcp Destination Port: 80 IP Address: 199.16.199.5
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Dns Query
- Protocol Type: udp Qtype: Host Address Hostname: woodenden.com
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Dns Query Answer
- Protocol Type: udp IP Address: 199.16.199.6 Hostname: woodenden.com
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Http Request
- Protocol Type: tcp Destination Port: 80 IP Address: 199.16.199.6
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Dns Query
- Protocol Type: udp Qtype: Host Address Hostname: leboudoirdesbrunettes.com
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Dns Query Answer
- Protocol Type: udp IP Address: 199.16.199.7 Hostname: leboudoirdesbrunettes.com
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Network
- Http Request
- Protocol Type: tcp Destination Port: 80 IP Address: 199.16.199.7
- Imagepath: c:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328
- Ransom
- C:\a8bC-VnssffT1\jRdTsHXUA_.png
- MD5: fec63e7863dc861bddcbf0be680894ab
- Ransom
- C:\a8bC-VnssffT1\ltzad_g.xls
- MD5: fcf159d74ff134a5bb706ea757c890b8
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- Ransom
- C:\a8bC-VnssffT1\oFQKz.ppt
- MD5: c9ea11a479df9f7ebc9488c06fc1200d
- Ransom
- C:\a8bC-VnssffT1\TBchtna.doc
- MD5: a413fd453b82bf4d2dfe28453bee4293
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- Ransom
- C:\a8bC-VnssffT1\VvnKloLwd.jpg
- MD5: 9404a1ecb3871feb3945b6dd3bd564b8
- Uac
- Service
- Volume Shadow Copy
- Uac
- Service
- Microsoft Software Shadow Copy Provider
- File
- Created
- C:\a8bC-VnssffT1\how_recover+sia.txt
- 328
- File
- Close
- C:\a8bC-VnssffT1\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\a8bC-VnssffT1\how_recover+sia.html
- 328
- File
- Close
- C:\a8bC-VnssffT1\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Find
- C:\Boot\*
- 328
- File
- Find
- C:\Boot\cs-CZ\*
- 328
- File
- Created
- C:\Boot\cs-CZ\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\cs-CZ\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\cs-CZ\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\cs-CZ\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Find
- C:\Boot\da-DK\*
- 328
- File
- Created
- C:\Boot\da-DK\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\da-DK\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\da-DK\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\da-DK\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\de-DE\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\de-DE\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\de-DE\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\de-DE\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\el-GR\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\el-GR\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\el-GR\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\el-GR\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\en-US\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\en-US\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\en-US\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\en-US\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\es-ES\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\es-ES\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\es-ES\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\es-ES\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\fi-FI\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\fi-FI\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\fi-FI\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\fi-FI\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\Fonts\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\Fonts\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\Fonts\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\Fonts\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\fr-FR\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\fr-FR\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\fr-FR\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\fr-FR\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\hu-HU\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\hu-HU\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\hu-HU\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\hu-HU\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\it-IT\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\it-IT\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\it-IT\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\it-IT\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Created
- C:\Boot\ja-JP\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\ja-JP\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\ja-JP\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\ja-JP\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\ko-KR\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\ko-KR\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\ko-KR\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\ko-KR\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\nb-NO\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\nb-NO\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\nb-NO\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\nb-NO\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\nl-NL\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\nl-NL\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\nl-NL\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\nl-NL\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\pl-PL\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\pl-PL\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\pl-PL\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\pl-PL\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\pt-BR\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\pt-BR\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\pt-BR\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\pt-BR\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\pt-PT\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\pt-PT\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\pt-PT\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\pt-PT\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\ru-RU\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\ru-RU\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\ru-RU\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\ru-RU\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\sv-SE\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\sv-SE\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\sv-SE\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\sv-SE\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\tr-TR\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\tr-TR\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\tr-TR\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\tr-TR\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\zh-CN\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\zh-CN\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\zh-CN\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\zh-CN\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\zh-HK\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\zh-HK\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\zh-HK\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\zh-HK\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\zh-TW\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\zh-TW\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\zh-TW\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\zh-TW\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Boot\how_recover+sia.txt
- 328
- File
- Close
- C:\Boot\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Boot\how_recover+sia.html
- 328
- File
- Close
- C:\Boot\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Failed
- C:\Documents and Settings
- 328
- File
- Created
- C:\Users\how_recover+sia.txt
- 328
- File
- Close
- C:\Users\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Users\how_recover+sia.html
- 328
- File
- Close
- C:\Users\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Open
- C:\eula.1028.txt
- 328 17734
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Close
- C:\eula.1028.txt
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Rename
- Old Name: C:\eula.1028.txt
- New Name: C:\eula.1028.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Open
- C:\eula.1031.txt
- 328 17734
- File
- Close
- C:\eula.1031.txt
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Rename
- Old Name: C:\eula.1031.txt
- New Name: C:\eula.1031.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Open
- C:\eula.1033.txt
- 328 10134
- File
- Close
- C:\eula.1033.txt
- MD5: f30c218d43d4b3baa388cfe67fb2375d
- SHA1: c98af769e13e8d8ec8077aaf0ee8c60ab070fafd
- 328 10558
- File
- Rename
- Old Name: C:\eula.1033.txt
- New Name: C:\eula.1033.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: f30c218d43d4b3baa388cfe67fb2375d
- SHA1: c98af769e13e8d8ec8077aaf0ee8c60ab070fafd
- 328 10558
- File
- Open
- C:\eula.1036.txt
- 328 17734
- File
- Close
- C:\eula.1036.txt
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Rename
- Old Name: C:\eula.1036.txt
- New Name: C:\eula.1036.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Open
- C:\eula.1040.txt
- 328 17734
- File
- Close
- C:\eula.1040.txt
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Rename
- Old Name: C:\eula.1040.txt
- New Name: C:\eula.1040.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Open
- C:\eula.1041.txt
- 328 118
- File
- Close
- C:\eula.1041.txt
- MD5: dd1a6580d968551dabb54c5415b8da4c
- SHA1: b51fcb1d2e6a6bdd13ad2b765ee886a476130488
- 328 542
- File
- Rename
- Old Name: C:\eula.1041.txt
- New Name: C:\eula.1041.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: dd1a6580d968551dabb54c5415b8da4c
- SHA1: b51fcb1d2e6a6bdd13ad2b765ee886a476130488
- 328 542
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Open
- C:\eula.1042.txt
- 328 17734
- File
- Close
- C:\eula.1042.txt
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Rename
- Old Name: C:\eula.1042.txt
- New Name: C:\eula.1042.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Open
- C:\eula.2052.txt
- 328 17734
- File
- Close
- C:\eula.2052.txt
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Rename
- Old Name: C:\eula.2052.txt
- New Name: C:\eula.2052.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Open
- C:\eula.3082.txt
- 328 17734
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Close
- C:\eula.3082.txt
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Rename
- Old Name: C:\eula.3082.txt
- New Name: C:\eula.3082.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: dbba78363b471f259800b2b9c5b4e04a
- SHA1: 02f49f2d0d182ae9bfc2bb652aa1c82825296668
- 328 18158
- File
- Created
- C:\exec\how_recover+sia.txt
- 328
- File
- Close
- C:\exec\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\exec\how_recover+sia.html
- 328
- File
- Close
- C:\exec\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Find
- C:\MSOCache\*
- 328
- File
- Find
- C:\MSOCache\*\*
- 328
- File
- Created
- C:\MSOCache\All Users\{90150000-0016-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0016-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-0016-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0016-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-0018-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0018-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-0018-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0018-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-0019-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0019-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-0019-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0019-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-001A-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-001A-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-001A-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-001A-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-001B-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-001B-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-001B-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-001B-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\Proof.en\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\Proof.en\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\Proof.en\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\Proof.en\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\Proof.es\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\Proof.es\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\Proof.es\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\Proof.es\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-002C-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-0044-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0044-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-0044-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0044-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-0090-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0090-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-0090-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0090-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-00A1-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-00A1-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-00A1-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-00A1-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-00BA-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-00BA-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-00BA-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-00BA-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-00C1-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-00C1-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-00C1-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-00C1-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-00E1-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-00E1-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-00E1-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-00E1-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-00E2-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-00E2-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-00E2-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-00E2-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-0115-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0115-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-0115-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0115-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-0117-0409-1000-0000000FF1CE}-C\Access.en-us\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0117-0409-1000-0000000FF1CE}-C\Access.en-us\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-0117-0409-1000-0000000FF1CE}-C\Access.en-us\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0117-0409-1000-0000000FF1CE}-C\Access.en-us\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-0117-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0117-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-0117-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-0117-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{90150000-012B-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-012B-0409-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{90150000-012B-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{90150000-012B-0409-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\{91150000-0011-0000-1000-0000000FF1CE}-C\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\{91150000-0011-0000-1000-0000000FF1CE}-C\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\{91150000-0011-0000-1000-0000000FF1CE}-C\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\{91150000-0011-0000-1000-0000000FF1CE}-C\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\All Users\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\All Users\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\All Users\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\All Users\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\MSOCache\how_recover+sia.txt
- 328
- File
- Close
- C:\MSOCache\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\MSOCache\how_recover+sia.html
- 328
- File
- Close
- C:\MSOCache\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\PerfLogs\Admin\how_recover+sia.txt
- 328
- File
- Close
- C:\PerfLogs\Admin\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\PerfLogs\Admin\how_recover+sia.html
- 328
- File
- Close
- C:\PerfLogs\Admin\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\PerfLogs\how_recover+sia.txt
- 328
- File
- Close
- C:\PerfLogs\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\PerfLogs\how_recover+sia.html
- 328
- File
- Close
- C:\PerfLogs\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\453ZBtMk\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\453ZBtMk\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\453ZBtMk\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\453ZBtMk\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Open
- C:\Program Files\7-Zip\History.txt
- 328 32400
- File
- Close
- C:\Program Files\7-Zip\History.txt
- MD5: 63405c67e90b02265cf63d9566abf590
- SHA1: 28c7f799054fd5ebda49f2c624e4bb1cd5327315
- 328 32830
- File
- Rename
- Old Name: C:\Program Files\7-Zip\History.txt
- New Name: C:\Program Files\7-Zip\History.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 63405c67e90b02265cf63d9566abf590
- SHA1: 28c7f799054fd5ebda49f2c624e4bb1cd5327315
- 328 32830
- File
- Open
- C:\Program Files\7-Zip\Lang\af.txt
- 328 10348
- File
- Close
- C:\Program Files\7-Zip\Lang\af.txt
- MD5: 807cdaf752ccbf51694d0901a16a9455
- SHA1: 20e5a8551e246cf8a9850e2242608e9990023f3d
- 328 10766
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\af.txt
- New Name: C:\Program Files\7-Zip\Lang\af.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 807cdaf752ccbf51694d0901a16a9455
- SHA1: 20e5a8551e246cf8a9850e2242608e9990023f3d
- 328 10766
- File
- Open
- C:\Program Files\7-Zip\Lang\ar.txt
- 328 16900
- File
- Close
- C:\Program Files\7-Zip\Lang\ar.txt
- MD5: 565620cfeaa0503f349142c6009e2ca8
- SHA1: 82b9622fd295774afc11445bb54336d6f14fe31a
- 328 17326
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ar.txt
- New Name: C:\Program Files\7-Zip\Lang\ar.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 565620cfeaa0503f349142c6009e2ca8
- SHA1: 82b9622fd295774afc11445bb54336d6f14fe31a
- 328 17326
- File
- Open
- C:\Program Files\7-Zip\Lang\ast.txt
- 328 10640
- File
- Close
- C:\Program Files\7-Zip\Lang\ast.txt
- MD5: aed620c46ebec17c10a234817f40a5ac
- SHA1: 8e600bd26fcb410b9db4b8ea973edf183c05204e
- 328 11070
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ast.txt
- New Name: C:\Program Files\7-Zip\Lang\ast.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: aed620c46ebec17c10a234817f40a5ac
- SHA1: 8e600bd26fcb410b9db4b8ea973edf183c05204e
- 328 11070
- File
- Open
- C:\Program Files\7-Zip\Lang\az.txt
- 328 13824
- File
- Close
- C:\Program Files\7-Zip\Lang\az.txt
- MD5: 2481883d534cca041031fbecbfd07533
- SHA1: 7dd78ef1929f5d07e2bf334a07f849fe656caedb
- 328 14254
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\az.txt
- New Name: C:\Program Files\7-Zip\Lang\az.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 2481883d534cca041031fbecbfd07533
- SHA1: 7dd78ef1929f5d07e2bf334a07f849fe656caedb
- 328 14254
- File
- Open
- C:\Program Files\7-Zip\Lang\ba.txt
- 328 18160
- File
- Close
- C:\Program Files\7-Zip\Lang\ba.txt
- MD5: 0a897f9b7591d3437ad59c5d235d77e4
- SHA1: a98df1db94abb5fbfc52942bad9643db4cd75470
- 328 18590
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ba.txt
- New Name: C:\Program Files\7-Zip\Lang\ba.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 0a897f9b7591d3437ad59c5d235d77e4
- SHA1: a98df1db94abb5fbfc52942bad9643db4cd75470
- 328 18590
- File
- Open
- C:\Program Files\7-Zip\Lang\be.txt
- 328 18850
- File
- Close
- C:\Program Files\7-Zip\Lang\be.txt
- MD5: 56b00b91b5406ce811fe3c135ac75a94
- SHA1: 56e6d94a81ede6df2b6382303fb064fbacc531f6
- 328 19278
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\be.txt
- New Name: C:\Program Files\7-Zip\Lang\be.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 56b00b91b5406ce811fe3c135ac75a94
- SHA1: 56e6d94a81ede6df2b6382303fb064fbacc531f6
- 328 19278
- File
- Open
- C:\Program Files\7-Zip\Lang\bg.txt
- 328 20580
- File
- Close
- C:\Program Files\7-Zip\Lang\bg.txt
- MD5: 66c2d332278461dc1629acb6c9910141
- SHA1: a0787311b0a2deeca76454cd7d40a4c8f77eb502
- 328 21006
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\bg.txt
- New Name: C:\Program Files\7-Zip\Lang\bg.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 66c2d332278461dc1629acb6c9910141
- SHA1: a0787311b0a2deeca76454cd7d40a4c8f77eb502
- 328 21006
- File
- Open
- C:\Program Files\7-Zip\Lang\bn.txt
- 328 23005
- File
- Close
- C:\Program Files\7-Zip\Lang\bn.txt
- MD5: 4f307b23da16c2777e2d823537d995c8
- SHA1: d98b8cb613958cc106ac94717b8c7da8e2b74c53
- 328 23422
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\bn.txt
- New Name: C:\Program Files\7-Zip\Lang\bn.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 4f307b23da16c2777e2d823537d995c8
- SHA1: d98b8cb613958cc106ac94717b8c7da8e2b74c53
- 328 23422
- File
- Open
- C:\Program Files\7-Zip\Lang\br.txt
- 328 10645
- File
- Close
- C:\Program Files\7-Zip\Lang\br.txt
- MD5: 9cc229901e84d6399313910cbdf4af33
- SHA1: de396f16632e941c2986eac09bd82c146b7afeb5
- 328 11070
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\br.txt
- New Name: C:\Program Files\7-Zip\Lang\br.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 9cc229901e84d6399313910cbdf4af33
- SHA1: de396f16632e941c2986eac09bd82c146b7afeb5
- 328 11070
- File
- Open
- C:\Program Files\7-Zip\Lang\ca.txt
- 328 13798
- File
- Close
- C:\Program Files\7-Zip\Lang\ca.txt
- MD5: a2db5eee356d6a0f052ece13411d32ec
- SHA1: 63ef84ca1b7b46a3a95b08815f168f670493a00b
