Analysis

  • max time kernel
    142s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    18-02-2021 17:54

General

  • Target

    cadbbf76fd42b925147d01cc74e82bc8b2b6b03a82a63ca39d2ef1c2877eb536.bin.sample.exe

  • Size

    369KB

  • MD5

    df919a46da2377f913e99fa5d4997ae9

  • SHA1

    03cd2235f0e68f297020dd40ad48395fad78bd8d

  • SHA256

    cadbbf76fd42b925147d01cc74e82bc8b2b6b03a82a63ca39d2ef1c2877eb536

  • SHA512

    22870750ef402c958353faefaaa77d4549c3d3a6f1f0bf36da77d881db0d0f5ebdb758e5cef21629f407d80e155dad62de747c472624424436125ba3835e9a61

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-3825035466-2522850611-591511364-1000\HOW_TO_RETURN_FILES.txt

Ransom Note
Dear manager, your database server has been locked, your databases files are encrypted and you have unfortunately "lost" all your data, Encryption was produced using unique key AES-256 generated for this server. To decrypt files you need to obtain the decryption key and tool. All encrypted files ends with .charm To obtain the program for this server, which will decrypt all files, you need to write me to email: "helper.china@aol.com" Before payment you can send us one small file (100..500 kilobytes) and we will decrypt it - it's your guarantee that we have decryption tool. And send us your userkey We don't know who are you, All what we need is some money. Don't panic if we don't answer you during 24 hours. It means that we didn't received your letter and write us again. You can use one of that bitcoin exchangers for transfering bitcoin: https://localbitcoins.com https://www.kraken.com You dont need install bitcoin programs - you need only use one of this exchangers or other exchanger that you can find in www.google.com for your country. Please use english language in your letters. If you don't speak english then use https://translate.google.com to translate your letter on english language. You don't have enough time to think each day payment will increase and after one week your key will be deleted and your files will be locked forever. USERKEY: kZLnCucHvzB6094DFvYv/scHXO3lH8+q2SlGrWjRi80WNMlBxDbT/2H/petXbjN4frj+i1RsgLBAdbiVS5IXGLR8dt7hERf5SKyiDzD3+2q00PjYosmxkNzs+ysI82jmvdOvlVKCejlbKSCXF59JKhKxjYPxjzrLLExIkyplTbu3liT+sJ6/DSeQENfWrVLzk9aL/LNB8Njw/oUp/LinIVTA7e2prhrWwOG5xfSVyQaxlt1pjP9XiOmP2cAhRjImlc9ICG7QWR68ZhAHLKhtKWFRM7dpI2fgFSDxnTbikpGHO70BBp1GoXK6rJSdJt4OAu4adwxrVZsjBR08HtlAlQ==
Emails

"helper.china@aol.com"