- 328 14222
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ca.txt
- New Name: C:\Program Files\7-Zip\Lang\ca.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: a2db5eee356d6a0f052ece13411d32ec
- SHA1: 63ef84ca1b7b46a3a95b08815f168f670493a00b
- 328 14222
- File
- Open
- C:\Program Files\7-Zip\Lang\cs.txt
- 328 14109
- File
- Close
- C:\Program Files\7-Zip\Lang\cs.txt
- MD5: bca7a240bd8ce8a920c802cce7e748d9
- SHA1: fb70cdba397e24832ea7bde3fe581b342b331bd1
- 328 14526
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\cs.txt
- New Name: C:\Program Files\7-Zip\Lang\cs.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: bca7a240bd8ce8a920c802cce7e748d9
- SHA1: fb70cdba397e24832ea7bde3fe581b342b331bd1
- 328 14526
- File
- Open
- C:\Program Files\7-Zip\Lang\cy.txt
- 328 10645
- File
- Close
- C:\Program Files\7-Zip\Lang\cy.txt
- MD5: fd01ea496f1795ff593606c458206d48
- SHA1: f12c2090cd2cfa7e68cb652f19a50707ad560737
- 328 11070
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\cy.txt
- New Name: C:\Program Files\7-Zip\Lang\cy.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: fd01ea496f1795ff593606c458206d48
- SHA1: f12c2090cd2cfa7e68cb652f19a50707ad560737
- 328 11070
- File
- Open
- C:\Program Files\7-Zip\Lang\da.txt
- 328 12946
- File
- Close
- C:\Program Files\7-Zip\Lang\da.txt
- MD5: d7dc348d2ef5b579fb75ff9eaa602078
- SHA1: ceaab5e2174b1a2264b8147b01db9d5bb5f20c12
- 328 13374
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\da.txt
- New Name: C:\Program Files\7-Zip\Lang\da.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: d7dc348d2ef5b579fb75ff9eaa602078
- SHA1: ceaab5e2174b1a2264b8147b01db9d5bb5f20c12
- 328 13374
- File
- Open
- C:\Program Files\7-Zip\Lang\de.txt
- 328 14513
- File
- Close
- C:\Program Files\7-Zip\Lang\de.txt
- MD5: ac22c8e8482a9d626f18cef058314244
- SHA1: 62defd2b824029328446e663313b457cea78051e
- 328 14942
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\de.txt
- New Name: C:\Program Files\7-Zip\Lang\de.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: ac22c8e8482a9d626f18cef058314244
- SHA1: 62defd2b824029328446e663313b457cea78051e
- 328 14942
- File
- Open
- C:\Program Files\7-Zip\Lang\el.txt
- 328 21536
- File
- Close
- C:\Program Files\7-Zip\Lang\el.txt
- MD5: e0dad4d5ef434c46724b492cc336df0f
- SHA1: b90eebbf627bf11837b6659c35703ca95bcd630a
- 328 21966
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\el.txt
- New Name: C:\Program Files\7-Zip\Lang\el.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: e0dad4d5ef434c46724b492cc336df0f
- SHA1: b90eebbf627bf11837b6659c35703ca95bcd630a
- 328 21966
- File
- Open
- C:\Program Files\7-Zip\Lang\eo.txt
- 328 10637
- File
- Close
- C:\Program Files\7-Zip\Lang\eo.txt
- MD5: 0a41ef683dfaffe3f744481c1c89e5bd
- SHA1: c6c48883f47555773acfcdcb57c5ed23286ac34f
- 328 11054
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\eo.txt
- New Name: C:\Program Files\7-Zip\Lang\eo.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 0a41ef683dfaffe3f744481c1c89e5bd
- SHA1: c6c48883f47555773acfcdcb57c5ed23286ac34f
- 328 11054
- File
- Open
- C:\Program Files\7-Zip\Lang\es.txt
- 328 14521
- File
- Close
- C:\Program Files\7-Zip\Lang\es.txt
- MD5: 730328d9e4a24b625368da5a224bb943
- SHA1: a8005bff89ca6c901034d000f4532c9c7724c795
- 328 14942
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\es.txt
- New Name: C:\Program Files\7-Zip\Lang\es.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 730328d9e4a24b625368da5a224bb943
- SHA1: a8005bff89ca6c901034d000f4532c9c7724c795
- 328 14942
- File
- Open
- C:\Program Files\7-Zip\Lang\et.txt
- 328 13481
- File
- Close
- C:\Program Files\7-Zip\Lang\et.txt
- MD5: 90a89e6e507ce89f5f7d964705ac5b29
- SHA1: c8269bcd82772caa196c7af18c58737555c39e21
- 328 13902
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\et.txt
- New Name: C:\Program Files\7-Zip\Lang\et.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 90a89e6e507ce89f5f7d964705ac5b29
- SHA1: c8269bcd82772caa196c7af18c58737555c39e21
- 328 13902
- File
- Open
- C:\Program Files\7-Zip\Lang\eu.txt
- 328 12799
- File
- Close
- C:\Program Files\7-Zip\Lang\eu.txt
- MD5: cca51c87408fa2092b13417a4e6bdb09
- SHA1: 892ef763e6a3ee87a121eac748f2f7486f5f3dfe
- 328 13214
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\eu.txt
- New Name: C:\Program Files\7-Zip\Lang\eu.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: cca51c87408fa2092b13417a4e6bdb09
- SHA1: 892ef763e6a3ee87a121eac748f2f7486f5f3dfe
- 328 13214
- File
- Open
- C:\Program Files\7-Zip\Lang\ext.txt
- 328 14145
- File
- Close
- C:\Program Files\7-Zip\Lang\ext.txt
- MD5: 29f336cbd30a6076b0214710d595a3d2
- SHA1: 04faf2de1969aac56d3c9852690a6a6bac4d7710
- 328 14574
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ext.txt
- New Name: C:\Program Files\7-Zip\Lang\ext.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 29f336cbd30a6076b0214710d595a3d2
- SHA1: 04faf2de1969aac56d3c9852690a6a6bac4d7710
- 328 14574
- File
- Open
- C:\Program Files\7-Zip\Lang\fa.txt
- 328 16655
- File
- Close
- C:\Program Files\7-Zip\Lang\fa.txt
- MD5: 48cfa62761d20646a6610898de4da689
- SHA1: 69910f23000460c05afb5ae45756cf03240c5ce9
- 328 17070
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\fa.txt
- New Name: C:\Program Files\7-Zip\Lang\fa.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 48cfa62761d20646a6610898de4da689
- SHA1: 69910f23000460c05afb5ae45756cf03240c5ce9
- 328 17070
- File
- Open
- C:\Program Files\7-Zip\Lang\fi.txt
- 328 14165
- File
- Close
- C:\Program Files\7-Zip\Lang\fi.txt
- MD5: cae2b41f4ac2f1877f420f2cc4542358
- SHA1: 2ebcc782359b8e486ce14d00e71ee3909f4dd0b6
- 328 14590
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\fi.txt
- New Name: C:\Program Files\7-Zip\Lang\fi.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: cae2b41f4ac2f1877f420f2cc4542358
- SHA1: 2ebcc782359b8e486ce14d00e71ee3909f4dd0b6
- 328 14590
- File
- Open
- C:\Program Files\7-Zip\Lang\fr.txt
- 328 14652
- File
- Close
- C:\Program Files\7-Zip\Lang\fr.txt
- MD5: adcfc47adf294fad8ff2e6f58bf0883b
- SHA1: 8b3408b96f4df87f4707d914f8a677b11f27fb48
- 328 15070
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\fr.txt
- New Name: C:\Program Files\7-Zip\Lang\fr.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: adcfc47adf294fad8ff2e6f58bf0883b
- SHA1: 8b3408b96f4df87f4707d914f8a677b11f27fb48
- 328 15070
- File
- Open
- C:\Program Files\7-Zip\Lang\fur.txt
- 328 13894
- File
- Close
- C:\Program Files\7-Zip\Lang\fur.txt
- MD5: 3135e22cd0db2266a6f8c2d90451385e
- SHA1: 751687b55911e1c5abc84b2d3d36c195b1353987
- 328 14318
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\fur.txt
- New Name: C:\Program Files\7-Zip\Lang\fur.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 3135e22cd0db2266a6f8c2d90451385e
- SHA1: 751687b55911e1c5abc84b2d3d36c195b1353987
- 328 14318
- File
- Open
- C:\Program Files\7-Zip\Lang\fy.txt
- 328 12468
- File
- Close
- C:\Program Files\7-Zip\Lang\fy.txt
- MD5: aff8b6889005862e1cc060b1be074d00
- SHA1: e4c2e36d7e6b26dae1e0c7e5e0d6af1edce94f72
- 328 12894
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\fy.txt
- New Name: C:\Program Files\7-Zip\Lang\fy.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: aff8b6889005862e1cc060b1be074d00
- SHA1: e4c2e36d7e6b26dae1e0c7e5e0d6af1edce94f72
- 328 12894
- File
- Open
- C:\Program Files\7-Zip\Lang\gl.txt
- 328 10590
- File
- Close
- C:\Program Files\7-Zip\Lang\gl.txt
- MD5: 548b92922cb0327fa6703290fb7e7fee
- SHA1: dfc3c830d1b74bf4275017449fd4f1e1f2aa281a
- 328 11006
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\gl.txt
- New Name: C:\Program Files\7-Zip\Lang\gl.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 548b92922cb0327fa6703290fb7e7fee
- SHA1: dfc3c830d1b74bf4275017449fd4f1e1f2aa281a
- 328 11006
- File
- Open
- C:\Program Files\7-Zip\Lang\gu.txt
- 328 26704
- File
- Close
- C:\Program Files\7-Zip\Lang\gu.txt
- MD5: 94e7c58205246ef3f071a7b8d6cf0349
- SHA1: 716a81d7d5de1b7c94deabd4369287bc2eb0ec61
- 328 27134
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\gu.txt
- New Name: C:\Program Files\7-Zip\Lang\gu.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 94e7c58205246ef3f071a7b8d6cf0349
- SHA1: 716a81d7d5de1b7c94deabd4369287bc2eb0ec61
- 328 27134
- File
- Open
- C:\Program Files\7-Zip\Lang\he.txt
- 328 16419
- File
- Close
- C:\Program Files\7-Zip\Lang\he.txt
- MD5: defcdbaf7be4fcb29e0108f7d7715e7b
- SHA1: 3994fcb792d8f17e0ca09d0cd8ab6076c1b0c0af
- 328 16846
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\he.txt
- New Name: C:\Program Files\7-Zip\Lang\he.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: defcdbaf7be4fcb29e0108f7d7715e7b
- SHA1: 3994fcb792d8f17e0ca09d0cd8ab6076c1b0c0af
- 328 16846
- File
- Open
- C:\Program Files\7-Zip\Lang\hi.txt
- 328 26795
- File
- Close
- C:\Program Files\7-Zip\Lang\hi.txt
- MD5: 7a7635f7fee901bedb15a18ef4ce07a3
- SHA1: 68bf1907fb0f469ef845453ef104c4c4efb38568
- 328 27214
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\hi.txt
- New Name: C:\Program Files\7-Zip\Lang\hi.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 7a7635f7fee901bedb15a18ef4ce07a3
- SHA1: 68bf1907fb0f469ef845453ef104c4c4efb38568
- 328 27214
- File
- Open
- C:\Program Files\7-Zip\Lang\hr.txt
- 328 13506
- File
- Close
- C:\Program Files\7-Zip\Lang\hr.txt
- MD5: ec31679ad1ebdd0c9689f2589bd56eac
- SHA1: 92f062b7bcc0b4d5f6f8e76e4d44d8a8f68ccc9c
- 328 13934
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\hr.txt
- New Name: C:\Program Files\7-Zip\Lang\hr.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: ec31679ad1ebdd0c9689f2589bd56eac
- SHA1: 92f062b7bcc0b4d5f6f8e76e4d44d8a8f68ccc9c
- 328 13934
- File
- Open
- C:\Program Files\7-Zip\Lang\hu.txt
- 328 14584
- File
- Close
- C:\Program Files\7-Zip\Lang\hu.txt
- MD5: 00ac34924d2877358d658acb95837314
- SHA1: 1aa7394d339e6eb7522bd21e0a2dfe06f1fec085
- 328 15006
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\hu.txt
- New Name: C:\Program Files\7-Zip\Lang\hu.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 00ac34924d2877358d658acb95837314
- SHA1: 1aa7394d339e6eb7522bd21e0a2dfe06f1fec085
- 328 15006
- File
- Open
- C:\Program Files\7-Zip\Lang\hy.txt
- 328 18716
- File
- Close
- C:\Program Files\7-Zip\Lang\hy.txt
- MD5: d4e8bcaddf5a7d9a9c67eeb041392f76
- SHA1: 950482eeb078163b8a499bc4ae3f082f20ca9f9a
- 328 19134
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\hy.txt
- New Name: C:\Program Files\7-Zip\Lang\hy.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: d4e8bcaddf5a7d9a9c67eeb041392f76
- SHA1: 950482eeb078163b8a499bc4ae3f082f20ca9f9a
- 328 19134
- File
- Open
- C:\Program Files\7-Zip\Lang\id.txt
- 328 13337
- File
- Close
- C:\Program Files\7-Zip\Lang\id.txt
- MD5: 57a51f4be45495b02530a60d8e3545ff
- SHA1: d6f5a8643c6f849c2496e2a5cb0fef8c2fe67975
- 328 13758
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\id.txt
- New Name: C:\Program Files\7-Zip\Lang\id.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 57a51f4be45495b02530a60d8e3545ff
- SHA1: d6f5a8643c6f849c2496e2a5cb0fef8c2fe67975
- 328 13758
- File
- Open
- C:\Program Files\7-Zip\Lang\io.txt
- 328 10115
- File
- Close
- C:\Program Files\7-Zip\Lang\io.txt
- MD5: 8d7e3398097ba156bd872fde877923ae
- SHA1: 6eae0e44d9513f99fe5c56b38406942ff2371034
- 328 10542
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\io.txt
- New Name: C:\Program Files\7-Zip\Lang\io.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 8d7e3398097ba156bd872fde877923ae
- SHA1: 6eae0e44d9513f99fe5c56b38406942ff2371034
- 328 10542
- File
- Open
- C:\Program Files\7-Zip\Lang\is.txt
- 328 12293
- File
- Close
- C:\Program Files\7-Zip\Lang\is.txt
- MD5: 725b2a12fa619a2c1e19b507937cddf8
- SHA1: 477eaa1eab5c053a3505f01b80e8201f79d2287a
- 328 12718
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\is.txt
- New Name: C:\Program Files\7-Zip\Lang\is.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 725b2a12fa619a2c1e19b507937cddf8
- SHA1: 477eaa1eab5c053a3505f01b80e8201f79d2287a
- 328 12718
- File
- Open
- C:\Program Files\7-Zip\Lang\it.txt
- 328 14153
- File
- Close
- C:\Program Files\7-Zip\Lang\it.txt
- MD5: 3937198b37294f5d50434701670402c6
- SHA1: 125c52c20a04386aab052ebda75fb2e9637ae17c
- 328 14574
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\it.txt
- New Name: C:\Program Files\7-Zip\Lang\it.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 3937198b37294f5d50434701670402c6
- SHA1: 125c52c20a04386aab052ebda75fb2e9637ae17c
- 328 14574
- File
- Open
- C:\Program Files\7-Zip\Lang\ja.txt
- 328 15953
- File
- Close
- C:\Program Files\7-Zip\Lang\ja.txt
- MD5: ec9f3c49461351271fc8af7d65a50133
- SHA1: 8a737ab4390543008869677be0cda9f4fd310279
- 328 16382
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ja.txt
- New Name: C:\Program Files\7-Zip\Lang\ja.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: ec9f3c49461351271fc8af7d65a50133
- SHA1: 8a737ab4390543008869677be0cda9f4fd310279
- 328 16382
- File
- Open
- C:\Program Files\7-Zip\Lang\ka.txt
- 328 19733
- File
- Close
- C:\Program Files\7-Zip\Lang\ka.txt
- MD5: b3834d7955145abab12ebb97446a6c73
- SHA1: b0f79f27d4fb2a777fb380b91a131a67435c4025
- 328 20158
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ka.txt
- New Name: C:\Program Files\7-Zip\Lang\ka.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: b3834d7955145abab12ebb97446a6c73
- SHA1: b0f79f27d4fb2a777fb380b91a131a67435c4025
- 328 20158
- File
- Open
- C:\Program Files\7-Zip\Lang\kk.txt
- 328 17704
- File
- Close
- C:\Program Files\7-Zip\Lang\kk.txt
- MD5: f1f3b8eec1f6875469e2df93af9d28b2
- SHA1: 79b947f14009ef0c06fdaa1267c1885249e8d2ab
- 328 18126
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\kk.txt
- New Name: C:\Program Files\7-Zip\Lang\kk.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: f1f3b8eec1f6875469e2df93af9d28b2
- SHA1: 79b947f14009ef0c06fdaa1267c1885249e8d2ab
- 328 18126
- File
- Open
- C:\Program Files\7-Zip\Lang\ko.txt
- 328 14742
- File
- Close
- C:\Program Files\7-Zip\Lang\ko.txt
- MD5: 81aa80c3f6a82aa31302909b0c05a49f
- SHA1: eb578e3680ce3c8be71b62d8a1b199cbdd037c29
- 328 15166
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ko.txt
- New Name: C:\Program Files\7-Zip\Lang\ko.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 81aa80c3f6a82aa31302909b0c05a49f
- SHA1: eb578e3680ce3c8be71b62d8a1b199cbdd037c29
- 328 15166
- File
- Open
- C:\Program Files\7-Zip\Lang\ku-ckb.txt
- 328 19711
- File
- Close
- C:\Program Files\7-Zip\Lang\ku-ckb.txt
- MD5: ed3f85623f4a70c4c8032da046563358
- SHA1: 7762e3bdafe7f90826b274934b4b47e2de83f37e
- 328 20126
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ku-ckb.txt
- New Name: C:\Program Files\7-Zip\Lang\ku-ckb.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: ed3f85623f4a70c4c8032da046563358
- SHA1: 7762e3bdafe7f90826b274934b4b47e2de83f37e
- 328 20126
- File
- Open
- C:\Program Files\7-Zip\Lang\ku.txt
- 328 11198
- File
- Close
- C:\Program Files\7-Zip\Lang\ku.txt
- MD5: 650d7019db102e6e1116264ddcf88e28
- SHA1: af38e3b87ebd1bab0a947a0b872bd3f55f8bdb07
- 328 11614
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ku.txt
- New Name: C:\Program Files\7-Zip\Lang\ku.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 650d7019db102e6e1116264ddcf88e28
- SHA1: af38e3b87ebd1bab0a947a0b872bd3f55f8bdb07
- 328 11614
- File
- Open
- C:\Program Files\7-Zip\Lang\lt.txt
- 328 13239
- File
- Close
- C:\Program Files\7-Zip\Lang\lt.txt
- MD5: eef5d61bfcb1f6472a9de7ee5da85fbd
- SHA1: 714f1349bb554c2875a45f3dffb76de41bb0b507
- 328 13662
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\lt.txt
- New Name: C:\Program Files\7-Zip\Lang\lt.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: eef5d61bfcb1f6472a9de7ee5da85fbd
- SHA1: 714f1349bb554c2875a45f3dffb76de41bb0b507
- 328 13662
- File
- Open
- C:\Program Files\7-Zip\Lang\lv.txt
- 328 10690
- File
- Close
- C:\Program Files\7-Zip\Lang\lv.txt
- MD5: fe83a4672ca04694f26299501e75c769
- SHA1: ee7626a71e54c81045018db5aa53344367644b77
- 328 11118
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\lv.txt
- New Name: C:\Program Files\7-Zip\Lang\lv.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: fe83a4672ca04694f26299501e75c769
- SHA1: ee7626a71e54c81045018db5aa53344367644b77
- 328 11118
- File
- Open
- C:\Program Files\7-Zip\Lang\mk.txt
- 328 15080
- File
- Close
- C:\Program Files\7-Zip\Lang\mk.txt
- MD5: 8d253e2a99e5366aade6163e64a4ebc8
- SHA1: e7b52661a0584c4504074a99c22280de29ef5126
- 328 15502
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\mk.txt
- New Name: C:\Program Files\7-Zip\Lang\mk.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 8d253e2a99e5366aade6163e64a4ebc8
- SHA1: e7b52661a0584c4504074a99c22280de29ef5126
- 328 15502
- File
- Open
- C:\Program Files\7-Zip\Lang\mn.txt
- 328 14657
- File
- Close
- C:\Program Files\7-Zip\Lang\mn.txt
- MD5: 859cce0f31c8a075ead75c0843ce6552
- SHA1: c1f9f5a00b76546204f4edc657159ccca51d270e
- 328 15086
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\mn.txt
- New Name: C:\Program Files\7-Zip\Lang\mn.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 859cce0f31c8a075ead75c0843ce6552
- SHA1: c1f9f5a00b76546204f4edc657159ccca51d270e
- 328 15086
- File
- Open
- C:\Program Files\7-Zip\Lang\mr.txt
- 328 17597
- File
- Close
- C:\Program Files\7-Zip\Lang\mr.txt
- MD5: 715c6b2a6b6d24d3549b3a558ac54039
- SHA1: 7a8f0bfb7b8785723a4d0974eb94ee265b3f6a9f
- 328 18014
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\mr.txt
- New Name: C:\Program Files\7-Zip\Lang\mr.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 715c6b2a6b6d24d3549b3a558ac54039
- SHA1: 7a8f0bfb7b8785723a4d0974eb94ee265b3f6a9f
- 328 18014
- File
- Open
- C:\Program Files\7-Zip\Lang\ms.txt
- 328 10409
- File
- Close
- C:\Program Files\7-Zip\Lang\ms.txt
- MD5: e7b53445783445bada3e3a7289e4f7ed
- SHA1: 135c56cc0bf5bee7f88bd0ad197cf5dba59764ea
- 328 10830
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ms.txt
- New Name: C:\Program Files\7-Zip\Lang\ms.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: e7b53445783445bada3e3a7289e4f7ed
- SHA1: 135c56cc0bf5bee7f88bd0ad197cf5dba59764ea
- 328 10830
- File
- Open
- C:\Program Files\7-Zip\Lang\nb.txt
- 328 11767
- File
- Close
- C:\Program Files\7-Zip\Lang\nb.txt
- MD5: f4453f890e41e078e5e9bc10dcdaea52
- SHA1: 261de0bccaceec4ffbf97607999847ddd5d7a663
- 328 12190
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\nb.txt
- New Name: C:\Program Files\7-Zip\Lang\nb.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: f4453f890e41e078e5e9bc10dcdaea52
- SHA1: 261de0bccaceec4ffbf97607999847ddd5d7a663
- 328 12190
- File
- Open
- C:\Program Files\7-Zip\Lang\ne.txt
- 328 21822
- File
- Close
- C:\Program Files\7-Zip\Lang\ne.txt
- MD5: 880b35da9aefd077d0893a2b34b0de90
- SHA1: 61bcd05a4e099be830b9674b0a52184df2599459
- 328 22238
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ne.txt
- New Name: C:\Program Files\7-Zip\Lang\ne.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 880b35da9aefd077d0893a2b34b0de90
- SHA1: 61bcd05a4e099be830b9674b0a52184df2599459
- 328 22238
- File
- Open
- C:\Program Files\7-Zip\Lang\nl.txt
- 328 14213
- File
- Close
- C:\Program Files\7-Zip\Lang\nl.txt
- MD5: ecb27bed9bbd6e60e92f7e43fd66eecb
- SHA1: e375150c927eb0592cf1e694101f6e8623550a9a
- 328 14638
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\nl.txt
- New Name: C:\Program Files\7-Zip\Lang\nl.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: ecb27bed9bbd6e60e92f7e43fd66eecb
- SHA1: e375150c927eb0592cf1e694101f6e8623550a9a
- 328 14638
- File
- Open
- C:\Program Files\7-Zip\Lang\nn.txt
- 328 11500
- File
- Close
- C:\Program Files\7-Zip\Lang\nn.txt
- MD5: 9b27aae1ba98fa8114115972a172c832
- SHA1: e7a8b4a79c7fbaeff7632da97d387001a1cff487
- 328 11918
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\nn.txt
- New Name: C:\Program Files\7-Zip\Lang\nn.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 9b27aae1ba98fa8114115972a172c832
- SHA1: e7a8b4a79c7fbaeff7632da97d387001a1cff487
- 328 11918
- File
- Open
- C:\Program Files\7-Zip\Lang\pa-in.txt
- 328 22849
- File
- Close
- C:\Program Files\7-Zip\Lang\pa-in.txt
- MD5: 1746514f6e78d9b18aaf1eabd9674197
- SHA1: 34b03796b5152d1192f65755ff74bb0462dc5241
- 328 23278
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\pa-in.txt
- New Name: C:\Program Files\7-Zip\Lang\pa-in.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 1746514f6e78d9b18aaf1eabd9674197
- SHA1: 34b03796b5152d1192f65755ff74bb0462dc5241
- 328 23278
- File
- Open
- C:\Program Files\7-Zip\Lang\pl.txt
- 328 14102
- File
- Close
- C:\Program Files\7-Zip\Lang\pl.txt
- MD5: d3cd4e3f351a678ec61aa874f76bef36
- SHA1: 17b6eab7596148566f7c02c104be6aa98b3c9762
- 328 14526
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\pl.txt
- New Name: C:\Program Files\7-Zip\Lang\pl.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: d3cd4e3f351a678ec61aa874f76bef36
- SHA1: 17b6eab7596148566f7c02c104be6aa98b3c9762
- 328 14526
- File
- Open
- C:\Program Files\7-Zip\Lang\ps.txt
- 328 15131
- File
- Close
- C:\Program Files\7-Zip\Lang\ps.txt
- MD5: 301a6645c6932c59f8e6af3fdc408e6a
- SHA1: 20c9a0a92913610f62019c8dc3df85d6274dadd5
- 328 15550
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ps.txt
- New Name: C:\Program Files\7-Zip\Lang\ps.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 301a6645c6932c59f8e6af3fdc408e6a
- SHA1: 20c9a0a92913610f62019c8dc3df85d6274dadd5
- 328 15550
- File
- Open
- C:\Program Files\7-Zip\Lang\pt-br.txt
- 328 13864
- File
- Close
- C:\Program Files\7-Zip\Lang\pt-br.txt
- MD5: 221874611cbacd205464ed53a83db9e7
- SHA1: 729abbe1099d2acf468856d2510c63b26218e0d4
- 328 14286
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\pt-br.txt
- New Name: C:\Program Files\7-Zip\Lang\pt-br.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 221874611cbacd205464ed53a83db9e7
- SHA1: 729abbe1099d2acf468856d2510c63b26218e0d4
- 328 14286
- File
- Open
- C:\Program Files\7-Zip\Lang\pt.txt
- 328 14007
- File
- Close
- C:\Program Files\7-Zip\Lang\pt.txt
- MD5: 02b6ff8aa4dae4eea729b2e84cbceb7d
- SHA1: d62a614ae4c8fdef62a7a2ea62fec4fe8ab90a03
- 328 14430
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\pt.txt
- New Name: C:\Program Files\7-Zip\Lang\pt.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 02b6ff8aa4dae4eea729b2e84cbceb7d
- SHA1: d62a614ae4c8fdef62a7a2ea62fec4fe8ab90a03
- 328 14430
- File
- Open
- C:\Program Files\7-Zip\Lang\ro.txt
- 328 13994
- File
- Close
- C:\Program Files\7-Zip\Lang\ro.txt
- MD5: 019852f1b33e4cfe20b35c78151cc893
- SHA1: c359e3b2c4b24c42f4d381b83092383c21a0eef2
- 328 14414
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ro.txt
- New Name: C:\Program Files\7-Zip\Lang\ro.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 019852f1b33e4cfe20b35c78151cc893
- SHA1: c359e3b2c4b24c42f4d381b83092383c21a0eef2
- 328 14414
- File
- Open
- C:\Program Files\7-Zip\Lang\ru.txt
- 328 19107
- File
- Close
- C:\Program Files\7-Zip\Lang\ru.txt
- MD5: 7a71b2a81b4475381513f79188f8b52d
- SHA1: 063147c8ddfcfcf8f757baab1c96427b97dfddba
- 328 19534
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ru.txt
- New Name: C:\Program Files\7-Zip\Lang\ru.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 7a71b2a81b4475381513f79188f8b52d
- SHA1: 063147c8ddfcfcf8f757baab1c96427b97dfddba
- 328 19534
- File
- Open
- C:\Program Files\7-Zip\Lang\sa.txt
- 328 28434
- File
- Close
- C:\Program Files\7-Zip\Lang\sa.txt
- MD5: 6f5e1bdd3e14761d8d1579b6bcc59b97
- SHA1: e18b47425da207d278f8ec27ec086a4bfb56577a
- 328 28862
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\sa.txt
- New Name: C:\Program Files\7-Zip\Lang\sa.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 6f5e1bdd3e14761d8d1579b6bcc59b97
- SHA1: e18b47425da207d278f8ec27ec086a4bfb56577a
- 328 28862
- File
- Open
- C:\Program Files\7-Zip\Lang\si.txt
- 328 25126
- File
- Close
- C:\Program Files\7-Zip\Lang\si.txt
- MD5: ce66c0e092912e3321341acc39e77f4a
- SHA1: f3b2fae989367d6d34fe6994a127a7a154fc15bd
- 328 25550
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\si.txt
- New Name: C:\Program Files\7-Zip\Lang\si.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: ce66c0e092912e3321341acc39e77f4a
- SHA1: f3b2fae989367d6d34fe6994a127a7a154fc15bd
- 328 25550
- File
- Open
- C:\Program Files\7-Zip\Lang\sk.txt
- 328 14323
- File
- Close
- C:\Program Files\7-Zip\Lang\sk.txt
- MD5: d3a53836aa67fe47659c538a95b58384
- SHA1: 0de4300e1d1f81a3799cee8abadd3c77927fb83b
- 328 14750
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\sk.txt
- New Name: C:\Program Files\7-Zip\Lang\sk.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: d3a53836aa67fe47659c538a95b58384
- SHA1: 0de4300e1d1f81a3799cee8abadd3c77927fb83b
- 328 14750
- File
- Open
- C:\Program Files\7-Zip\Lang\sl.txt
- 328 12419
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Close
- C:\Program Files\7-Zip\Lang\sl.txt
- MD5: cb1cebed2166b115407314d52bdbd1bb
- SHA1: 4f4721186b076873ce21d2ba4d4743812ad0b9fe
- 328 12846
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\sl.txt
- New Name: C:\Program Files\7-Zip\Lang\sl.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: cb1cebed2166b115407314d52bdbd1bb
- SHA1: 4f4721186b076873ce21d2ba4d4743812ad0b9fe
- 328 12846
- File
- Open
- C:\Program Files\7-Zip\Lang\sq.txt
- 328 11588
- File
- Close
- C:\Program Files\7-Zip\Lang\sq.txt
- MD5: 0f966e618693cce9b666467e135f90d8
- SHA1: 994755a929d92283fb5abe5ad782757bfe78d9da
- 328 12014
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\sq.txt
- New Name: C:\Program Files\7-Zip\Lang\sq.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 0f966e618693cce9b666467e135f90d8
- SHA1: 994755a929d92283fb5abe5ad782757bfe78d9da
- 328 12014
- File
- Open
- C:\Program Files\7-Zip\Lang\sr-spc.txt
- 328 19089
- File
- Close
- C:\Program Files\7-Zip\Lang\sr-spc.txt
- MD5: 14122f46273218d2905cbd66d5cfec2f
- SHA1: 8c3bf669081e81f4bf0ccdb2c0604ab067f97720
- 328 19518
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\sr-spc.txt
- New Name: C:\Program Files\7-Zip\Lang\sr-spc.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 14122f46273218d2905cbd66d5cfec2f
- SHA1: 8c3bf669081e81f4bf0ccdb2c0604ab067f97720
- 328 19518
- File
- Open
- C:\Program Files\7-Zip\Lang\sr-spl.txt
- 328 13378
- File
- Close
- C:\Program Files\7-Zip\Lang\sr-spl.txt
- MD5: 10608f4764b85e090afe2bab152709a2
- SHA1: ba532e0aadc9162d35f8f6179929b0c9b659df2e
- 328 13806
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\sr-spl.txt
- New Name: C:\Program Files\7-Zip\Lang\sr-spl.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 10608f4764b85e090afe2bab152709a2
- SHA1: ba532e0aadc9162d35f8f6179929b0c9b659df2e
- 328 13806
- File
- Open
- C:\Program Files\7-Zip\Lang\sv.txt
- 328 13743
- File
- Close
- C:\Program Files\7-Zip\Lang\sv.txt
- MD5: aece2f7edc30454542fb482949f82d62
- SHA1: 31677decedeb435b488e0d5250c097bb3d2af83c
- 328 14158
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\sv.txt
- New Name: C:\Program Files\7-Zip\Lang\sv.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: aece2f7edc30454542fb482949f82d62
- SHA1: 31677decedeb435b488e0d5250c097bb3d2af83c
- 328 14158
- File
- Open
- C:\Program Files\7-Zip\Lang\ta.txt
- 328 20476
- File
- Close
- C:\Program Files\7-Zip\Lang\ta.txt
- MD5: c00bf69096c8abb699fb4c84dc82b183
- SHA1: 45a6810ba4331c77bcdfe2cb5fb7de410bc268cc
- 328 20894
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ta.txt
- New Name: C:\Program Files\7-Zip\Lang\ta.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: c00bf69096c8abb699fb4c84dc82b183
- SHA1: 45a6810ba4331c77bcdfe2cb5fb7de410bc268cc
- 328 20894
- File
- Open
- C:\Program Files\7-Zip\Lang\th.txt
- 328 24112
- File
- Close
- C:\Program Files\7-Zip\Lang\th.txt
- MD5: 5834b70466f62f28f46b72c2284b2144
- SHA1: b0f964590e1f6cfcf5ae6efa4893a4fbb4d2a0de
- 328 24542
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\th.txt
- New Name: C:\Program Files\7-Zip\Lang\th.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 5834b70466f62f28f46b72c2284b2144
- SHA1: b0f964590e1f6cfcf5ae6efa4893a4fbb4d2a0de
- 328 24542
- File
- Open
- C:\Program Files\7-Zip\Lang\tr.txt
- 328 13497
- File
- Close
- C:\Program Files\7-Zip\Lang\tr.txt
- MD5: 712ed51f3e4058f3ed4d5fee2b594891
- SHA1: 6f798aef72295aab1851d2b50bb34ba84900a96b
- 328 13918
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\tr.txt
- New Name: C:\Program Files\7-Zip\Lang\tr.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 712ed51f3e4058f3ed4d5fee2b594891
- SHA1: 6f798aef72295aab1851d2b50bb34ba84900a96b
- 328 13918
- File
- Open
- C:\Program Files\7-Zip\Lang\tt.txt
- 328 18409
- File
- Close
- C:\Program Files\7-Zip\Lang\tt.txt
- MD5: ff5bcc1448b87e0a31808adbf34e1811
- SHA1: 6f32d342a7551310121a0d9442231f6c28f8b8c5
- 328 18830
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\tt.txt
- New Name: C:\Program Files\7-Zip\Lang\tt.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: ff5bcc1448b87e0a31808adbf34e1811
- SHA1: 6f32d342a7551310121a0d9442231f6c28f8b8c5
- 328 18830
- File
- Open
- C:\Program Files\7-Zip\Lang\ug.txt
- 328 18785
- File
- Close
- C:\Program Files\7-Zip\Lang\ug.txt
- MD5: 6ece79be54176e15c34fe87b4cae9898
- SHA1: 2a157a30e3919bf5b31c01d56f74a4f1ac1ce93a
- 328 19214
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\ug.txt
- New Name: C:\Program Files\7-Zip\Lang\ug.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 6ece79be54176e15c34fe87b4cae9898
- SHA1: 2a157a30e3919bf5b31c01d56f74a4f1ac1ce93a
- 328 19214
- File
- Open
- C:\Program Files\7-Zip\Lang\uk.txt
- 328 19729
- File
- Close
- C:\Program Files\7-Zip\Lang\uk.txt
- MD5: 2a975ad79f6fb301e657f8879f22b60a
- SHA1: 7a2d9f95e7713f2204edf3509d252ade2d3f993f
- 328 20158
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\uk.txt
- New Name: C:\Program Files\7-Zip\Lang\uk.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 2a975ad79f6fb301e657f8879f22b60a
- SHA1: 7a2d9f95e7713f2204edf3509d252ade2d3f993f
- 328 20158
- File
- Open
- C:\Program Files\7-Zip\Lang\uz.txt
- 328 10679
- File
- Close
- C:\Program Files\7-Zip\Lang\uz.txt
- MD5: e0446951590b90ae6d8ed54058455396
- SHA1: f5bb3c30a7a5ce2ffccfd24ee8695d86d1152e11
- 328 11102
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\uz.txt
- New Name: C:\Program Files\7-Zip\Lang\uz.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: e0446951590b90ae6d8ed54058455396
- SHA1: f5bb3c30a7a5ce2ffccfd24ee8695d86d1152e11
- 328 11102
- File
- Open
- C:\Program Files\7-Zip\Lang\va.txt
- 328 12179
- File
- Close
- C:\Program Files\7-Zip\Lang\va.txt
- MD5: bf4ef27b4b43f749fb1398b9e3ca430e
- SHA1: 6696717fa37cbef4cede653d9a6791a08e5554e5
- 328 12606
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\va.txt
- New Name: C:\Program Files\7-Zip\Lang\va.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: bf4ef27b4b43f749fb1398b9e3ca430e
- SHA1: 6696717fa37cbef4cede653d9a6791a08e5554e5
- 328 12606
- File
- Open
- C:\Program Files\7-Zip\Lang\vi.txt
- 328 13716
- File
- Close
- C:\Program Files\7-Zip\Lang\vi.txt
- MD5: 70e859bd5433ea291b92184969d0de30
- SHA1: 211b9548eb9f6d98adade16cfe122c543393d614
- 328 14142
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\vi.txt
- New Name: C:\Program Files\7-Zip\Lang\vi.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 70e859bd5433ea291b92184969d0de30
- SHA1: 211b9548eb9f6d98adade16cfe122c543393d614
- 328 14142
- File
- Open
- C:\Program Files\7-Zip\Lang\zh-cn.txt
- 328 13000
- File
- Close
- C:\Program Files\7-Zip\Lang\zh-cn.txt
- MD5: dbe72c4e03c7344b0c632f1c6998f4d1
- SHA1: 9e0be61ad3ee18c25946b00efc0d71ed83a279af
- 328 13422
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\zh-cn.txt
- New Name: C:\Program Files\7-Zip\Lang\zh-cn.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: dbe72c4e03c7344b0c632f1c6998f4d1
- SHA1: 9e0be61ad3ee18c25946b00efc0d71ed83a279af
- 328 13422
- File
- Open
- C:\Program Files\7-Zip\Lang\zh-tw.txt
- 328 13087
- File
- Close
- C:\Program Files\7-Zip\Lang\zh-tw.txt
- MD5: ed8d5061fd728b88685f174486e9ac9f
- SHA1: e1bbf0d6b13a69b9d8775df3a6a800b4241db4f3
- 328 13502
- File
- Rename
- Old Name: C:\Program Files\7-Zip\Lang\zh-tw.txt
- New Name: C:\Program Files\7-Zip\Lang\zh-tw.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: ed8d5061fd728b88685f174486e9ac9f
- SHA1: e1bbf0d6b13a69b9d8775df3a6a800b4241db4f3
- 328 13502
- File
- Created
- C:\Program Files\7-Zip\Lang\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\7-Zip\Lang\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\7-Zip\Lang\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\7-Zip\Lang\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Open
- C:\Program Files\7-Zip\License.txt
- 328 1927
- File
- Close
- C:\Program Files\7-Zip\License.txt
- MD5: 51906a38eee425125ec189f12e81ba5a
- SHA1: c070ef300ed43d440f21d547e81e0c30285abba8
- 328 2350
- File
- Rename
- Old Name: C:\Program Files\7-Zip\License.txt
- New Name: C:\Program Files\7-Zip\License.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 51906a38eee425125ec189f12e81ba5a
- SHA1: c070ef300ed43d440f21d547e81e0c30285abba8
- 328 2350
- File
- Open
- C:\Program Files\7-Zip\readme.txt
- 328 1565
- File
- Close
- C:\Program Files\7-Zip\readme.txt
- MD5: b39d31a3e29a2e245be14696c20474ff
- SHA1: 22477278bd1d23c4d16b6904d55f40b10e408716
- 328 1982
- File
- Rename
- Old Name: C:\Program Files\7-Zip\readme.txt
- New Name: C:\Program Files\7-Zip\readme.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: b39d31a3e29a2e245be14696c20474ff
- SHA1: 22477278bd1d23c4d16b6904d55f40b10e408716
- 328 1982
- File
- Created
- C:\Program Files\7-Zip\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\7-Zip\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\7-Zip\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\7-Zip\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\DESIGNER\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\DESIGNER\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\DESIGNER\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\DESIGNER\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\DW\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\DW\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\DW\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\DW\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\EQUATION\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\EQUATION\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\EQUATION\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\EQUATION\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\EURO\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\EURO\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\EURO\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\EURO\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\Filters\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\Filters\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\Filters\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\Filters\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Open
- C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.EPS
- 328 15067
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.EPS
- MD5: d3007c3e7b0e5b30dfc1295e449f440f
- SHA1: a1022e7b674ab0d235791f4910f4c368b673288e
- 328 15486
- File
- Rename
- Old Name: C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.EPS
- New Name: C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.EPS.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: d3007c3e7b0e5b30dfc1295e449f440f
- SHA1: a1022e7b674ab0d235791f4910f4c368b673288e
- 328 15486
- File
- Open
- C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.JPG
- 328 1061
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.JPG
- MD5: fb07fd36bd0824911a539ecc66364d04
- SHA1: 90f55ec08f6b654ce022e46c9c01ed85797f43a4
- 328 1486
- File
- Rename
- Old Name: C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.JPG
- New Name: C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.JPG.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: fb07fd36bd0824911a539ecc66364d04
- SHA1: 90f55ec08f6b654ce022e46c9c01ed85797f43a4
- 328 1486
- File
- Open
- C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.PNG
- 328 1682
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.PNG
- MD5: 91c663e38812ffe892bc660c83e69597
- SHA1: 26fa5da4c53031a1c61d6a3029a38b1f15f6e556
- 328 2110
- File
- Rename
- Old Name: C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.PNG
- New Name: C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.PNG.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- MD5: 91c663e38812ffe892bc660c83e69597
- SHA1: 26fa5da4c53031a1c61d6a3029a38b1f15f6e556
- 328 2110
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\Help\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\Help\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\Help\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\Help\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\how_recover+sia.html
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\how_recover+sia.html
- MD5: cc8771cf3419bf0f5d9086c5e24dbba0
- SHA1: 597094f82fc2949d527748bf1385e60405437d1d
- 328 9372
- File
- Created
- C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\how_recover+sia.txt
- 328
- File
- Close
- C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\how_recover+sia.txt
- MD5: dfd795e9766d0000c6b098809bd6eb64
- SHA1: 27a30f8981fe9229c0b20a1b4e2818fe5516673e
- 328 2639
- 1014 Repeated items skipped
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- File
- Rename
- Old Name: C:\Program Files\Java\jre1.7.0_0\lib\jvm.hprof.txt
- New Name: C:\Program Files\Java\jre1.7.0_0\lib\jvm.hprof.txt.vvv
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 328 4654
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: kernel32.dll
- 328
- Malicious Alert
- High Repeated Sleep Calls
- Message: High repeated sleep calls Detail: High repeated number of sleep calls
- 591 Repeated items skipped
- API Call
- API Name: ShellExecuteW Address: 0x0041f74d
- Params: [0x0, open, C:\Users\Administrator\Desktop\Howto_RESTORE_FILES
- .txt, NULL, NULL, 1]
- Imagepath: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe DLL Name: Shell32.dll
- 328
- Process
- Opened
- Target: N\AB Source: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- 2232
- 328
- Process
- Started
- C:\Windows\SysWOW64\notepad.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Administrator\Desktop\Howto_RESTORE_FILES.txt
- MD5: d378bffb70923139d6a4f546864aa61c
- 2232 328
- Malicious Alert
- Decoy Activity
- Message: Decoy Application Started Detail: Decoy Application Started
- Malicious Alert
- Misc Anom
- Message: Suspicious Decoy Activity Detail: Suspicious Decoy Activity
- 52 Repeated items skipped
- Process
- Terminated
- C:\Windows\System32\vssadmin.exe
- Parentname: C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Command Line: N/A
- 2340 328
- Process
- Terminated
- C:\Users\Administrator\AppData\Roaming\icwyx-a.exe
- Parentname: C:\Users\Administrator\AppData\Local\Temp\73.exe
- Command Line: N/A
- 328 2252
- Malicious Alert
- Suspicious Persistance Activity
- Message: New file in AppData added to Run regkey Detail: Process drops a file in AppData then adds to Run regkey
- Malicious Alert
- Misc Anom
- Message: Suspicious Persistence Activity Detail: Suspicious Persistence Activity
- Malicious Alert
- Generic Anomalous Activity
- Message: Process Opening explorer Detail: Process Opening Explorer
- Malicious Alert
- Misc Anom
- Message: Process Open with Root process deleted Detail: Process deleting itself
- Malicious Alert
- Suspicious Persistance Activity
- Message: Startup services added for file Detail: Process adding itself (non-DLL) to windows startup areas for file
- OS Change Detail (version: 1.1290) | Items: 961 | OS Info: Microsoft WindowsXP 32-bit 5.1 sp3 15.0826 Top
- Type Mode/Class Details (Path/Message/Protocol/Hostname/Qtype/ListenPort etc.) Process ID Parent ID File Size
- Analysis
- Malware
- Application
- 3 Repeated items skipped
- Config Update
- Uac
- Service
- Telephony
- Uac
- Service
- Remote Access Connection Manager
- Process
- Started
- C:\Documents and Settings\admin\Local Settings\Temp\73.exe
- Parentname: C:\WINDOWS\explorer.exe
- Command Line: "C:\DOCUME~1\admin\LOCALS~1\Temp\73.exe"
- MD5: 446071be407efeb4e0d7c83bb504774a
- SHA1: ef06d2b504ce08b2d6570ca4b4f923a1ad428f7a
- 1240 2684 400384
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\LPK.DLL
- 1240
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\USP10.dll
- 1240
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 1240
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\a.Config
- 1240
- API Call
- API Name: GetSystemDirectoryA Address: 0x77121df1
- Params: [0x771a1290, 260]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- Process
- Duplicate Opened
- Target: C:\Documents and Settings\admin\Local Settings\Temp\73.exe Source: C:\Documents and Settings\admin\Local Settings\Temp\73.exe
- 1240
- 1240
- 1240
- 1240
- API Call
- API Name: GetSystemTime Address: 0x63004857
- Params: [0x128c3c]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- API Call
- API Name: SystemTimeToFileTime Address: 0x63004862
- Params: [0x128c3c, 0x630b19f8]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\SOFTWARE\Microsoft\Windows\CurrentVersio
- n\Internet Settings
- 1240
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\User Shell Folders
- 1240
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"AppData" = C:\Documents and Settings\admin\Application Data
- 1240
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- 8 Repeated items skipped
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\CLBCATQ.DLL
- 1240
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\COMRes.dll
- 1240
- API Call
- API Name: GetSystemDirectoryW Address: 0x76fd7ee4
- Params: [0x77043650, 261]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- Mutex
- \BaseNamedObjects\AMResourceMutex2
- 1240
- Mutex
- \BaseNamedObjects\VideoRenderer
- 1240
- API Call
- API Name: GetSystemDirectoryA Address: 0x74723c7f
- Params: [0xfcf568, 261]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- API Call
- API Name: GetSystemDirectoryA Address: 0x74723c7f
- Params: [0xfcf570, 261]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- Mutex
- \BaseNamedObjects\CTF.LBES.MutexDefaultS-1-5-21-1409082233-688789844-725345543-1003
- 1240
- Mutex
- \BaseNamedObjects\CTF.Compart.MutexDefaultS-1-5-21-1409082233-688789844-725345543-1003
- 1240
- Mutex
- \BaseNamedObjects\CTF.Asm.MutexDefaultS-1-5-21-1409082233-688789844-725345543-1003
- 1240
- Mutex
- \BaseNamedObjects\CTF.Layouts.MutexDefaultS-1-5-21-1409082233-688789844-725345543-1003
- 1240
- Mutex
- \BaseNamedObjects\CTF.TMD.MutexDefaultS-1-5-21-1409082233-688789844-725345543-1003
- 1240
- API Call
- API Name: GetSystemDirectoryA Address: 0x74723c7f
- Params: [0xfcf4bc, 261]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- Mutex
- \BaseNamedObjects\CTF.TimListCache.FMPDefaultS-1-5-21-1409082233-688789844-725345543-1003MUTEX.Defau
- ltS-1-5-21-1409082233-688789844-725345543-1003
- 1240
- API Call
- API Name: SetWindowsHookExA Address: 0x7473097c
- Params: [2, 0x747307c3, 0x74720000, 736]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: user32.dll
- 1240
- API Call
- API Name: SetWindowsHookExA Address: 0x7473099a
- Params: [7, 0x747304cd, 0x74720000, 736]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: user32.dll
- 1240
- API Call
- API Name: GetSystemDirectoryW Address: 0x763982be
- Params: [0xfcef98, 260]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- API Call
- API Name: GetSystemDirectoryW Address: 0x763982be
- Params: [0xfcf548, 260]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- API Call
- API Name: GetSystemDirectoryA Address: 0x755dd289
- Params: [0xfceb8c, 261]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- API Call
- API Name: GetSystemDirectoryA Address: 0x755dd289
- Params: [0xfcf630, 261]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- API Call
- API Name: GetSystemDirectoryW Address: 0x763982be
- Params: [0xfcf1b8, 260]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\MSVFW32.dll
- 1240
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"CD Burning" = C:\Documents and Settings\admin\Local Settings\Applicatio
- n Data\Microsoft\CD Burning
- 1240
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\User Shell Folders
- 1240
- Folder
- Open
- C:\Documents and Settings\admin\My Documents
- 1240
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"Personal" = C:\Documents and Settings\admin\My Documents
- 1240
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\User Shell Folders