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies Installed Components in the registry 2 TTPs
  • Modifies extensions of user files 14 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Stops running service(s) 3 TTPs
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 5 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cadbbf76fd42b925147d01cc74e82bc8b2b6b03a82a63ca39d2ef1c2877eb536.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\cadbbf76fd42b925147d01cc74e82bc8b2b6b03a82a63ca39d2ef1c2877eb536.bin.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c NET stop MSSQLSERVER /Y
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Windows\SysWOW64\net.exe
        NET stop MSSQLSERVER /Y
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1116
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop MSSQLSERVER /Y
          4⤵
            PID:1968
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c NET stop MSSQL$SQLEXPRESS /Y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\SysWOW64\net.exe
          NET stop MSSQL$SQLEXPRESS /Y
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1932
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop MSSQL$SQLEXPRESS /Y
            4⤵
              PID:1912
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c NET STOP acrsch2svc /Y
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2040
          • C:\Windows\SysWOW64\net.exe
            NET STOP acrsch2svc /Y
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1220
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 STOP acrsch2svc /Y
              4⤵
                PID:364
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c NET STOP acronisagent /Y
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:332
            • C:\Windows\SysWOW64\net.exe
              NET STOP acronisagent /Y
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:592
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 STOP acronisagent /Y
                4⤵
                  PID:1608
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c NET STOP arsm /Y
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:820
              • C:\Windows\SysWOW64\net.exe
                NET STOP arsm /Y
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1444
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 STOP arsm /Y
                  4⤵
                    PID:1040
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c NET STOP FirebirdServerDefaultInstance /Y
                2⤵
                  PID:816
                  • C:\Windows\SysWOW64\net.exe
                    NET STOP FirebirdServerDefaultInstance /Y
                    3⤵
                      PID:1500
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 STOP FirebirdServerDefaultInstance /Y
                        4⤵
                          PID:1132
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c NET STOP FirebirdGuardianDefaultInstance /Y
                      2⤵
                        PID:580
                        • C:\Windows\SysWOW64\net.exe
                          NET STOP FirebirdGuardianDefaultInstance /Y
                          3⤵
                            PID:1372
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 STOP FirebirdGuardianDefaultInstance /Y
                              4⤵
                                PID:308
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c NET STOP MuzzleServer /Y
                            2⤵
                              PID:2028
                              • C:\Windows\SysWOW64\net.exe
                                NET STOP MuzzleServer /Y
                                3⤵
                                  PID:1036
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 STOP MuzzleServer /Y
                                    4⤵
                                      PID:1120
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c taskkill /im 1cv7s.exe /T /F
                                  2⤵
                                    PID:1620
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /im 1cv7s.exe /T /F
                                      3⤵
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1836
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c taskkill /im 1cv8s.exe /T /F
                                    2⤵
                                      PID:2012
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /im 1cv8s.exe /T /F
                                        3⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1940
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c taskkill /im 1cv7.exe /T /F
                                      2⤵
                                        PID:1236
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /im 1cv7.exe /T /F
                                          3⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:636
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c taskkill /im 1cv8.exe /T /F
                                        2⤵
                                          PID:240
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /im 1cv8.exe /T /F
                                            3⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1040
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c wmic shadowcopy delete
                                          2⤵
                                            PID:304
                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                              wmic shadowcopy delete
                                              3⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1500
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c sc stop "Acronis VSS Provider" /y
                                            2⤵
                                              PID:1972
                                              • C:\Windows\SysWOW64\sc.exe
                                                sc stop "Acronis VSS Provider" /y
                                                3⤵
                                                  PID:1664
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c sc stop "Enterprise Client Service" /y
                                                2⤵
                                                  PID:1860
                                                  • C:\Windows\SysWOW64\sc.exe
                                                    sc stop "Enterprise Client Service" /y
                                                    3⤵
                                                      PID:1588
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c sc stop "Sophos Agent" /y
                                                    2⤵
                                                      PID:1080
                                                      • C:\Windows\SysWOW64\sc.exe
                                                        sc stop "Sophos Agent" /y
                                                        3⤵
                                                          PID:2004
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c sc stop "Sophos AutoUpdate Service" /y
                                                        2⤵
                                                          PID:1932
                                                          • C:\Windows\SysWOW64\sc.exe
                                                            sc stop "Sophos AutoUpdate Service" /y
                                                            3⤵
                                                              PID:576
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c sc stop "Sophos Clean Service" /y
                                                            2⤵
                                                              PID:2040
                                                              • C:\Windows\SysWOW64\sc.exe
                                                                sc stop "Sophos Clean Service" /y
                                                                3⤵
                                                                  PID:1444
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c sc stop "Sophos Device Control Service" /y
                                                                2⤵
                                                                  PID:1636
                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                    sc stop "Sophos Device Control Service" /y
                                                                    3⤵
                                                                      PID:1084
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c sc stop "Sophos File Scanner Service" /y
                                                                    2⤵
                                                                      PID:1760
                                                                      • C:\Windows\SysWOW64\sc.exe
                                                                        sc stop "Sophos File Scanner Service" /y
                                                                        3⤵
                                                                          PID:524
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c sc stop "Sophos Health Service" /y
                                                                        2⤵
                                                                          PID:304
                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                            sc stop "Sophos Health Service" /y
                                                                            3⤵
                                                                              PID:1968
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c sc stop "Sophos MCS Agent" /y
                                                                            2⤵
                                                                              PID:896
                                                                              • C:\Windows\SysWOW64\sc.exe
                                                                                sc stop "Sophos MCS Agent" /y
                                                                                3⤵
                                                                                  PID:1928
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c sc stop "Sophos MCS Client" /y
                                                                                2⤵
                                                                                  PID:1620
                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                    sc stop "Sophos MCS Client" /y
                                                                                    3⤵
                                                                                      PID:432
                                                                                • C:\Windows\system32\vssvc.exe
                                                                                  C:\Windows\system32\vssvc.exe
                                                                                  1⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:1324
                                                                                • C:\Windows\system32\WerFault.exe
                                                                                  C:\Windows\system32\WerFault.exe -u -p 1260 -s 2864
                                                                                  1⤵
                                                                                  • Program crash
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:1748
                                                                                  • C:\Windows\Explorer.EXE
                                                                                    "C:\Windows\Explorer.EXE"
                                                                                    2⤵
                                                                                    • Drops file in Windows directory
                                                                                    • Modifies Internet Explorer settings
                                                                                    • Modifies registry class
                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                    • Suspicious use of SendNotifyMessage
                                                                                    PID:1396
                                                                                    • C:\Windows\system32\NOTEPAD.EXE
                                                                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\HOW_TO_RETURN_FILES.txt
                                                                                      3⤵
                                                                                      • Opens file in notepad (likely ransom note)
                                                                                      PID:1924
                                                                                • C:\Windows\system32\AUDIODG.EXE
                                                                                  C:\Windows\system32\AUDIODG.EXE 0x590
                                                                                  1⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:1708