- 1240
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"Desktop" = C:\Documents and Settings\admin\Desktop
- 1240
- Regkey
- Added
- \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
- 1240
- Regkey
- Added
- \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
- 1240
- Regkey
- Setval
- \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\"Common Desktop"
- = C:\Documents and Settings\All Users\Desktop
- 1240
- Regkey
- Added
- \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
- 1240
- Regkey
- Setval
- \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\"Common AppData"
- = C:\Documents and Settings\All Users\Application Data
- 1240
- API Call
- API Name: NtAdjustPrivilegesToken Address: 0x77ddf01a
- Params: [SeDebugPrivilege, Enabled]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: ntdll.dll
- 1240
- API Call
- API Name: GetTokenInformation Address: 0x0041e934
- Params: [0x1c4, 0x19]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: advapi32.dll
- 1240
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- 4 Repeated items skipped
- File
- Failed
- C:\Documents and Settings\admin\Application Data\73.exe
- 1240
- File
- Created
- C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1240
- Malicious Alert
- Malicious Directory
- Message: Executable file created in suspicious location Detail: Process creating executable file in suspicious location
- Malicious Alert
- Misc Anom
- Message: Generic Trojan Behavior Detail: Generic Trojan Behavior
- File
- Date Change
- C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1240 400384
- File
- Close
- C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 446071be407efeb4e0d7c83bb504774a
- SHA1: ef06d2b504ce08b2d6570ca4b4f923a1ad428f7a
- 1240 400384
- File
- Failed
- C:\Documents
- 1240
- File
- Failed
- C:\Documents.exe
- 1240
- File
- Failed
- C:\Documents and
- 1240
- File
- Failed
- C:\Documents and.exe
- 1240
- File
- Failed
- C:\Documents and Settings\admin\Application
- 1240
- File
- Failed
- C:\Documents and Settings\admin\Application.exe
- 1240
- Process
- Started
- C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- Parentname: C:\Documents and Settings\admin\Local Settings\Temp\73.exe
- Command Line: "C:\Documents and Settings\admin\Application Data\ignmy-a.exe"
- MD5: 446071be407efeb4e0d7c83bb504774a
- SHA1: ef06d2b504ce08b2d6570ca4b4f923a1ad428f7a
- 828 1240 400384
- Malicious Alert
- Process Cloned
- Message: Process clones and starts itself Detail: Process clones and starts itself
- API Call
- API Name: ShellExecuteW Address: 0x0041f88d
- Params: [0x0, NULL, C:\WINDOWS\system32\cmd.exe, /c DEL C:\DOCUME~1\admin\LOCALS~1\Temp\73.exe, NULL, 0]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: Shell32.dll
- 1240
- Malicious Alert
- Generic Anomalous Activity
- Message: Hidden ShellExecute call made Detail: Hidden ShellExecute call made
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\netapi32.dll
- 1240
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\SETUPAPI.dll
- 1240
- File
- Failed
- C:\Documents and Settings\admin\Application Data\LPK.DLL
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\USP10.dll
- 828
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\MountPoints2\{e319f02e-31a9-11e1-9a3f-806d6172696f}\"BaseClass" = Drive
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\MountPoints2\{e319f02c-31a9-11e1-9a3f-806d6172696f}\"BaseClass" = Drive
- 1240
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 828
- Regkey
- Added
- \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
- 1240
- Regkey
- Setval
- \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\"Common Documents
- " = C:\Documents and Settings\All Users\Documents
- 1240
- Mutex
- \BaseNamedObjects\ZonesCounterMutex
- 1240
- Mutex
- \BaseNamedObjects\ZoneAttributeCacheCounterMutex
- 1240
- Mutex
- \BaseNamedObjects\ZonesCacheCounterMutex
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"ProxyBypass" = 0x00000001
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"IntranetName" = 0x00000001
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000001
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001
- 1240
- Mutex
- \BaseNamedObjects\ZoneAttributeCacheCounterMutex
- 1240
- Mutex
- \BaseNamedObjects\ZonesLockedCacheCounterMutex
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"ProxyBypass" = 0x00000001
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"IntranetName" = 0x00000001
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000001
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001
- 1240
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"Cache" = C:\Documents and Settings\admin\Local Settings\Temporary Inter
- net Files
- 1240
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\User Shell Folders
- 1240
- Folder
- Open
- C:\Documents and Settings\admin\Cookies
- 1240
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 1240
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"Cookies" = C:\Documents and Settings\admin\Cookies
- 1240
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\a.Config
- 828
- API Call
- API Name: GetSystemDirectoryA Address: 0x77121df1
- Params: [0x771a1290, 260]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Process
- Duplicate Opened
- Target: C:\Documents and Settings\admin\Application Data\ignmy-a.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 828
- 828
- 828
- 828
- API Call
- API Name: GetSystemTime Address: 0x63004857
- Params: [0x128c3c]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: SystemTimeToFileTime Address: 0x63004862
- Params: [0x128c3c, 0x630b19f8]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\SOFTWARE\Microsoft\Windows\CurrentVersio
- n\Internet Settings
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\User Shell Folders
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"AppData" = C:\Documents and Settings\admin\Application Data
- 828
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Process
- Started
- C:\WINDOWS\system32\cmd.exe
- Parentname: C:\Documents and Settings\admin\Local Settings\Temp\73.exe
- Command Line: "C:\WINDOWS\system32\cmd.exe" /c DEL C:\DOCUME~1\admin\LOCALS~1\Temp\73.exe
- MD5: 6d778e0f95447e6546553eeea709d03c
- SHA1: 811a005cf787c6ccbe0d9f1c36c1d49a9cb71fd1
- 1268 1240 389120
- API Call
- API Name: GetSystemDirectoryW Address: 0x755dd323
- Params: [0x12fab4, 261]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- API Call
- API Name: GetSystemDirectoryW Address: 0x755dd323
- Params: [0x12fab4, 261]
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe DLL Name: kernel32.dll
- 1240
- Mutex
- \BaseNamedObjects\VideoRenderer
- 1240
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- 3 Repeated items skipped
- Mutex
- \BaseNamedObjects\SHIMLIB_LOG_MUTEX
- 1268
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Multimedia\Audio
- 1268
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Multimedia\Audio Comp
- ression Manager\
- 1268
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Multimedia\Audio Comp
- ression Manager\MSACM
- 1268
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Multimedia\Audio Comp
- ression Manager\
- 1268
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Multimedia\Audio Comp
- ression Manager\Priority v4.00
- 1268
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Process
- Terminated
- C:\Documents and Settings\admin\Local Settings\Temp\73.exe
- Parentname: C:\WINDOWS\explorer.exe
- Command Line: N/A
- 1240 2684
- File
- Failed
- C:\Documents and Settings\admin\Application Data\CLBCATQ.DLL
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\COMRes.dll
- 828
- API Call
- API Name: GetSystemDirectoryW Address: 0x76fd7ee4
- Params: [0x77043650, 261]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Mutex
- \BaseNamedObjects\AMResourceMutex2
- 828
- Mutex
- \BaseNamedObjects\VideoRenderer
- 828
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 1268
- API Call
- API Name: GetSystemDirectoryA Address: 0x74723c7f
- Params: [0xfcf568, 261]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: GetSystemDirectoryA Address: 0x74723c7f
- Params: [0xfcf570, 261]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Mutex
- \BaseNamedObjects\CTF.LBES.MutexDefaultS-1-5-21-1409082233-688789844-725345543-1003
- 828
- Mutex
- \BaseNamedObjects\CTF.Compart.MutexDefaultS-1-5-21-1409082233-688789844-725345543-1003
- 828
- Mutex
- \BaseNamedObjects\CTF.Asm.MutexDefaultS-1-5-21-1409082233-688789844-725345543-1003
- 828
- Mutex
- \BaseNamedObjects\CTF.Layouts.MutexDefaultS-1-5-21-1409082233-688789844-725345543-1003
- 828
- Mutex
- \BaseNamedObjects\CTF.TMD.MutexDefaultS-1-5-21-1409082233-688789844-725345543-1003
- 828
- API Call
- API Name: GetSystemDirectoryA Address: 0x74723c7f
- Params: [0xfcf4bc, 261]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Mutex
- \BaseNamedObjects\CTF.TimListCache.FMPDefaultS-1-5-21-1409082233-688789844-725345543-1003MUTEX.Defau
- ltS-1-5-21-1409082233-688789844-725345543-1003
- 828
- API Call
- API Name: SetWindowsHookExA Address: 0x7473097c
- Params: [2, 0x747307c3, 0x74720000, 856]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: user32.dll
- 828
- API Call
- API Name: SetWindowsHookExA Address: 0x7473099a
- Params: [7, 0x747304cd, 0x74720000, 856]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: user32.dll
- 828
- API Call
- API Name: GetSystemDirectoryW Address: 0x763982be
- Params: [0xfcef98, 260]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: GetSystemDirectoryW Address: 0x763982be
- Params: [0xfcf548, 260]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: GetSystemDirectoryA Address: 0x755dd289
- Params: [0xfceb8c, 261]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: GetSystemDirectoryA Address: 0x755dd289
- Params: [0xfcf630, 261]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: GetSystemDirectoryW Address: 0x763982be
- Params: [0xfcf1b8, 260]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\MSVFW32.dll
- 828
- File
- Delete
- C:\Documents and Settings\admin\Local Settings\Temp\73.exe
- MD5: 446071be407efeb4e0d7c83bb504774a
- SHA1: ef06d2b504ce08b2d6570ca4b4f923a1ad428f7a
- 1268 400384
- Malicious Alert
- Self Delete
- Message: Self deletion using batch file Detail: Process deleting itself using a batch file
- Malicious Alert
- Self Delete
- Message: Root process deleted Detail: Process deleting itself
- Process
- Terminated
- C:\WINDOWS\system32\cmd.exe
- Parentname: C:\DOCUME~1\admin\LOCALS~1\Temp\73.exe
- Command Line: N/A
- 1268 1240
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"CD Burning" = C:\Documents and Settings\admin\Local Settings\Applicatio
- n Data\Microsoft\CD Burning
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\User Shell Folders
- 828
- Folder
- Open
- C:\Documents and Settings\admin\My Documents
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"Personal" = C:\Documents and Settings\admin\My Documents
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\User Shell Folders
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"Desktop" = C:\Documents and Settings\admin\Desktop
- 828
- Regkey
- Added
- \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
- 828
- Regkey
- Added
- \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
- 828
- Regkey
- Setval
- \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\"Common Desktop"
- = C:\Documents and Settings\All Users\Desktop
- 828
- Regkey
- Added
- \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
- 828
- Regkey
- Setval
- \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\"Common AppData"
- = C:\Documents and Settings\All Users\Application Data
- 828
- API Call
- API Name: NtAdjustPrivilegesToken Address: 0x77ddf01a
- Params: [SeDebugPrivilege, Enabled]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: ntdll.dll
- 828
- API Call
- API Name: GetTokenInformation Address: 0x0041e934
- Params: [0x1c4, 0x19]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: advapi32.dll
- 828
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: Sleep Address: 0x0042232d
- Params: [15]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- 4 Repeated items skipped
- Mutex
- \BaseNamedObjects\78456214324124
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\bcdedit.exe
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\bcdedit.exe
- 828
- File
- Failed
- C:\WINDOWS\system\bcdedit.exe
- 828
- File
- Failed
- C:\WINDOWS\bcdedit.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\bcdedit.exe
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\bcdedit.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\bcdedit.exe
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\bcdedit.exe
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\BCDEDIT.EXE \SET.EXE
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe \set.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\BCDEDIT.EXE \SET.EXE
- 828
- File
- Failed
- C:\WINDOWS\system\BCDEDIT.EXE \SET.EXE
- 828
- File
- Failed
- C:\WINDOWS\BCDEDIT.EXE \SET.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\BCDEDIT.EXE \SET.EXE
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\BCDEDIT.EXE \SET.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\BCDEDIT.EXE \SET.EXE
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\BCDEDIT.EXE \SET.EXE
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\BCDEDIT.EXE \SET {CURRENT}.EXE
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe \set {current}.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\BCDEDIT.EXE \SET {CURRENT}.EXE
- 828
- File
- Failed
- C:\WINDOWS\system\BCDEDIT.EXE \SET {CURRENT}.EXE
- 828
- File
- Failed
- C:\WINDOWS\BCDEDIT.EXE \SET {CURRENT}.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\BCDEDIT.EXE \SET {CURRENT}.EXE
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\BCDEDIT.EXE \SET {CURRENT}.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\BCDEDIT.EXE \SET {CURRENT}.EXE
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\BCDEDIT.EXE \SET {CURRENT}.EXE
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\BCDEDIT.EXE \SET {CURRENT} BOOTEMS.EXE
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe \set {current} bootems.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\BCDEDIT.EXE \SET {CURRENT} BOOTEMS.EXE
- 828
- File
- Failed
- C:\WINDOWS\system\BCDEDIT.EXE \SET {CURRENT} BOOTEMS.EXE
- 828
- File
- Failed
- C:\WINDOWS\BCDEDIT.EXE \SET {CURRENT} BOOTEMS.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\BCDEDIT.EXE \SET {CURRENT} BOOTEMS.EXE
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\BCDEDIT.EXE \SET {CURRENT} BOOTEMS.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\BCDEDIT.EXE \SET {CURRENT} BOOTEMS.EXE
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\BCDEDIT.EXE \SET {CURRENT} BOOTEMS.EXE
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\BCDEDIT.EXE \SET {CURRENT} BOOTEMS OFF.EXE
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe \set {current} bootems off.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\BCDEDIT.EXE \SET {CURRENT} BOOTEMS OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\system\BCDEDIT.EXE \SET {CURRENT} BOOTEMS OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\BCDEDIT.EXE \SET {CURRENT} BOOTEMS OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\BCDEDIT.EXE \SET {CURRENT} BOOTEMS OFF.EXE
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\BCDEDIT.EXE \SET {CURRENT} BOOTEMS OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\BCDEDIT.EXE \SET {CURRENT} BOOTEMS OFF.EXE
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\BCDEDIT.EXE \SET {CURRENT} BOOTEMS OFF.EXE
- 828
- API Call
- API Name: ProcessCreate_Failure Address: 0x7c81d627
- Params: [NULL, bcdedit.exe /set {current} bootems off, 32, NULL]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: dummy.dll
- 828
- API Call
- API Name: Sleep Address: 0x0041df48
- Params: [1000]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS.EXE
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe \set {current} advancedoptions.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS.EXE
- 828
- File
- Failed
- C:\WINDOWS\system\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS.EXE
- 828
- File
- Failed
- C:\WINDOWS\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS.EXE
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS.EXE
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS.EXE
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS OFF.EXE
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe \set {current} advancedoptions off.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\system\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS OFF.EXE
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS OFF.EXE
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\BCDEDIT.EXE \SET {CURRENT} ADVANCEDOPTIONS OFF.EX
- E
- 828
- API Call
- API Name: ProcessCreate_Failure Address: 0x7c81d627
- Params: [NULL, bcdedit.exe /set {current} advancedoptions off, 32, NULL]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: dummy.dll
- 828
- API Call
- API Name: Sleep Address: 0x0041df48
- Params: [1000]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT.EXE
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe \set {current} optionsedit.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT.EXE
- 828
- File
- Failed
- C:\WINDOWS\system\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT.EXE
- 828
- File
- Failed
- C:\WINDOWS\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT.EXE
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT.EXE
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT.EXE
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT OFF.EXE
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe \set {current} optionsedit off.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\system\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT OFF.EXE
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT OFF.EXE
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\BCDEDIT.EXE \SET {CURRENT} OPTIONSEDIT OFF.EXE
- 828
- API Call
- API Name: ProcessCreate_Failure Address: 0x7c81d627
- Params: [NULL, bcdedit.exe /set {current} optionsedit off, 32, NULL]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: dummy.dll
- 828
- API Call
- API Name: Sleep Address: 0x0041df48
- Params: [1000]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: ProcessCreate_Failure Address: 0x7c81d627
- Params: [NULL, bcdedit.exe /set {current} bootstatuspolicy Ignore
- AllFailures, 32, NULL]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: dummy.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY.EXE
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe \set {current} bootstatuspolicy.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY.EXE
- 828
- File
- Failed
- C:\WINDOWS\system\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY.EXE
- 828
- File
- Failed
- C:\WINDOWS\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY.EXE
- 828
- API Call
- API Name: Sleep Address: 0x0041df48
- Params: [1000]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY.EXE
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY.EXE
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY IGNOREA
- LLFAILURES.EXE
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe \set {current} bootstatuspolicy IgnoreAllFailures.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY IGNOREALLFAILURES.EXE
- 828
- File
- Failed
- C:\WINDOWS\system\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY IGNOREALLFAILURES.EXE
- 828
- File
- Failed
- C:\WINDOWS\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY IGNOREALLFAILURES.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY IGNOREALLFAILURES.EXE
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY IGNOREALLFAILURES.EX
- E
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY IGNOREALLFAIL
- URES.EXE
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\BCDEDIT.EXE \SET {CURRENT} BOOTSTATUSPOLICY IGNOR
- EALLFAILURES.EXE
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED.EXE
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe \set {current} recoveryenabled.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED.EXE
- 828
- File
- Failed
- C:\WINDOWS\system\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED.EXE
- 828
- File
- Failed
- C:\WINDOWS\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED.EXE
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED.EXE
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED.EXE
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED OFF.EXE
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\bcdedit.exe \set {current} recoveryenabled off.exe
- 828
- File
- Failed
- C:\WINDOWS\system32\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\system\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\wbem\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED OFF.EXE
- 828
- File
- Failed
- C:\Program Files\QuickTime\QTSystem\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED OFF.EXE
- 828
- File
- Failed
- C:\WINDOWS\system32\WindowsPowerShell\v1.0\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED OFF.EXE
- 828
- File
- Failed
- C:\Program Files\Debugging Tools for Windows (x86)\BCDEDIT.EXE \SET {CURRENT} RECOVERYENABLED OFF.EX
- E
- 828
- API Call
- API Name: ProcessCreate_Failure Address: 0x7c81d627
- Params: [NULL, bcdedit.exe /set {current} recoveryenabled off, 32, NULL]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: dummy.dll
- 828
- API Call
- API Name: Sleep Address: 0x0041df48
- Params: [1000]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\zsys\
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\NETAPI32.DLL
- 828
- API Call
- API Name: CryptAcquireContextW Address: 0x0041baf8
- Params: [NULL, NULL, 1, 4026531840]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: advapi32.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\rsaenh.dll
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\rsaenh.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\crypt32.dll
- 828
- API Call
- API Name: CryptAcquireContextW Address: 0x0041bb4c
- Params: [NULL, Intel Hardware Cryptographic Service Provider, 22, 0]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: advapi32.dll
- 828
- API Call
- API Name: Process32First Address: 0x0041bda4
- Params: [0x1d4, 0x12d488]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Malicious Alert
- Generic Anomalous Activity
- Message: Enumerating running processes Detail: Process is enumerating running processes
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\zsys\"ID" = 93 dc 43 d8 a6 62 c
- 9 f2
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\93DC43D8A662C9F2
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\93DC43D8A662C9F2\"data" = 31 4c
- 64 52 4b 70 31 67 63 48 4c 47 67 6b 58 34 6f 33 64 6b 59 66 57 68 38 4d 6e 79 46 52 4a 33 77 38
- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 d5 ea aa e5 0e 4b 19 24 b8 03 93 90 cb 11 2f aa 98 9
- 6 6f c0 87 32 a7 bb 69 92 e4 54 be 10 a5 c9 61 23 a5 8f 1d 4d cc bc d7 d6 b1 01 26 14 8f c2 8e fd
- 1d 43 21 51 7c ba 81 af 47 f0 92 aa 40 0f 00 00 35 32 39 37 37 36 31 35 42 34 38 45 46 42 39 35
- 45 38 31 35 32 34 33 37 44 30 30 46 34 37 36 35 30 30 33 38 43 45 41 37 31 38 34 37 37 43 30 39 3
- 8 46 31 43 41 34 46 44 33 30 36 45 33 31 43 45 46 35 45 46 30 39 31 35 35 38 36 35 33 42 33 35 37
- 32 44 46 43 33 44 42 45 31 45 34 46 45 46 33 44 32 31 34 38 33 30 38 38 44 34 34 36 33 33 39 36
- 33 30 34 36 43 35 38 36 31 31 45 38 34 31 33 00 00 00 00 04 86 87 1a 27 46 b0 11 1d 8d d4 bc aa 6
- 7 a5 db 04 0f 61 63 07 31 36 b9 c8 28 0f a6 7e 38 a8 49 d8 01 ca c2 d9 26 94 4f cb 47 37 aa a7 92
- d5 19 b5 28 a8 66 90 66 9e bd dd 6a 61 92 b0 52 a5 73 e2 00 00 00 00 00 00 00 00 d3 4d 61 56 00
- 00 00 00
- 828
- Regkey
- Added
- \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
- 828
- Regkey
- Setval
- \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\"EnableLinkedConnections
- " = 0x00000001
- 828
- Malicious Alert
- Misc Anom
- Message: Process deleting itself Detail: Process deleting itself in any manor
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Run
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Run\"Acronis" = C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 828
- Malicious Alert
- Suspicious Persistance Activity
- Message: Startup services added for file in suspicious folder Detail: Process adding itself (non-DLL) to windows startup areas for file in suspicious folder
- Malicious Alert
- Misc Anom
- Message: Suspicious Persistence Activity Detail: Suspicious Persistence Activity
- API Call
- API Name: CryptAcquireContextA Address: 0x00412c1f
- Params: [NULL, NULL, 1, 4026531840]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: advapi32.dll
- 828
- API Call
- API Name: SetWindowsHookExA Address: 0x7473097c
- Params: [2, 0x747307c3, 0x74720000, 1248]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: user32.dll
- 828
- API Call
- API Name: SetWindowsHookExA Address: 0x7473099a
- Params: [7, 0x747304cd, 0x74720000, 1248]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: user32.dll
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\vssadmin.exe
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\SessionInfo\00000000000096c5
- 828
- API Call
- API Name: CryptAcquireContextA Address: 0x00412c1f
- Params: [NULL, NULL, 1, 4026531840]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: advapi32.dll
- 828
- API Call
- API Name: CryptAcquireContextA Address: 0x00412c1f
- Params: [NULL, NULL, 1, 4026531840]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: advapi32.dll
- 828
- 15 Repeated items skipped
- Regkey
- Added
- \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Blocked
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Shell Extensions\Blocked
- 828
- Regkey
- Added
- \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Shell Extensions\Cached
- 828
- API Call
- API Name: CryptAcquireContextA Address: 0x00412c1f
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: advapi32.dll
- 828
- API Call
- API Name: CryptAcquireContextA Address: 0x00412c1f
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: advapi32.dll
- 828
- 9 Repeated items skipped
- File
- Created
- C:\Documents and Settings\admin\My Documents\recover_file_mlybivbbx.txt
- 828
- File
- Close
- C:\Documents and Settings\admin\My Documents\recover_file_mlybivbbx.txt
- MD5: 68762e4c1ea6cb0f69be439806dddb61
- SHA1: 226922713f62c2df0d0dc38705e51479861ae10a
- 828 254
- Process
- Opened
- Target: System Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 4
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\smss.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 316
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\csrss.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 420
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\winlogon.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 444
- 828
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: GetSystemDirectoryW Address: 0x77f78688
- Params: [0x113e938, 260]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\services.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 552
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\lsass.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 564
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 716
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 776
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 840
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 892
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\spoolsv.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1164
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\alg.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1800
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\wscntfy.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1864
- 828
- Process
- Opened
- Target: C:\Program Files\Messenger\msmsgs.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1900
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\ctfmon.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1924
- 828
- Process
- Opened
- Target: C:\WINDOWS\explorer.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 2684
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer\iexplore.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 2768
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer\iexplore.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 3048
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer7\iexplore.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 3132
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer6\IEXPLORE.EXE Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 3184
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\wbem\wmiprvse.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 908
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"Cache" = C:\Documents and Settings\admin\Local Settings\Temporary Inter
- net Files
- 828
- Mutex
- \BaseNamedObjects\ZonesCounterMutex
- 828
- Mutex
- \BaseNamedObjects\ZoneAttributeCacheCounterMutex
- 828
- Mutex
- \BaseNamedObjects\ZonesCacheCounterMutex
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"ProxyBypass" = 0x00000001
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"IntranetName" = 0x00000001
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000001
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001
- 828
- Mutex
- \BaseNamedObjects\ZoneAttributeCacheCounterMutex
- 828
- Mutex
- \BaseNamedObjects\ZonesLockedCacheCounterMutex
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"ProxyBypass" = 0x00000001
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"IntranetName" = 0x00000001
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000001
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001
- 828
- Folder
- Hide
- C:\Documents and Settings\admin\Local Settings\Temporary Internet Files
- 828
- Folder
- Open
- C:\Documents and Settings\admin\Cookies
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"Cookies" = C:\Documents and Settings\admin\Cookies
- 828
- Process
- Opened
- Target: System Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 4
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\smss.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 316
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\csrss.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 420
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\winlogon.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 444
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\services.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 552
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\lsass.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 564
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 716
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 776
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 840
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 892
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\spoolsv.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1164
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\alg.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1800
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\wscntfy.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1864
- 828
- Process
- Opened
- Target: C:\Program Files\Messenger\msmsgs.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1900
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\ctfmon.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1924
- 828
- Process
- Opened
- Target: C:\WINDOWS\explorer.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 2684
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer\iexplore.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 2768
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer\iexplore.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 3048
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer7\iexplore.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 3132
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer6\IEXPLORE.EXE Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 3184
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\wbem\wmiprvse.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 908
- 828
- Folder
- Hide
- C:\Documents and Settings\admin\Local Settings\Temporary Internet Files\Content.IE5
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\SETUPAPI.dll
- 828
- API Call
- API Name: GetSystemDirectoryW Address: 0x77927324
- Params: [0x113dde8, 260]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: GetComputerNameExW Address: 0x77927048
- Params: [0, 0x113de1c, 0x113de18]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 828
- API Call
- API Name: GetComputerNameExW Address: 0x779270ab
- Params: [3, 0x113de1c, 0x113de18]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"History" = C:\Documents and Settings\admin\Local Settings\History
- 828
- API Call
- API Name: GetVolumeNameForVolumeMountPointW Address: 0x7ca3f17e
- Params: [NULL, \\?\Volume{e319f02c-31a9-11e1-9a3f-806d6172696f}\]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: GetVolumeNameForVolumeMountPointW Address: 0x7ca3f17e
- Params: [NULL, \\?\Volume{e319f02e-31a9-11e1-9a3f-806d6172696f}\]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\MountPoints2\{e319f02e-31a9-11e1-9a3f-806d6172696f}\"BaseClass" = Drive
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\MountPoints2\{e319f02c-31a9-11e1-9a3f-806d6172696f}\"BaseClass" = Drive
- 828
- Folder
- Hide
- C:\Documents and Settings\admin\Local Settings\History
- 828
- Process
- Opened
- Target: System Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 4
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\smss.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 316
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\csrss.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 420
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\winlogon.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 444
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\services.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 552
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\lsass.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 564
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 716
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 776
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 840
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 892
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\spoolsv.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1164
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\alg.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1800
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\wscntfy.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1864
- 828
- Process
- Opened
- Target: C:\Program Files\Messenger\msmsgs.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1900
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\ctfmon.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1924
- 828
- Process
- Opened
- Target: C:\WINDOWS\explorer.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 2684
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer\iexplore.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 2768
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer\iexplore.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 3048
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer7\iexplore.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 3132
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer6\IEXPLORE.EXE Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 3184
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\wbem\wmiprvse.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 908
- 828
- Folder
- Hide
- C:\Documents and Settings\admin\Local Settings\History\History.IE5
- 828
- File
- Open
- C:\Documents and Settings\admin\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 828 65536
- Process
- Opened
- Target: System Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 4
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\smss.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 316
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\csrss.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 420
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\winlogon.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 444
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\services.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 552
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\lsass.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 564
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 716
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 776
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 840
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\svchost.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 892
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\spoolsv.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1164
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\alg.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1800
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\wscntfy.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1864
- 828
- Process
- Opened
- Target: C:\Program Files\Messenger\msmsgs.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1900
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\ctfmon.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 1924
- 828
- Process
- Opened
- Target: C:\WINDOWS\explorer.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 2684
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer\iexplore.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 2768
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer\iexplore.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 3048
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer7\iexplore.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 3132
- 828
- Process
- Opened
- Target: C:\Program Files\Internet Explorer6\IEXPLORE.EXE Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 3184
- 828
- Process
- Opened
- Target: C:\WINDOWS\system32\wbem\wmiprvse.exe Source: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 908
- 828
- Folder
- Hide
- C:\Documents and Settings\admin\Cookies
- 828
- File
- Open
- C:\Documents and Settings\admin\Cookies\index.dat
- 828 32768
- File
- Open
- C:\Documents and Settings\admin\Local Settings\History\History.IE5\index.dat
- 828 32768
- File
- Failed
- C:\Documents and Settings\admin\Application Data\ws2_32.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\WS2HELP.dll
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\ShellNoRoam\M
- UICache\"C:\WINDOWS\system32\vssadmin.exe" = Command Line Interface for Microsoft. Volume Shadow
- Copy Service
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\RASAPI32.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\rasman.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\TAPI32.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\rtutils.dll
- 828
- Regkey
- Added
- \REGISTRY\MACHINE\Software\Microsoft\Tracing
- 828
- API Call
- API Name: GetComputerNameW Address: 0x76e96391
- Params: [0x235fe50, 0x235fe48]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 828
- API Call
- API Name: GetSystemDirectoryW Address: 0x76ee27c6
- Params: [0x1f1da04, 261]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\User Shell Folders
- 828
- API Call
- API Name: GetComputerNameW Address: 0x769c6a9e
- Params: [0x1b4640, 0x1f1d474]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\msapsspc.dll
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\msapsspc.dll
- 828
- Regkey
- Queryvalue
- \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows NT\CurrentVer
- sion\Winlogon
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\schannel.dll
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\schannel.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\digest.dll
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\digest.dll
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\msnsspc.dll
- 828
- File
- Failed
- C:\DOCUME~1\admin\LOCALS~1\Temp\msnsspc.dll
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Explorer\Shell Folders\"AppData" = C:\Documents and Settings\admin\Application Data
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\Microsoft\NETWORK\CONNECTIONS\PBK
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\iphlpapi.dll
- 828
- File
- Find
- C:\*
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\sensapi.dll
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\windows\CurrentVersio
- n\Internet Settings\Connections
- 828
- 2 Repeated items skipped
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\windows\CurrentVersio
- n\Internet Settings
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\"ProxyEnable" = 0x00000000
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\"ProxyServer" = 10.0.0.2:8080
- 828
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\"ProxyOverride"
- 828
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\"AutoConfigURL"
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\windows\CurrentVersio
- n\Internet Settings\Connections
- 828
- 2 Repeated items skipped
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\Connections\"SavedLegacySettings" = 46 00 00 00 1d 00 00 00 01 00 00 00 0d 00
- 00 00 31 30 2e 30 2e 30 2e 32 3a 38 30 38 30 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 c0
- 7e dd d3 73 dc cc 01 01 00 00 00 0a 00 02 0f 00 00 00 00 00 00 00 00 00 00 00 00
- 828
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\SOFTWARE\Microsoft\Windows NT\CurrentVer
- sion\Network\Location Awareness
- 828
- File
- Failed
- C:\Documents and Settings\admin\Application Data\rasadhlp.dll
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\windows\CurrentVersio
- n\Internet Settings\Connections
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\windows\CurrentVersio
- n\Internet Settings
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\"ProxyEnable" = 0x00000000
- 828
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\"ProxyServer" = 10.0.0.2:8080
- 828
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\"ProxyOverride"
- 828
- Regkey
- Deleteval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\"AutoConfigURL"
- 828
- Regkey
- Added
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\windows\CurrentVersio
- n\Internet Settings\Connections
- 828
- 2 Repeated items skipped
- Regkey
- Setval
- \REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
- n\Internet Settings\Connections\"SavedLegacySettings" = 46 00 00 00 1e 00 00 00 01 00 00 00 0d 00
- 00 00 31 30 2e 30 2e 30 2e 32 3a 38 30 38 30 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 c0
- 7e dd d3 73 dc cc 01 01 00 00 00 0a 00 02 0f 00 00 00 00 00 00 00 00 00 00 00 00
- 828
- Process
- Started
- C:\WINDOWS\system32\vssadmin.exe
- Parentname: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- Command Line: "C:\WINDOWS\system32\vssadmin.exe"\"ComputerName"
- 1352
- Network
- Dns Query Answer
- Protocol Type: udp IP Address: 199.16.199.6 Hostname: woodenden.com
- Imagepath: c:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 828
- API Call
- API Name: GetSystemTime Address: 0x63004857
- Params: [0x1f1e148]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: SystemTimeToFileTime Address: 0x63004862
- Params: [0x1f1e148, 0x1f1e17c]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- API Call
- API Name: GetSystemDirectoryA Address: 0x76f28a9e
- Params: [0x1f1c208, 260]
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- Network
- Http Request
- Protocol Type: tcp Destination Port: 80 IP Address: 199.16.199.6
- Imagepath: c:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 828
- Network
- Dns Query
- Protocol Type: udp Qtype: Host Address Hostname: leboudoirdesbrunettes.com
- Imagepath: c:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 828
- Network
- Dns Query Answer