                                                                                Network

                                                                                MITRE ATT&CK Matrix ATT&CK v6

                                                                                Persistence

                                                                                Registry Run Keys / Startup Folder

                                                                                1
                                                                                T1060

                                                                                Modify Existing Service

                                                                                1
                                                                                T1031

                                                                                Defense Evasion

                                                                                File Deletion

                                                                                1
                                                                                T1107

                                                                                Modify Registry

                                                                                2
                                                                                T1112

                                                                                Impair Defenses

                                                                                1
                                                                                T1562

                                                                                Credential Access

                                                                                Credentials in Files

                                                                                1
                                                                                T1081

                                                                                Collection

                                                                                Data from Local System

                                                                                1
                                                                                T1005

                                                                                Impact

                                                                                Inhibit System Recovery

                                                                                1
                                                                                T1490

                                                                                Service Stop

                                                                                1
                                                                                T1489

                                                                                Replay Monitor

                                                                                Loading Replay Monitor...

                                                                                Downloads

                                                                                • C:\ProgramData\Microsoft\Windows\Caches\{6AF0698E-D558-4F6E-9B3C-3716689AF493}.2.ver0x0000000000000014.db.cnhelp
                                                                                  MD5

                                                                                  efeb80db2000f0331a75d3951e2fdf2b

                                                                                  SHA1

                                                                                  0d07de404c589bb2c5c25a962607d026051c175c

                                                                                  SHA256

                                                                                  b79d995a0e2aceb35b86e7ae825b051614fa2ffe6117d9167c5d951933f1db85

                                                                                  SHA512

                                                                                  d9ad4a58fe1369789b70392fe2d6cfebca3898dc40e13737729ca3bd45d73f1d78e177389c6092bf0a052bb03439e24f07cc0a734a11a52fbfdadba6c5236072

                                                                                • C:\ProgramData\Microsoft\Windows\Caches\{8BFFF793-2B14-4F95-B176-BEEF84057C2B}.2.ver0x0000000000000001.db.cnhelp
                                                                                  MD5