- Protocol Type: udp IP Address: 199.16.199.7 Hostname: leboudoirdesbrunettes.com
- Imagepath: c:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 828
- Process
- Terminated
- C:\WINDOWS\system32\vssadmin.exe
- Parentname: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- Command Line: N/A
- 1352 828
- Network
- Http Request
- Protocol Type: tcp Destination Port: 80 IP Address: 199.16.199.7
- Imagepath: c:\Documents and Settings\admin\Application Data\ignmy-a.exe
- 828
- Ransom
- C:\437mkrQZcep1\aimtSf.txt
- MD5: 4d8ae4cfa1959034def1a7b1172bc2c6
- Malicious Alert
- Ransomware
- Message: Ransomware Activity Detail: Ransomware Activity
- Malicious Alert
- Misc Anom
- Message: Ransomware Activity Detail: Ransomware Activity
- Ransom
- C:\437mkrQZcep1\hFJrzldGEg.jpg
- MD5: 4e4b1a9f927eccff628b530d163abff3
- Ransom
- C:\437mkrQZcep1\LMhaa.xls
- MD5: 80a3050f59fdf86c8799a450fb2259f1
- Ransom
- C:\437mkrQZcep1\MgVpgAw.png
- MD5: 6a9d07d0d215d8f2bca5d17730cc171c
- Ransom
- C:\437mkrQZcep1\niapTyWw.doc
- MD5: 68ef5047b50cb918de6b0c5d49120d14
- Ransom
- C:\437mkrQZcep1\QYVP-.ppt
- MD5: cb794d01ce6abf437c0281b5c919c210
- Ransom
- C:\a56VrfDAirK2\aZtoVT.ppt
- MD5: eccf91abf2b875e694917709601840bf
- Ransom
- C:\a56VrfDAirK2\MNQnQ.xls
- MD5: 977495f83b1cf06c8563ff789645232a
- Ransom
- C:\a56VrfDAirK2\prPKnbyNJ.jpg
- MD5: ad5fb195268d429c34e4769f59754674
- Ransom
- C:\a56VrfDAirK2\YiYsgUwK.doc
- MD5: de02e50e19b4d8a768fc0c2cea5019ae
- File
- Find
- C:\Documents and Settings\*
- 828
- File
- Find
- C:\Documents and Settings\*\*
- 828
- File
- Find
- C:\Documents and Settings\*\Application Data\*
- 828
- File
- Open
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\10.0\TMGrpPrm.sav
- 828 566
- File
- Close
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\10.0\TMGrpPrm.sav
- MD5: f4fd8bc8cf02daf4ad9301e5706cafad
- SHA1: 24ef513cdd97e97fb35b97febb6d8242f145dd11
- 828 990
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\10.0\TMGrpPrm.sav
- New Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\10.0\TMGrpPrm.sav.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: f4fd8bc8cf02daf4ad9301e5706cafad
- SHA1: 24ef513cdd97e97fb35b97febb6d8242f145dd11
- 828 990
- File
- Open
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\11.0\TMGrpPrm.sav
- 828 566
- File
- Close
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\11.0\TMGrpPrm.sav
- MD5: f4fd8bc8cf02daf4ad9301e5706cafad
- SHA1: 24ef513cdd97e97fb35b97febb6d8242f145dd11
- 828 990
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\11.0\TMGrpPrm.sav
- New Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\11.0\TMGrpPrm.sav.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: f4fd8bc8cf02daf4ad9301e5706cafad
- SHA1: 24ef513cdd97e97fb35b97febb6d8242f145dd11
- 828 990
- File
- Open
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\JavaScripts\glob.settings.js
- 828 10
- File
- Close
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\JavaScripts\glob.settings.js
- MD5: 2cf3092e1b8c9eb71c0d59bfe5e05b79
- SHA1: 1844f46ab3fa930896d9ef403c475a38bca8bda4
- 828 430
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\JavaScripts\glob.settings.js
- New Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\JavaScripts\glob.settings.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 2cf3092e1b8c9eb71c0d59bfe5e05b79
- SHA1: 1844f46ab3fa930896d9ef403c475a38bca8bda4
- 828 430
- File
- Open
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\TMGrpPrm.sav
- 828 566
- File
- Close
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\TMGrpPrm.sav
- MD5: f4fd8bc8cf02daf4ad9301e5706cafad
- SHA1: 24ef513cdd97e97fb35b97febb6d8242f145dd11
- 828 990
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\TMGrpPrm.sav
- New Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\TMGrpPrm.sav.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: f4fd8bc8cf02daf4ad9301e5706cafad
- SHA1: 24ef513cdd97e97fb35b97febb6d8242f145dd11
- 828 990
- File
- Open
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\Updater\udlog.txt
- 828 774
- File
- Close
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\Updater\udlog.txt
- MD5: 470073e1dd1beba9d5a04b19a0318f70
- SHA1: f07f6682e9172f35c162dbfb290374b0498936a8
- 828 1198
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\Updater\udlog.txt
- New Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\Updater\udlog.txt.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 470073e1dd1beba9d5a04b19a0318f70
- SHA1: f07f6682e9172f35c162dbfb290374b0498936a8
- 828 1198
- File
- Open
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\Updater\udstore.js
- 828 195
- File
- Close
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\Updater\udstore.js
- MD5: 8c3fbd228ab63d44c689dc6358020dce
- SHA1: c818db14547e2f06b9ed028b04a40c2858d82961
- 828 622
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\Updater\udstore.js
- New Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\7.0\Updater\udstore.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 8c3fbd228ab63d44c689dc6358020dce
- SHA1: c818db14547e2f06b9ed028b04a40c2858d82961
- 828 622
- File
- Open
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\8.0\TMGrpPrm.sav
- 828 566
- File
- Close
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\8.0\TMGrpPrm.sav
- MD5: f4fd8bc8cf02daf4ad9301e5706cafad
- SHA1: 24ef513cdd97e97fb35b97febb6d8242f145dd11
- 828 990
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\8.0\TMGrpPrm.sav
- New Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\8.0\TMGrpPrm.sav.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: f4fd8bc8cf02daf4ad9301e5706cafad
- SHA1: 24ef513cdd97e97fb35b97febb6d8242f145dd11
- 828 990
- File
- Open
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\9.0\TMDocs.sav
- 828 36
- File
- Close
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\9.0\TMDocs.sav
- MD5: 53b09fb0b6570696fbda75236b5d41ed
- SHA1: 384df1890d7118c540e4237c1ead8aeaa9c73781
- 828 462
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\9.0\TMDocs.sav
- New Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\9.0\TMDocs.sav.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 53b09fb0b6570696fbda75236b5d41ed
- SHA1: 384df1890d7118c540e4237c1ead8aeaa9c73781
- 828 462
- File
- Open
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\9.0\TMGrpPrm.sav
- 828 690
- File
- Close
- C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\9.0\TMGrpPrm.sav
- MD5: 9a292a758b37b5d7271aaa19d4da6543
- SHA1: a30bf63cb92fea7f35c508548e41e1f327a3d890
- 828 1118
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\9.0\TMGrpPrm.sav
- New Name: C:\Documents and Settings\admin\Application Data\Adobe\Acrobat\9.0\TMGrpPrm.sav.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 9a292a758b37b5d7271aaa19d4da6543
- SHA1: a30bf63cb92fea7f35c508548e41e1f327a3d890
- 828 1118
- Folder
- Open
- C:\Documents and Settings\admin\Application Data\Microsoft\Credentials
- 828
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- File
- Open
- C:\Documents and Settings\admin\Application Data\Microsoft\Internet Explorer\brndlog.txt
- 828 10381
- File
- Close
- C:\Documents and Settings\admin\Application Data\Microsoft\Internet Explorer\brndlog.txt
- MD5: ca776c9e3854b73cbab402558023d5f3
- SHA1: dfc42d478184a996a4ded74663bea3e72ea5903b
- 828 10798
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Microsoft\Internet Explorer\brndlog.txt
- New Name: C:\Documents and Settings\admin\Application Data\Microsoft\Internet Explorer\brndlog.txt.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: ca776c9e3854b73cbab402558023d5f3
- SHA1: dfc42d478184a996a4ded74663bea3e72ea5903b
- 828 10798
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- cookies.txt
- 828 157
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- cookies.txt
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- cookies.txt
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- cookies.txt.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\bootstrap.js
- 828 5393
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\bootstrap.js
- MD5: 9257a339bc16bfa83d4df49c7be0d0fc
- SHA1: 16e97dc6cf49936dc9c7cb02e4c27f6b2c23405f
- 828 5822
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\bootstrap.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\bootstrap.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 9257a339bc16bfa83d4df49c7be0d0fc
- SHA1: 16e97dc6cf49936dc9c7cb02e4c27f6b2c23405f
- 828 5822
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\components\harness.js
- 828 19915
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\components\harness.js
- MD5: a60058223f1423dd3df8c95a603ee797
- SHA1: 7bbdfcad0159251015a4ac6e64806f8022a6a70e
- 828 20334
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\components\harness.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\components\harness.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: a60058223f1423dd3df8c95a603ee797
- SHA1: 7bbdfcad0159251015a4ac6e64806f8022a6a70e
- 828 20334
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-data\te
- st-page-worker.js
- 828 905
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-data\te
- st-page-worker.js
- MD5: a4602a49fde11fd3680173b70e64de5d
- SHA1: 080f7b7a73a945639c6c0dadf5173444af2985a6
- 828 1326
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-data\te
- st-page-worker.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-data\te
- st-page-worker.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: a4602a49fde11fd3680173b70e64de5d
- SHA1: 080f7b7a73a945639c6c0dadf5173444af2985a6
- 828 1326
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\cli
- pboard.js
- 828 7688
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\cli
- pboard.js
- MD5: 3d725056aed161d73444282db8a55f3f
- SHA1: baf89b44292a2a13c5aa836e54a0c4793a35b926
- 828 8110
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\cli
- pboard.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\cli
- pboard.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 3d725056aed161d73444282db8a55f3f
- SHA1: baf89b44292a2a13c5aa836e54a0c4793a35b926
- 828 8110
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\con
- text-menu.js
- 828 42249
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\con
- text-menu.js
- MD5: be928e30b9548c9e5a1d87a02925e6be
- SHA1: f140ce34d62923d34c7e55938f63a2788b128626
- 828 42670
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\con
- text-menu.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\con
- text-menu.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: be928e30b9548c9e5a1d87a02925e6be
- SHA1: f140ce34d62923d34c7e55938f63a2788b128626
- 828 42670
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\hot
- keys.js
- 828 2928
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\hot
- keys.js
- MD5: 40ce8c542b2ef3138bc002d552a73a67
- SHA1: 977a6ca4a75d6e551ca5a755f15341828275a140
- 828 3358
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\hot
- keys.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\hot
- keys.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 40ce8c542b2ef3138bc002d552a73a67
- SHA1: 977a6ca4a75d6e551ca5a755f15341828275a140
- 828 3358
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\not
- ifications.js
- 828 3970
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\not
- ifications.js
- MD5: 54d1adc11e80dab2b38beeade4f37c4d
- SHA1: 2e7a29618d79abd068072b2e0f97de66cd361b4d
- 828 4398
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\not
- ifications.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\not
- ifications.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 54d1adc11e80dab2b38beeade4f37c4d
- SHA1: 2e7a29618d79abd068072b2e0f97de66cd361b4d
- 828 4398
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pag
- e-mod.js
- 828 8111
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pag
- e-mod.js
- MD5: 6f0dae913af72442293546ac04e0bd83
- SHA1: 0f26a41be23525f31f81a5849dc923f43f63f70e
- 828 8526
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pag
- e-mod.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pag
- e-mod.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 6f0dae913af72442293546ac04e0bd83
- SHA1: 0f26a41be23525f31f81a5849dc923f43f63f70e
- 828 8526
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pag
- e-worker.js
- 828 3813
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pag
- e-worker.js
- MD5: 86fd898e11de6e5504aa00499c83290f
- SHA1: a1c8744a84bd85e06539732fbe3e356cdf0627d4
- 828 4238
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pag
- e-worker.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pag
- e-worker.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 86fd898e11de6e5504aa00499c83290f
- SHA1: a1c8744a84bd85e06539732fbe3e356cdf0627d4
- 828 4238
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pan
- el.js
- 828 13423
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pan
- el.js
- MD5: c12619f374f5b52d7dacc5aaa68f5dee
- SHA1: b5c9f43c5f23fef9e89582936dffad4e84a60105
- 828 13838
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pan
- el.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pan
- el.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: c12619f374f5b52d7dacc5aaa68f5dee
- SHA1: b5c9f43c5f23fef9e89582936dffad4e84a60105
- 828 13838
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pas
- swords.js
- 828 3318
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pas
- swords.js
- MD5: 9a1bf29d9c3b93f0956e7420a8c2ce9b
- SHA1: 5c91dd5ac9097874fd8029c2a212e145ccd56531
- 828 3742
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pas
- swords.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pas
- swords.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 9a1bf29d9c3b93f0956e7420a8c2ce9b
- SHA1: 5c91dd5ac9097874fd8029c2a212e145ccd56531
- 828 3742
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pri
- vate-browsing.js
- 828 4101
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pri
- vate-browsing.js
- MD5: 25657a4e076a5c2d147f1039cd0fcae5
- SHA1: 9b2dfd3051fb40dc9f024bca0abd140467d88399
- 828 4526
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pri
- vate-browsing.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\pri
- vate-browsing.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 25657a4e076a5c2d147f1039cd0fcae5
- SHA1: 9b2dfd3051fb40dc9f024bca0abd140467d88399
- 828 4526
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\req
- uest.js
- 828 10453
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\req
- uest.js
- MD5: fa6d141156b034c925549038cf9c5444
- SHA1: 6fe05fc7a767ee060e287744509b503de84a598f
- 828 10878
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\req
- uest.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\req
- uest.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: fa6d141156b034c925549038cf9c5444
- SHA1: 6fe05fc7a767ee060e287744509b503de84a598f
- 828 10878
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\sel
- ection.js
- 828 12316
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\sel
- ection.js
- MD5: 6b3e8801b484d6ca85223d7362fc561d
- SHA1: cf49698cd57f481686561901fbd203ebf0c7f910
- 828 12734
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\sel
- ection.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\sel
- ection.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 6b3e8801b484d6ca85223d7362fc561d
- SHA1: cf49698cd57f481686561901fbd203ebf0c7f910
- 828 12734
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\sim
- ple-storage.js
- 828 8614
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\sim
- ple-storage.js
- MD5: 88750ef1e4da6706bb408848d8941818
- SHA1: 379333e26b2d2d11e6e72e9512b9c54ef51cad53
- 828 9038
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\sim
- ple-storage.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\sim
- ple-storage.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 88750ef1e4da6706bb408848d8941818
- SHA1: 379333e26b2d2d11e6e72e9512b9c54ef51cad53
- 828 9038
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\tab
- s.js
- 828 2723
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\tab
- s.js
- MD5: c55ad3f89ff0a915655d3df2b5800e6e
- SHA1: 781e09e7269d50ce61e8cd17d6a3fd8662eb476f
- 828 3150
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\tab
- s.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\tab
- s.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: c55ad3f89ff0a915655d3df2b5800e6e
- SHA1: 781e09e7269d50ce61e8cd17d6a3fd8662eb476f
- 828 3150
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\tim
- ers.js
- 828 1821
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\tim
- ers.js
- MD5: 6259c7f7e8ad1edf7e74558b822bf4e9
- SHA1: 5e79dcd8bff3545352d43ed537c4206647691c47
- 828 2238
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\tim
- ers.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\tim
- ers.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 6259c7f7e8ad1edf7e74558b822bf4e9
- SHA1: 5e79dcd8bff3545352d43ed537c4206647691c47
- 828 2238
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\wid
- get.js
- 828 29701
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\wid
- get.js
- MD5: b789083f2b75ec03aa8cf8ea56fcdba8
- SHA1: 950e9fb56ed185d719ddd5dc196d448a0c7eb137
- 828 30126
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\wid
- get.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\wid
- get.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: b789083f2b75ec03aa8cf8ea56fcdba8
- SHA1: 950e9fb56ed185d719ddd5dc196d448a0c7eb137
- 828 30126
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\win
- dows.js
- 828 8643
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\win
- dows.js
- MD5: 4dc46c8cc9bc2772768272b8dc5035d9
- SHA1: 6e1900f4edf522477de77d94be1d3cd93c4ff861
- 828 9070
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\win
- dows.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-addon-kit-lib\win
- dows.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 4dc46c8cc9bc2772768272b8dc5035d9
- SHA1: 6e1900f4edf522477de77d94be1d3cd93c4ff861
- 828 9070
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-data\bo
- otstrap-remote-process.js
- 828 6665
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-data\bo
- otstrap-remote-process.js
- MD5: 36f6cd8b8dd4e8d79852e3d17cdbab48
- SHA1: ec2f154608bafecb2c2d85b54647d1e3607d2692
- 828 7086
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-data\bo
- otstrap-remote-process.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-data\bo
- otstrap-remote-process.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 36f6cd8b8dd4e8d79852e3d17cdbab48
- SHA1: ec2f154608bafecb2c2d85b54647d1e3607d2692
- 828 7086
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-data\te
- st-content-symbiont.js
- 828
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\api
- -utils.js
- 828 7265
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\api
- -utils.js
- MD5: 3f42ad569af3db4fcbe3656ef042d168
- SHA1: 8f3a6b38795b97d61ff4d8cb83048f939c617203
- 828 7694
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\api
- -utils.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\api
- -utils.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 3f42ad569af3db4fcbe3656ef042d168
- SHA1: 8f3a6b38795b97d61ff4d8cb83048f939c617203
- 828 7694
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\app
- -strings.js
- 828 3345
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\app
- -strings.js
- MD5: b2878bfc894b696eefe1e5e6ce39ff35
- SHA1: 04fb590f3ca812b118a3bcb9987200530c6c1b78
- 828 3774
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\app
- -strings.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\app
- -strings.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: b2878bfc894b696eefe1e5e6ce39ff35
- SHA1: 04fb590f3ca812b118a3bcb9987200530c6c1b78
- 828 3774
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\arr
- ay.js
- 828 3428
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\arr
- ay.js
- MD5: 839e3fc301229f5d530313648f479727
- SHA1: 76b48c170f7c78102d59fca06051b2c8283d188d
- 828 3854
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\arr
- ay.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\arr
- ay.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 839e3fc301229f5d530313648f479727
- SHA1: 76b48c170f7c78102d59fca06051b2c8283d188d
- 828 3854
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\byt
- e-streams.js
- 828 4280
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\byt
- e-streams.js
- MD5: eaba973e15a32a2472b243e662937243
- SHA1: 59bbd9cc0cf155cbfc7b0237fd780e6127ffa884
- 828 4702
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\byt
- e-streams.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\byt
- e-streams.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: eaba973e15a32a2472b243e662937243
- SHA1: 59bbd9cc0cf155cbfc7b0237fd780e6127ffa884
- 828 4702
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\col
- lection.js
- 828 4774
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\col
- lection.js
- MD5: 664e168e0d9044b38b17d17076a37485
- SHA1: 6f09717fd85dd06fc03090ad20b656222735fcab
- 828 5198
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\col
- lection.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\col
- lection.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 664e168e0d9044b38b17d17076a37485
- SHA1: 6f09717fd85dd06fc03090ad20b656222735fcab
- 828 5198
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\content-proxy.js
- 828 18559
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\content-proxy.js
- MD5: dab34628fb40d04e2d81e1befdb8e0f1
- SHA1: bdc395916f6f76b31923ed03a40ace73a11ed353
- 828 18974
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\content-proxy.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\content-proxy.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: dab34628fb40d04e2d81e1befdb8e0f1
- SHA1: bdc395916f6f76b31923ed03a40ace73a11ed353
- 828 18974
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\loader.js
- 828 6915
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\loader.js
- MD5: 6c3945c8058cdd4df47f5aca47c64c2a
- SHA1: 935f4a118645fdcd0672eb95dd112913b45f6376
- 828 7342