                                                                                  6278d0e91d439d64e57939a44ad615e6

                                                                                  SHA1

                                                                                  abffd4e40bb0efcc909bde8032a1e3512693eefa

                                                                                  SHA256

                                                                                  cfd657d75513d037af170aea57c7e61ecf9d634866d792b6e8f14bf7f6c0310f

                                                                                  SHA512

                                                                                  64d0fa523164751191db2b8fe4d18847f8db09421a52e32a08d9102186b67dab1027141790bcd76530bf1977002e8d7a2d33b6bf31308dbcd30a03a5ff1ee7cf

                                                                                • C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000002.db.cnhelp
                                                                                  MD5

                                                                                  0a8944a2696bece40d4c663d1d1fa8e6

                                                                                  SHA1

                                                                                  26aca3efe1d877daf856e757f2bf80084d34f77d

                                                                                  SHA256

                                                                                  b382412f494530dd5c535e3186ce5d78f106d5a8c532307dc3e2e5d086472e36

                                                                                  SHA512

                                                                                  3cbd0a63422f27522b9643b5300a2b27f26f72c8a0e8aa31b9a68012b610c47d56c8e6e8c0e4631d37720b0f203d230dcfcae8be5bf09adeb87926d90ffa7f78

                                                                                • C:\Users\Admin\AppData\Local\Temp\WPDNSE\HOW_TO_RETURN_FILES.txt
                                                                                  MD5

                                                                                  daf47760204eef6db5c5440b98f1eb50

                                                                                  SHA1

                                                                                  52756553b5101000263b641a3c307b270033ee86

                                                                                  SHA256

                                                                                  077bebd3572738fd0807ca990db964823937190017fa0aab7d76cd5a39071964

                                                                                  SHA512

                                                                                  aeac7156938680320fce4fe71dc1c88f77da441765d60c588005b5ed4f9e31e9e8469d211d8e0c02704a8e813f1549a49a5eac0e45e73dca7e3865cfa543190c

                                                                                • C:\Users\Admin\Desktop\CloseStop.wmv.cnhelp
                                                                                  MD5

                                                                                  8fe001e908a84476a10bcc8d39844120

                                                                                  SHA1

                                                                                  f5b9fa4a69b57130bbb7f478ce7d11aa8ca00950

                                                                                  SHA256

                                                                                  b51ab8d302e7164afb58b7dc42357c3ac48e6b0fa8409a471e44a827d479b3f8

                                                                                  SHA512

                                                                                  945340f6b9b3046fa6cb185e6119df18b7c54de4cf1ba37241d071dbdd374ca1f98398ba101d8a5804620bae74e6d44097b402692066bf32251e35018412e398

                                                                                • C:\Users\Admin\Desktop\ConfirmDismount.pps.cnhelp
                                                                                  MD5

                                                                                  114ebc947c95cc2778839df04cf4a984

                                                                                  SHA1

                                                                                  f15dbb10c1983d56b74fafba62410c76749d263d

                                                                                  SHA256

                                                                                  e1d739bca77d943fff28385c2f9001187c0be186b2dbd2030d39bdaa151febdb

                                                                                  SHA512

                                                                                  11f7c50ac0e46e51f0b713466e49d0859ef77391c5a71a3c11c04ae4178dfa3b636ef9ac9f27b680afd00732c23a53aaf733730ce3a2c312f3463b0555b6c2e7

                                                                                • C:\Users\Admin\Desktop\ConvertToConvert.vssx.cnhelp
                                                                                  MD5

                                                                                  33e413820c73bcd2a433b4c2415c2b11

                                                                                  SHA1

                                                                                  972cc14b34a5bf03bb8f54cdac73627a544ab0a7

                                                                                  SHA256

                                                                                  47057aa50969eeb7e50c62a6444e7811c4635db83c4631752e7e7564239311b2

                                                                                  SHA512

                                                                                  6eb1764ddc58350f0935e9be8dbbdaf80b667b77998400654908fc7e71e1f823f0d240f995f00118f9063cc1103f5fac500b825d042f15c408be82defb592fd0

                                                                                • C:\Users\Admin\Desktop\ConvertUnblock.jtx.cnhelp
                                                                                  MD5

                                                                                  1d084130147c0bbf4b2c6dd683a1211d

                                                                                  SHA1

                                                                                  fc783e3aa9397b83149c618cc5912b7d9b038434

                                                                                  SHA256

                                                                                  585e09ee0cd206776d1b248b8fb189b901ec0449d4032c3e05b84e579e88ceb0

                                                                                  SHA512

                                                                                  fc1559cdd35a188c93a6b28199319b253c1c9c89685c81a4d6bc64963c419c80f9d1b6a69e1b1f18423ef2a70def9b45a44b566913559b3124e45f2a875f88c3

                                                                                • C:\Users\Admin\Desktop\DenyUse.i64.cnhelp
                                                                                  MD5

                                                                                  bfd7a7034bea70fe3669fedf25e25b01

                                                                                  SHA1

                                                                                  b7c6c6d6aa0a1d6da43726a6e72bea247848172c

                                                                                  SHA256

                                                                                  e385b7dea1448ba97222ee69f1c90b17f442cb0fe87629bf348350c62687779b

                                                                                  SHA512

                                                                                  8c1ad791dd4b4983017d7646ded2e9c211b8c628d8cc76ecc5147c21e25d13056e48179b49a00f575bb3e419252f608ebb05d606d07f68113406ffd726d73f28

                                                                                • C:\Users\Admin\Desktop\ExportApprove.mp3.cnhelp
                                                                                  MD5

                                                                                  b6934b88d8120f82647a8cb79325c93a

                                                                                  SHA1

                                                                                  a1ba0c71884909284549248904eb69c4da8a5622

                                                                                  SHA256

                                                                                  41092761295fef0740fee3d40dad0e3054e69a0446a7280955095c6d6fb4ecec

                                                                                  SHA512

                                                                                  5bebbcc94c08dc9147c1a9062fdf2404114cce3652ebc7f11d0f1fd607c46c985ec9c6cbc3f279bc86ecacb53de12ac502c02d6963f03846b6b1e126f4e890b2

                                                                                • C:\Users\Admin\Desktop\FindPublish.au.cnhelp
                                                                                  MD5

                                                                                  a5634fdab17aa90d7774e5107881cd84

                                                                                  SHA1

                                                                                  cf7f50955352e76ba21fb1ff90cb3e8dfb4d82e7

                                                                                  SHA256

                                                                                  fe4266003f3d6768976bdb38dff8cc32a0d49c4a2e7f5a21d0c09fffa42c9b86

                                                                                  SHA512

                                                                                  cd44b7c0d1f4ce27cc25aba2b5f68ecaed573f7cab628489c74701ff3dc22a72e84116a1cbec17d2db9e3176865926355ea8a2202ed8b0d9aa10a2fff245d758

                                                                                • C:\Users\Admin\Desktop\HOW_TO_RETURN_FILES.txt
                                                                                  MD5

                                                                                  daf47760204eef6db5c5440b98f1eb50

                                                                                  SHA1

                                                                                  52756553b5101000263b641a3c307b270033ee86

                                                                                  SHA256

                                                                                  077bebd3572738fd0807ca990db964823937190017fa0aab7d76cd5a39071964

                                                                                  SHA512

                                                                                  aeac7156938680320fce4fe71dc1c88f77da441765d60c588005b5ed4f9e31e9e8469d211d8e0c02704a8e813f1549a49a5eac0e45e73dca7e3865cfa543190c

                                                                                • C:\Users\Admin\Desktop\ImportSearch.mov.cnhelp
                                                                                  MD5