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\loader.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\loader.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 6c3945c8058cdd4df47f5aca47c64c2a
- SHA1: 935f4a118645fdcd0672eb95dd112913b45f6376
- 828 7342
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\symbiont.js
- 828 6993
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\symbiont.js
- MD5: b3c1b15215974fcf1dc214e066e58b25
- SHA1: c64d367484969a8a48ca5a81266979a032054180
- 828 7422
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\symbiont.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\symbiont.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: b3c1b15215974fcf1dc214e066e58b25
- SHA1: c64d367484969a8a48ca5a81266979a032054180
- 828 7422
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\worker.js
- 828 19369
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\worker.js
- MD5: 934c15c2cffb1e98703c68520f937ab9
- SHA1: 4149a1249e24ba40933125d4f7f31654aa6b9464
- 828 19790
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\worker.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent\worker.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 934c15c2cffb1e98703c68520f937ab9
- SHA1: 4149a1249e24ba40933125d4f7f31654aa6b9464
- 828 19790
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent.js
- 828 2013
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent.js
- MD5: 6e1d67fdc62174378bc317cf1a83c84f
- SHA1: a172520875d347f338ae2c2811efc1a627d2293b
- 828 2430
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\con
- tent.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 6e1d67fdc62174378bc317cf1a83c84f
- SHA1: a172520875d347f338ae2c2811efc1a627d2293b
- 828 2430
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\cor
- tex.js
- 828 6193
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\cor
- tex.js
- MD5: 0cd753c98112f21df6d5fcd3ac60f1d9
- SHA1: 5869378ee21f27af4134fa77d121c050efe9ddfd
- 828 6622
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\cor
- tex.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\cor
- tex.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 0cd753c98112f21df6d5fcd3ac60f1d9
- SHA1: 5869378ee21f27af4134fa77d121c050efe9ddfd
- 828 6622
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\cud
- dlefish.js
- 828 6789
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\cud
- dlefish.js
- MD5: c8aeb974927b85916b08f76cf0edf8b6
- SHA1: 635ab5f64d8c8191ea42829c5c3b0033200e09ed
- 828 7214
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\cud
- dlefish.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\cud
- dlefish.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: c8aeb974927b85916b08f76cf0edf8b6
- SHA1: 635ab5f64d8c8191ea42829c5c3b0033200e09ed
- 828 7214
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\dom
- \events\keys.js
- 828 3285
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\dom
- \events\keys.js
- MD5: ad702682de17f656c14e3fa002ecfb6e
- SHA1: 535db937229178a24dcf6351cd59c70ef34c0594
- 828 3710
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\dom
- \events\keys.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\dom
- \events\keys.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: ad702682de17f656c14e3fa002ecfb6e
- SHA1: 535db937229178a24dcf6351cd59c70ef34c0594
- 828 3710
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\dom
- \events.js
- 828 7418
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\dom
- \events.js
- MD5: 7c1e9ac9a073b9ff7aae2f60b139a168
- SHA1: fe55c4d6ecdd9ebd3b433164836d1d7ae9ec51c9
- 828 7838
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\dom
- \events.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\dom
- \events.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 7c1e9ac9a073b9ff7aae2f60b139a168
- SHA1: fe55c4d6ecdd9ebd3b433164836d1d7ae9ec51c9
- 828 7838
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\e10
- s.js
- 828 7984
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\e10
- s.js
- MD5: 83bf24143e38136d9161051085b43ae2
- SHA1: 49e5f38e82c68bddf41429068385b91004534550
- 828 8414
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\e10
- s.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\e10
- s.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 83bf24143e38136d9161051085b43ae2
- SHA1: 49e5f38e82c68bddf41429068385b91004534550
- 828 8414
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\err
- ors.js
- 828 3447
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\err
- ors.js
- MD5: 546e5f916ef4a1837d6c7f18b2409413
- SHA1: 7787e1eeba103f1700f6c6b7350eab0fbb8cc063
- 828 3870
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\err
- ors.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\err
- ors.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 546e5f916ef4a1837d6c7f18b2409413
- SHA1: 7787e1eeba103f1700f6c6b7350eab0fbb8cc063
- 828 3870
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\eve
- nts\assembler.js
- 828 3456
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\eve
- nts\assembler.js
- MD5: b0880ebfcc451d6d9cfe36e6b8632fa1
- SHA1: 1034f16042129589c51489216bd52b9eb7d82000
- 828 3886
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\eve
- nts\assembler.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\eve
- nts\assembler.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: b0880ebfcc451d6d9cfe36e6b8632fa1
- SHA1: 1034f16042129589c51489216bd52b9eb7d82000
- 828 3886
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\eve
- nts.js
- 828 7598
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\eve
- nts.js
- MD5: a2c918014f730e5f1706a2d81361d7f0
- SHA1: 712151d7fde52d5725efd410cdbe6eff1aa97d61
- 828 8014
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\eve
- nts.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\eve
- nts.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: a2c918014f730e5f1706a2d81361d7f0
- SHA1: 712151d7fde52d5725efd410cdbe6eff1aa97d61
- 828 8014
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\fil
- e.js
- 828 6618
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\fil
- e.js
- MD5: b0d89dda922b7edeed00e88ad30bccf6
- SHA1: 8e64ca3dad0cb8b0d6be37c85630c3965e1ebefe
- 828 7038
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\fil
- e.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\fil
- e.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: b0d89dda922b7edeed00e88ad30bccf6
- SHA1: 8e64ca3dad0cb8b0d6be37c85630c3965e1ebefe
- 828 7038
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\fin
- d-tests-e10s-adapter.js
- 828 3970
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\fin
- d-tests-e10s-adapter.js
- MD5: 28df72f4aa0e64896d613cf3988cd788
- SHA1: 16950d70a58994517cffb49a91125da73d75ad50
- 828 4398
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\fin
- d-tests-e10s-adapter.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\fin
- d-tests-e10s-adapter.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 28df72f4aa0e64896d613cf3988cd788
- SHA1: 16950d70a58994517cffb49a91125da73d75ad50
- 828 4398
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\fin
- d-tests.js
- 828 38
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\fin
- d-tests.js
- MD5: 2c9bd4411e320a4685c4d7d5e385f280
- SHA1: 4428877b8a9008525f641aec18eaa05f018ee249
- 828 462
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\fin
- d-tests.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\fin
- d-tests.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 2c9bd4411e320a4685c4d7d5e385f280
- SHA1: 4428877b8a9008525f641aec18eaa05f018ee249
- 828 462
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\hid
- den-frame.js
- 828 7014
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\hid
- den-frame.js
- MD5: 27a277aa25bb63015c45b2f28255e4e7
- SHA1: ec4c9e426250d2f072ffa624942e1c5bc20fddb5
- 828 7438
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\hid
- den-frame.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\hid
- den-frame.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 27a277aa25bb63015c45b2f28255e4e7
- SHA1: ec4c9e426250d2f072ffa624942e1c5bc20fddb5
- 828 7438
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\key
- board\hotkeys.js
- 828 5226
- API Call
- API Name: Sleep Address: 0x0041f00b
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe DLL Name: kernel32.dll
- 828
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\key
- board\hotkeys.js
- MD5: 458bb103471341141438e65bc84fb271
- SHA1: 3bc0b53d08c027ee88fa7b668af511c2ed07e7f8
- 828 5646
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\key
- board\hotkeys.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\key
- board\hotkeys.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 458bb103471341141438e65bc84fb271
- SHA1: 3bc0b53d08c027ee88fa7b668af511c2ed07e7f8
- 828 5646
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\key
- board\observer.js
- 828 3351
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\key
- board\observer.js
- MD5: 7a56c7b9a1cd7aa55e3b160119f15e76
- SHA1: 1b924494f332ab661dd084049174515164b01bde
- 828 3774
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\key
- board\observer.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\key
- board\observer.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 7a56c7b9a1cd7aa55e3b160119f15e76
- SHA1: 1b924494f332ab661dd084049174515164b01bde
- 828 3774
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\key
- board\utils.js
- 828 6658
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\key
- board\utils.js
- MD5: 44debf2c3e817809bf1b4074fb8856d4
- SHA1: 5c11331016b6dfe8dffbfae3796d066be38fb864
- 828 7086
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\key
- board\utils.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\key
- board\utils.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 44debf2c3e817809bf1b4074fb8856d4
- SHA1: 5c11331016b6dfe8dffbfae3796d066be38fb864
- 828 7086
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\lig
- ht-traits.js
- 828 23934
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\lig
- ht-traits.js
- MD5: cbd093d6334de8aab496557c0e67522f
- SHA1: 9e8c2e6059999b0c07e18ebbb2d659b415af239e
- 828 24350
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\lig
- ht-traits.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\lig
- ht-traits.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: cbd093d6334de8aab496557c0e67522f
- SHA1: 9e8c2e6059999b0c07e18ebbb2d659b415af239e
- 828 24350
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\lis
- t.js
- 828 5363
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\lis
- t.js
- MD5: 8b5c4e5c525ed0d87568ac6593e27214
- SHA1: 21448224aece333c421a611d7492d564653d9da9
- 828 5790
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\lis
- t.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\lis
- t.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 8b5c4e5c525ed0d87568ac6593e27214
- SHA1: 21448224aece333c421a611d7492d564653d9da9
- 828 5790
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\mat
- ch-pattern.js
- 828 5222
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\mat
- ch-pattern.js
- MD5: 63619193a70c205e805bbbec24533c2b
- SHA1: 8c42f1651fb5fdf16a624374d41849e76ef833d5
- 828 5646
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\mat
- ch-pattern.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\mat
- ch-pattern.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 63619193a70c205e805bbbec24533c2b
- SHA1: 8c42f1651fb5fdf16a624374d41849e76ef833d5
- 828 5646
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\mem
- ory.js
- 828 4754
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\mem
- ory.js
- MD5: ef073f99f00bdba3bd77283081594e51
- SHA1: 3cff2f538594dc0b88d7403a877dc522c5893859
- 828 5182
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\mem
- ory.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\mem
- ory.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: ef073f99f00bdba3bd77283081594e51
- SHA1: 3cff2f538594dc0b88d7403a877dc522c5893859
- 828 5182
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\obs
- erver-service.js
- 828 7573
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\obs
- erver-service.js
- MD5: 0b9ea09ae5cd8c18561a7bc11d2fce89
- SHA1: 4cb11c2b556a486943c9ba099b05709ca86ad756
- 828 7998
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\obs
- erver-service.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\obs
- erver-service.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 0b9ea09ae5cd8c18561a7bc11d2fce89
- SHA1: 4cb11c2b556a486943c9ba099b05709ca86ad756
- 828 7998
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\pas
- swords\utils.js
- 828 5249
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\pas
- swords\utils.js
- MD5: 8a145447716dce4509fdb2709adade7a
- SHA1: 9628693ec4ad0a7fd07379e08bb39b1680595355
- 828 5678
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\pas
- swords\utils.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\pas
- swords\utils.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 8a145447716dce4509fdb2709adade7a
- SHA1: 9628693ec4ad0a7fd07379e08bb39b1680595355
- 828 5678
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\pla
- in-text-console.js
- 828 3668
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\pla
- in-text-console.js
- MD5: c1b92aaee02d1fc15e2296f898e398d0
- SHA1: 54d26186a338077ed70b51d3abcddd4b451c733a
- 828 4094
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\pla
- in-text-console.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\pla
- in-text-console.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: c1b92aaee02d1fc15e2296f898e398d0
- SHA1: 54d26186a338077ed70b51d3abcddd4b451c733a
- 828 4094
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\pre
- ferences-service.js
- 828 5370
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\pre
- ferences-service.js
- MD5: fc65ca218550f056ec25a986aec9533e
- SHA1: 59b030abf093b3db39c72b4078be90b3a0bd4a06
- 828 5790
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\pre
- ferences-service.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\pre
- ferences-service.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: fc65ca218550f056ec25a986aec9533e
- SHA1: 59b030abf093b3db39c72b4078be90b3a0bd4a06
- 828 5790
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\run
- time.js
- 828 2103
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\run
- time.js
- MD5: c16c2b800aa0bb4e2923f301d5536c81
- SHA1: af9a336737ec4955b0098edfd5fe9e9fab1e180d
- 828 2526
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\run
- time.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\run
- time.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: c16c2b800aa0bb4e2923f301d5536c81
- SHA1: af9a336737ec4955b0098edfd5fe9e9fab1e180d
- 828 2526
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\sec
- urable-module.js
- 828 31689
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\sec
- urable-module.js
- MD5: 99aff06937c8bda8c0bd6f288111caf5
- SHA1: 139c5235a0da57cb97dac009ddef306b884af0ff
- 828 32110
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\sec
- urable-module.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\sec
- urable-module.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 99aff06937c8bda8c0bd6f288111caf5
- SHA1: 139c5235a0da57cb97dac009ddef306b884af0ff
- 828 32110
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\sel
- f-e10s-adapter.js
- 828 3624
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\sel
- f-e10s-adapter.js
- MD5: 427a5996ff4e8012e77466a3c646c117
- SHA1: 152cbea0b0826acfe0ed28479572a1233d7d2718
- 828 4046
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\sel
- f-e10s-adapter.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\sel
- f-e10s-adapter.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 427a5996ff4e8012e77466a3c646c117
- SHA1: 152cbea0b0826acfe0ed28479572a1233d7d2718
- 828 4046
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\sel
- f-maker.js
- 828 1024
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\sel
- f-maker.js
- MD5: 21bce943e698183ca687518ebfb0cc20
- SHA1: 8f909542c9d1ac5a079883553492e6aad3909743
- 828 1454
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\sel
- f-maker.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\sel
- f-maker.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 21bce943e698183ca687518ebfb0cc20
- SHA1: 8f909542c9d1ac5a079883553492e6aad3909743
- 828 1454
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\shi
- ms.js
- 828 2266
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\shi
- ms.js
- MD5: 5d7826646f385c50b15f7b01faf9b6cd
- SHA1: a17d4e026c5841d3a880abd1953a6239f5b4492f
- 828 2686
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\shi
- ms.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\shi
- ms.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 5d7826646f385c50b15f7b01faf9b6cd
- SHA1: a17d4e026c5841d3a880abd1953a6239f5b4492f
- 828 2686
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- -browser.js
- 828 25192
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- -browser.js
- MD5: bb85411c9da7fa1643e2378b7c08f0ed
- SHA1: 467ce18738e74473fed76b24d63a831bff3da5b4
- 828 25614
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- -browser.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- -browser.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: bb85411c9da7fa1643e2378b7c08f0ed
- SHA1: 467ce18738e74473fed76b24d63a831bff3da5b4
- 828 25614
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\events.js
- 828 2112
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\events.js
- MD5: c28025d68e6b380e40c99f1ff7408d13
- SHA1: 2c6b16ff980efe66ef709b895737510be9c640c3
- 828 2542
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\events.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\events.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: c28025d68e6b380e40c99f1ff7408d13
- SHA1: 2c6b16ff980efe66ef709b895737510be9c640c3
- 828 2542
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\observer.js
- 828 4982
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\observer.js
- MD5: ed353c571e84da4a698923d9288cbcec
- SHA1: 7a9da045435a4f43971b39e51ce933ecfcc2ae12
- 828 5406
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\observer.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\observer.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: ed353c571e84da4a698923d9288cbcec
- SHA1: 7a9da045435a4f43971b39e51ce933ecfcc2ae12
- 828 5406
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\tab.js
- 828 9861
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\tab.js
- MD5: 96c1bc7124a8e91c963ef0bd183d8c0c
- SHA1: a55fc3a3157965e7b3fb6bf1d45eb5c699d8d472
- 828 10286
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\tab.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\tab.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 96c1bc7124a8e91c963ef0bd183d8c0c
- SHA1: a55fc3a3157965e7b3fb6bf1d45eb5c699d8d472
- 828 10286
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\utils.js
- 828 2841
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\utils.js
- MD5: bf9fc0ddc68331294c7ca4c9ad0e16bd
- SHA1: 91394ecfde46afeaa8590882fcce026b292ff407
- 828 3262
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\utils.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tab
- s\utils.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: bf9fc0ddc68331294c7ca4c9ad0e16bd
- SHA1: 91394ecfde46afeaa8590882fcce026b292ff407
- 828 3262
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tes
- t\assert.js
- 828 10574
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tes
- t\assert.js
- MD5: 8b776a660d4d38e57944faafa3321366
- SHA1: d95c57e2ea87827c2b23f7a7756bef0df0842fea
- 828 10990
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tes
- t\assert.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tes
- t\assert.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 8b776a660d4d38e57944faafa3321366
- SHA1: d95c57e2ea87827c2b23f7a7756bef0df0842fea
- 828 10990
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tes
- t.js
- 828 5146
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tes
- t.js
- MD5: de7393baf5bd2cff23eaad61949bb07c
- SHA1: 7a3b5f4b704e42011249c7145311a5ea632195e6
- 828 5566
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tes
- t.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tes
- t.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: de7393baf5bd2cff23eaad61949bb07c
- SHA1: 7a3b5f4b704e42011249c7145311a5ea632195e6
- 828 5566
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tex
- t-streams.js
- 828 9490
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tex
- t-streams.js
- MD5: a54e415418c6b1538fa5d8b06bc91287
- SHA1: 08dc8690c89e872d42a061ad6dfe443958b7b740
- 828 9918
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tex
- t-streams.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tex
- t-streams.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: a54e415418c6b1538fa5d8b06bc91287
- SHA1: 08dc8690c89e872d42a061ad6dfe443958b7b740
- 828 9918
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tim
- er-e10s-adapter.js
- 828 2658
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tim
- er-e10s-adapter.js
- MD5: b2665e75053e5bce22d59c364f5cfee0
- SHA1: 179f0812df6f989f9707376c634dea8e5fb9fa0e
- 828 3086
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tim
- er-e10s-adapter.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tim
- er-e10s-adapter.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: b2665e75053e5bce22d59c364f5cfee0
- SHA1: 179f0812df6f989f9707376c634dea8e5fb9fa0e
- 828 3086
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tim
- er.js
- 828 4208
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tim
- er.js
- MD5: 7d5538216a2b9b031cac74a1d506bc8a
- SHA1: 31c30487f8d575a2b7182c7fe7c655745946d852
- 828 4638
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tim
- er.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tim
- er.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 7d5538216a2b9b031cac74a1d506bc8a
- SHA1: 31c30487f8d575a2b7182c7fe7c655745946d852
- 828 4638
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tra
- ceback.js
- 828 5081