                                                                                  cfbea1fbf7801784ba1fea4b1adc0a1c

                                                                                  SHA1

                                                                                  ef9f32871dac6a943beb16e735de5233b024aea9

                                                                                  SHA256

                                                                                  bd02f81388376fcaf5d6839e7df8f78bb4958300c43659f5bc88d19d1e785d46

                                                                                  SHA512

                                                                                  b21d23a32b600c0bda2b6db0fd2d12d97ad1adb303505c1bf29dae3ae7e671d09d2353ce22a1eb7c0072d0c525334dc4501d2276df0d9324af81b92d778590d4

                                                                                • C:\Users\Admin\Desktop\InstallEdit.wmv.cnhelp
                                                                                  MD5

                                                                                  7a0357e6d7696de33305e2a53384091e

                                                                                  SHA1

                                                                                  282f618ba21a0f809934aaa0564b578a4d020680

                                                                                  SHA256

                                                                                  4486105f249e023c220a387b65d949772cfcf75e4d73841646ffa27f9401f7a4

                                                                                  SHA512

                                                                                  6900ed199d1cc63b2ed0fa7b6970b1de28ef8064364b41e705ed2ba18ba7ec132f53dcc6e10c905c8ce3e47f6f674fcefbed918a2ea58dab73eb539d47c11442

                                                                                • C:\Users\Admin\Desktop\OpenFormat.temp.cnhelp
                                                                                  MD5

                                                                                  3915c69d079b285b559f1d3c4cf819b1

                                                                                  SHA1

                                                                                  7c329853d7fbc40a05134ad68acace28b13d9ed6

                                                                                  SHA256

                                                                                  b50d91514a78a4e5496f344d8927ce07824d40757a4ed98b0d2a1a2d697d87a8

                                                                                  SHA512

                                                                                  24d59c43bca98a1f706f093324e2a1e5bf92f88574b273290def1daa7630e723e4d4a852bf1ad4afc259cf26a084504262387e4f63c12dc57f071a33fdb81290

                                                                                • C:\Users\Admin\Desktop\OptimizeReceive.shtml.cnhelp
                                                                                  MD5

                                                                                  dd99c2ede03995ea96956467a33bf6e6

                                                                                  SHA1

                                                                                  e4ace3d263e9f2896d448e9a871cae322357cdf5

                                                                                  SHA256

                                                                                  fdc134de2169ef7593679c04f880a969ce977ed090ef323a696b98742c5cc127

                                                                                  SHA512

                                                                                  c051a5f6c7434055c577dc85e52ffe47e3b0b4eaf87b0d92a048b00ee998b38ef15c897ba133896552e04fac8589b5f15d4f8529b8660c00356b0f682a3b0421

                                                                                • C:\Users\Admin\Desktop\PopRestore.inf.cnhelp
                                                                                  MD5

                                                                                  58cbacceaf7f19107908de2edea7b8f8

                                                                                  SHA1

                                                                                  d49057a7fb55009aff4b13d2ee4ab2525b1768f7

                                                                                  SHA256

                                                                                  75271619ed8b330c0ee51c20582f5ca9c15029bf0ec46512ffd4e272fc5fa2d5

                                                                                  SHA512

                                                                                  f5d1e07b49caaac3157bd2882438033bf3e29777ce66273d3fd7fb9814b0e13a350537c74be50e565fc6a1de4b200e261ef75fcac0619f0ea965712a61946d32

                                                                                • C:\Users\Admin\Desktop\PushRevoke.ppsm.cnhelp
                                                                                  MD5

                                                                                  f1e1355da3e8c3b7ad2530303b6e499e

                                                                                  SHA1

                                                                                  6c3144e498c6bcab98597ad42c38538b4230ea46

                                                                                  SHA256

                                                                                  7e00c7bde1c138a4864b6a1997a2c55c85e2c6b8dd29fe616873f476e7801911

                                                                                  SHA512

                                                                                  d389f306fb41bcc7527a99fba17908efb1c303ec4d107e4c98765718e09c1b47fc1ea72ee00a2b0304fc5eb3df941f1cd584a17601cb66073094ff521cd27aea

                                                                                • C:\Users\Admin\Desktop\ReceiveRequest.vb.cnhelp
                                                                                  MD5