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tra
- ceback.js
- MD5: 8575bee814a37427ed2e1b208edb33d8
- SHA1: a0144e4f6a8d3c3afa11d656c68fdd029ff66499
- 828 5502
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tra
- ceback.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tra
- ceback.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 8575bee814a37427ed2e1b208edb33d8
- SHA1: a0144e4f6a8d3c3afa11d656c68fdd029ff66499
- 828 5502
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tra
- its\core.js
- 828 11340
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tra
- its\core.js
- MD5: 487e0a55d0812a2fe8d33e38b97f363b
- SHA1: bbbaa5279ff48795d8fb392b4a7cc5b4f82df70f
- 828 11758
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tra
- its\core.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tra
- its\core.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 487e0a55d0812a2fe8d33e38b97f363b
- SHA1: bbbaa5279ff48795d8fb392b4a7cc5b4f82df70f
- 828 11758
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tra
- its.js
- 828 7550
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tra
- its.js
- MD5: f23f23379935795e8a614ac7afecf47d
- SHA1: 09164e62db29bc248a0d14bcb9135093a703ac39
- 828 7966
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tra
- its.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\tra
- its.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: f23f23379935795e8a614ac7afecf47d
- SHA1: 09164e62db29bc248a0d14bcb9135093a703ac39
- 828 7966
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\typ
- e.js
- 828 11432
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\typ
- e.js
- MD5: 3afce4b0c8fa1c6bf01b466799ca20b0
- SHA1: 667f05bab5fcd4978ce81d372638e3bfbb0d00c5
- 828 11854
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\typ
- e.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\typ
- e.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 3afce4b0c8fa1c6bf01b466799ca20b0
- SHA1: 667f05bab5fcd4978ce81d372638e3bfbb0d00c5
- 828 11854
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uni
- t-test-finder.js
- 828 3479
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uni
- t-test-finder.js
- MD5: 7babdd7e2b29d51d504d14544074f3de
- SHA1: 046db9743ab3d7db0abbfd7f5bad7fa3f6ae968a
- 828 3902
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uni
- t-test-finder.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uni
- t-test-finder.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 7babdd7e2b29d51d504d14544074f3de
- SHA1: 046db9743ab3d7db0abbfd7f5bad7fa3f6ae968a
- 828 3902
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uni
- t-test.js
- 828 11539
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uni
- t-test.js
- MD5: a1369704929a52718965e1a9b1f3ccef
- SHA1: 8c732168b44ca12c8dc73a5f01d8691f7057686c
- 828 11966
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uni
- t-test.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uni
- t-test.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: a1369704929a52718965e1a9b1f3ccef
- SHA1: 8c732168b44ca12c8dc73a5f01d8691f7057686c
- 828 11966
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\unl
- oad.js
- 828 1278
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\unl
- oad.js
- MD5: 9940ad1eb938784e5cad8dc7ea47ef98
- SHA1: 65a45d257191dab39c7299490fdab40d075cc7f6
- 828 1694
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\unl
- oad.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\unl
- oad.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 9940ad1eb938784e5cad8dc7ea47ef98
- SHA1: 65a45d257191dab39c7299490fdab40d075cc7f6
- 828 1694
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\url
- -e10s-adapter.js
- 828 4008
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\url
- -e10s-adapter.js
- MD5: 6e64ec92bad4e628af4794ffc4d9764d
- SHA1: aa865e71fa131019b772e0fa7275a1a7248364c5
- 828 4430
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\url
- -e10s-adapter.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\url
- -e10s-adapter.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 6e64ec92bad4e628af4794ffc4d9764d
- SHA1: aa865e71fa131019b772e0fa7275a1a7248364c5
- 828 4430
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\url
- .js
- 828 4269
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\url
- .js
- MD5: ea6e945f005f1d147d36c6d5aab4684c
- SHA1: a580b5458144a0ba8863b1407295011ee14fcca0
- 828 4686
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\url
- .js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\url
- .js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: ea6e945f005f1d147d36c6d5aab4684c
- SHA1: a580b5458144a0ba8863b1407295011ee14fcca0
- 828 4686
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\data.js
- 828 3912
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\data.js
- MD5: 65c416b691d0c6c4e6c1c64b3c784950
- SHA1: 218717ec56e80e50adede173c447b81c46b5a5e2
- 828 4334
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\data.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\data.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 65c416b691d0c6c4e6c1c64b3c784950
- SHA1: 218717ec56e80e50adede173c447b81c46b5a5e2
- 828 4334
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\function.js
- 828 2710
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\function.js
- MD5: 327aa01d5e3c1f43520f755abdebfdd2
- SHA1: ee1feeec918f98a50c159a556a58fd42dc36ab0e
- 828 3134
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\function.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\function.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 327aa01d5e3c1f43520f755abdebfdd2
- SHA1: ee1feeec918f98a50c159a556a58fd42dc36ab0e
- 828 3134
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\registry.js
- 828 3318
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\registry.js
- MD5: bce4fa510248714e55a79fc69ec7d279
- SHA1: a51a2989394135025900dc4a9117e01bee0dfc6d
- 828 3742
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\registry.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\registry.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: bce4fa510248714e55a79fc69ec7d279
- SHA1: a51a2989394135025900dc4a9117e01bee0dfc6d
- 828 3742
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\thumbnail.js
- 828 3099
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\thumbnail.js
- MD5: 6113df0e2bd8dae52f5c150bccee756e
- SHA1: cfb66aceaa4487cd8b7edb1c2688c718ff99031e
- 828 3518
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\thumbnail.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\uti
- ls\thumbnail.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 6113df0e2bd8dae52f5c150bccee756e
- SHA1: cfb66aceaa4487cd8b7edb1c2688c718ff99031e
- 828 3518
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dow-utils.js
- 828 6368
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dow-utils.js
- MD5: 74f6f87f3d4db34ed0ad9460621e10f8
- SHA1: 4c76c982b1c7c19b89d55f5a854aadcd60cd4300
- 828 6798
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dow-utils.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dow-utils.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 74f6f87f3d4db34ed0ad9460621e10f8
- SHA1: 4c76c982b1c7c19b89d55f5a854aadcd60cd4300
- 828 6798
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\dom.js
- 828 2259
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\dom.js
- MD5: 98385d24a0fddb82b87f4ef0075a0469
- SHA1: 99ba4d9525597c2fca4cf0ee61ce8ebdbd15257c
- 828 2686
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\dom.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\dom.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 98385d24a0fddb82b87f4ef0075a0469
- SHA1: 99ba4d9525597c2fca4cf0ee61ce8ebdbd15257c
- 828 2686
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\loader.js
- 828 5598
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\loader.js
- MD5: 79fa248ac67599d30631214fbb93cf99
- SHA1: f5057e306a2e5ccbe19b42e5b7a8d364bbf4ac54
- 828 6014
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\loader.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\loader.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 79fa248ac67599d30631214fbb93cf99
- SHA1: f5057e306a2e5ccbe19b42e5b7a8d364bbf4ac54
- 828 6014
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\observer.js
- 828 3435
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\observer.js
- MD5: 8509d8647dd74e2b4cfe8cde62c1739c
- SHA1: 96c14d9644db24f38caae6cbb7189ea1dd63c438
- 828 3854
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\observer.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\observer.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 8509d8647dd74e2b4cfe8cde62c1739c
- SHA1: 96c14d9644db24f38caae6cbb7189ea1dd63c438
- 828 3854
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\tabs.js
- 828 7916
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\tabs.js
- MD5: a4daca74cd7d76534fa19a01740bdabf
- SHA1: a5c82b6a7c44367c75c7a462bbce562c0fa7b100
- 828 8334
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\tabs.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\win
- dows\tabs.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: a4daca74cd7d76534fa19a01740bdabf
- SHA1: a5c82b6a7c44367c75c7a462bbce562c0fa7b100
- 828 8334
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\xhr
- .js
- 828 6332
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\xhr
- .js
- MD5: d5e9b7e35b206756d8493ea4483c10aa
- SHA1: 667108f1a1e6d394be9a39c31b48812a524cd3d4
- 828 6750
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\xhr
- .js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\xhr
- .js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: d5e9b7e35b206756d8493ea4483c10aa
- SHA1: 667108f1a1e6d394be9a39c31b48812a524cd3d4
- 828 6750
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\xpc
- om.js
- 828 4999
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\xpc
- om.js
- MD5: e246f99289d78ae90e84cc8984cf127d
- SHA1: d95b5df7ad88342f9cb2823ed2ee8ff164972931
- 828 5422
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\xpc
- om.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\xpc
- om.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: e246f99289d78ae90e84cc8984cf127d
- SHA1: d95b5df7ad88342f9cb2823ed2ee8ff164972931
- 828 5422
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\xul
- -app.js
- 828 3654
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\xul
- -app.js
- MD5: 470d82ddbf2bdf088c60a2cd56e796f4
- SHA1: 7a32c9b5f50396d2f34ff90e35ec0e2cf031a5b0
- 828 4078
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\xul
- -app.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-api-utils-lib\xul
- -app.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 470d82ddbf2bdf088c60a2cd56e796f4
- SHA1: 7a32c9b5f50396d2f34ff90e35ec0e2cf031a5b0
- 828 4078
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-v1-0-lib\main.js
- 828 2014
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-v1-0-lib\main.js
- MD5: 48bae592c5e1ce08666e4b0df39c0737
- SHA1: 6343dd627d798166ef6f6465ea8c770433e54173
- 828 2430
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-v1-0-lib\main.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-v1-0-lib\main.js.
- vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 48bae592c5e1ce08666e4b0df39c0737
- SHA1: 6343dd627d798166ef6f6465ea8c770433e54173
- 828 2430
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-v1-0-tests\test-m
- ain.js
- 828 764
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-v1-0-tests\test-m
- ain.js
- MD5: 6c8c1a7412e6a31b778bd063faee6551
- SHA1: 5586131e3184add98031b6285cd5de88e6596e2f
- 828 1182
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-v1-0-tests\test-m
- ain.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\jid1-YahAIqyhSHBWtQ@jetpack\resources\jid1-yahaiqyhshbwtq-at-jetpack-v1-0-tests\test-m
- ain.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 6c8c1a7412e6a31b778bd063faee6551
- SHA1: 5586131e3184add98031b6285cd5de88e6596e2f
- 828 1182
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\bootstrap.js
- 828 605
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\bootstrap.js
- MD5: 2443a3762a580a1f9a36da81584ea7af
- SHA1: ce10a9db25be2ad049ebc063c00a09c85fc9ef4d
- 828 1022
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\bootstrap.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\bootstrap.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 2443a3762a580a1f9a36da81584ea7af
- SHA1: ce10a9db25be2ad049ebc063c00a09c85fc9ef4d
- 828 1022
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\components\inlinedisposition.js
- 828 3770
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\components\inlinedisposition.js
- MD5: ac49eccbe0f9e6e47ea6df49e66d538d
- SHA1: cfa4d0dba17bcf8599e64bdac70a2786f6d17ec0
- 828 4190
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\components\inlinedisposition.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\components\inlinedisposition.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: ac49eccbe0f9e6e47ea6df49e66d538d
- SHA1: cfa4d0dba17bcf8599e64bdac70a2786f6d17ec0
- 828 4190
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\license.txt
- 828 1442
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\license.txt
- MD5: 093473448a6634a6c639f0cf16c7cd64
- SHA1: 18c1ff213d7758c51fc0ada1c0c8f0ce1f9b84a9
- 828 1870
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\license.txt
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\license.txt.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 093473448a6634a6c639f0cf16c7cd64
- SHA1: 18c1ff213d7758c51fc0ada1c0c8f0ce1f9b84a9
- 828 1870
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- prefs.js
- 828 6344
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- prefs.js
- MD5: e404090c1363892b04bf48f0c47cffdf
- SHA1: 3461590ada143a7cff399651b9a3329687be96e5
- 828 6766
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- prefs.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- prefs.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: e404090c1363892b04bf48f0c47cffdf
- SHA1: 3461590ada143a7cff399651b9a3329687be96e5
- 828 6766
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- sessionstore.js
- 828 110
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- sessionstore.js
- MD5: b2b932950eec24e3e1d66b17293fceec
- SHA1: 702ed1f5e7abbd325215282512963bb0bde27f0e
- 828 526
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- sessionstore.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- sessionstore.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: b2b932950eec24e3e1d66b17293fceec
- SHA1: 702ed1f5e7abbd325215282512963bb0bde27f0e
- 828 526
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- signons2.txt
- 828 157
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- signons2.txt
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- signons2.txt
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- signons2.txt.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- signons3.txt
- 828 157
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- signons3.txt
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- signons3.txt
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\71fgjoc5.kl7wec5z.default\
- signons3.txt.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- chrome\userChrome-example.css
- 828 959
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- chrome\userChrome-example.css
- MD5: 341aae03c744a20377452e79d7c87667
- SHA1: c865e98865ad5231f3b8b5f2eb58bcaec584dfb1
- 828 1374
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- chrome\userChrome-example.css
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- chrome\userChrome-example.css.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 341aae03c744a20377452e79d7c87667
- SHA1: c865e98865ad5231f3b8b5f2eb58bcaec584dfb1
- 828 1374
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- chrome\userContent-example.css
- 828 663
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- chrome\userContent-example.css
- MD5: 4412dd836af158506651794457294c39
- SHA1: 7f8ed59567e6c93b8cf2758f957d11db2004dfca
- 828 1086
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- chrome\userContent-example.css
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- chrome\userContent-example.css.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 4412dd836af158506651794457294c39
- SHA1: 7f8ed59567e6c93b8cf2758f957d11db2004dfca
- 828 1086
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- cookies.txt
- 828 157
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- cookies.txt
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- cookies.txt
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- cookies.txt.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\bootstrap.js
- 828 605
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\bootstrap.js
- MD5: 2443a3762a580a1f9a36da81584ea7af
- SHA1: ce10a9db25be2ad049ebc063c00a09c85fc9ef4d
- 828 1022
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\bootstrap.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\bootstrap.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 2443a3762a580a1f9a36da81584ea7af
- SHA1: ce10a9db25be2ad049ebc063c00a09c85fc9ef4d
- 828 1022
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\components\inlinedisposition.js
- 828 3770
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\components\inlinedisposition.js
- MD5: ac49eccbe0f9e6e47ea6df49e66d538d
- SHA1: cfa4d0dba17bcf8599e64bdac70a2786f6d17ec0
- 828 4190
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\components\inlinedisposition.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\components\inlinedisposition.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: ac49eccbe0f9e6e47ea6df49e66d538d
- SHA1: cfa4d0dba17bcf8599e64bdac70a2786f6d17ec0
- 828 4190
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\license.txt
- 828 1442
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\license.txt
- MD5: 093473448a6634a6c639f0cf16c7cd64
- SHA1: 18c1ff213d7758c51fc0ada1c0c8f0ce1f9b84a9
- 828 1870
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\license.txt
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- extensions\{123647d5-da43-4344-bfe2-fc093bdf8f5e}\license.txt.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 093473448a6634a6c639f0cf16c7cd64
- SHA1: 18c1ff213d7758c51fc0ada1c0c8f0ce1f9b84a9
- 828 1870
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- prefs.js
- 828 3672
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- prefs.js
- MD5: 5190d668ef412e2ab68d8f3fac8d5c42
- SHA1: f0c32ef5cfdeeb306dcaab1587590f8cb548ec42
- 828 4094
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- prefs.js
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- prefs.js.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 5190d668ef412e2ab68d8f3fac8d5c42
- SHA1: f0c32ef5cfdeeb306dcaab1587590f8cb548ec42
- 828 4094
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- signons2.txt
- 828 157
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- signons2.txt
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- signons2.txt
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- signons2.txt.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- signons3.txt
- 828 157
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- signons3.txt
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- signons3.txt
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\me5po3fs.5zf4ji1b.default\
- signons3.txt.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Open
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\pmy9ej3o.526frdyw.default\
- cookies.txt
- 828 157
- File
- Close
- C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\pmy9ej3o.526frdyw.default\
- cookies.txt
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- File
- Rename
- Old Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\pmy9ej3o.526frdyw.default\
- cookies.txt
- New Name: C:\Documents and Settings\admin\Application Data\Mozilla\Firefox\Profiles\pmy9ej3o.526frdyw.default\
- cookies.txt.vvv
- Imagepath: C:\Documents and Settings\admin\Application Data\ignmy-a.exe
- MD5: 16f880df029212dc5b83869b7b89d07a
- SHA1: 642095a1581aa5774062df3733909a9660885430
- 828 574
- 38 Repeated items skipped
- Malicious Alert
- High Repeated Sleep Calls
- Message: High repeated sleep calls Detail: High repeated number of sleep calls
- 23 Repeated items skipped
- High Cpu
- Imagepath: C:\Documents and Settings\admin\Local Settings\Temp\73.exe
- 1240
- Malicious Alert
- Suspicious Persistance Activity
- Message: New file in AppData added to Run regkey Detail: Process drops a file in AppData then adds to Run regkey
- Malicious Alert
- Generic Anomalous Activity
- Message: Process Opening explorer Detail: Process Opening Explorer
- Malicious Alert
- Misc Anom
- Message: Process Open with Root process deleted Detail: Process deleting itself
- Malicious Alert
- Suspicious Persistance Activity
- Message: Startup services added for file Detail: Process adding itself (non-DLL) to windows startup areas for file
- Malicious Alert
- Data Theft Activity
- Message: Firefox FTP password theft Detail: Process stealing FTP password via registry
- Malicious Alert
- Misc Anom
- Message: Infostealer detected Detail: Infostealer detected
- https://www.hybrid-analysis.com/sample/b43eb03c3df9db7399d108a19101f8541c4e905c20cd634927796c02da6fbc16?environmentId=4 – opexxx on Dec. 3, 2015, 4:10 a.m.
- http://www.threatexpert.com/report.aspx?md5=446071be407efeb4e0d7c83bb504774a – opexxx on Dec. 3, 2015, 4:15 a.m.
- https://malwr.com/analysis/MTUxMmM0MGRmOWIyNDY2ZmFkNmZmM2RhMmFiYjEzMzA/ – opexxx on Dec. 3, 2015, 4:18 a.m.
- https://sandbox.deepviz.com/report/rk/a1b274443a5774dd92559735dff0cfa7d99f086f4e9a4f165d8336e253bb2dba48527f13a0933a8e78d6452b95413427e505e8a9e0db80b218a01a165d232938/ – opexxx on Dec. 3, 2015, 4:18 a.m.
- http://pedump.me/446071be407efeb4e0d7c83bb504774a/ – opexxx on Dec. 3, 2015, 4:20 a.m.
- http://whitelist.kaspersky.com/advisor#search/446071BE407EFEB4E0D7C83BB504774A – opexxx on Dec. 3, 2015, 4:23 a.m.
- https://malwr.com/analysis/MTUxMmM0MGRmOWIyNDY2ZmFkNmZmM2RhMmFiYjEzMzA/
Add Comment
Please, Sign In to add comment