                                                                                  c16f399079678289667010a4a27feb01

                                                                                  SHA1

                                                                                  fdbc9ef22030758cea5cee5cf0b792663b68522c

                                                                                  SHA256

                                                                                  2ce8a5e9dd95eb2f7918285bd5aafb5f4555a40f7da958395c3912e6e3feee93

                                                                                  SHA512

                                                                                  5c3c875796daa00c71398c83be769136479302c3d529376f4be4ef44b34fccd2321296d41016859e4430da67ad90f1414003c4448803e30f62c95ea4863d24ea

                                                                                • C:\Users\Admin\Desktop\RepairDisconnect.nfo.cnhelp
                                                                                  MD5

                                                                                  a0cb5c0295e608e51ce6df159b6224f3

                                                                                  SHA1

                                                                                  65919b21d668ba6103e3bbd59bb3fbee778885ff

                                                                                  SHA256

                                                                                  61f1e334bd228c3cd7148ab516fe3c8a336b583082a6c39de8b49154eb4588ee

                                                                                  SHA512

                                                                                  4ddaa87d9465004dc13953d3d5e6c84d3746de433696a3e545a654b62cfede7b30e96356774f294182b4ae466b3b139850d6f33d978df8d3294b15e4457caaa9

                                                                                • C:\Users\Admin\Desktop\RequestRemove.jtx.cnhelp
                                                                                  MD5

                                                                                  2f7bee8a9dce139fe9e7070d0ce1d2f7

                                                                                  SHA1

                                                                                  835fa2eeff1de089123bbd8ff75cb4ca37c0b7ec

                                                                                  SHA256

                                                                                  c8b2a07e85f01ca5aea213ca7929a3eb288616de839d081d17fdcde038391ed6

                                                                                  SHA512

                                                                                  5e0445772c45f0b583c4918f5a78544c394b58fd84991b80f6a81633973154e01177be98e36d883d8e00dbe291d538729d54ff277ff53cff3f7dd044971b2194

                                                                                • C:\Users\Admin\Desktop\ResizeRevoke.mp4.cnhelp
                                                                                  MD5

                                                                                  6d0bebe7a7b39f0ed696ee75a94ed4b8

                                                                                  SHA1

                                                                                  7c6cbc981244b3c09b3276e860253aae4b937fd3

                                                                                  SHA256

                                                                                  553f8d5f5e84647bae1b6466f465e21677760b039317c432b90432d05621d264

                                                                                  SHA512

                                                                                  07fa4c63b52e4631f425fac5640615a9d0c1ba3481f027d7ee86965bac4b56544bf81f23b4f97e6be9f6a187ecefa4100736bf9c75f962ee726ef09dc6becdca

                                                                                • C:\Users\Admin\Desktop\ResolveSend.scf.cnhelp
                                                                                  MD5

                                                                                  2b74df7bda8bcb158015dccb66f379c3

                                                                                  SHA1

                                                                                  3a6a4b9db2b430b1aa0796dfa085cc83a2073dc3

                                                                                  SHA256

                                                                                  79f772e0b426c520dcafdfb64f2868d917e6d9291d64ce46d88eeb35d2317040

                                                                                  SHA512

                                                                                  04a56d314f77afb62745a65d8d02e6908b13e34174229cddb497480f3fea3dfc3f669b855eb9235da312311d036e3988653ee10c5fa63b1f2fed2abcf33e653b

                                                                                • C:\Users\Admin\Desktop\ShowSelect.nfo.cnhelp
                                                                                  MD5

                                                                                  c059c8b21463736a51d60ec2704bed02

                                                                                  SHA1

                                                                                  35062a8fb4bf0a227520d7b1102128c0def15f5f

                                                                                  SHA256

                                                                                  a22f9c833c154c8c5c48e8ec0a89216e595e08b87ed28651d2afe64a1255d308

                                                                                  SHA512

                                                                                  15ad4ada7894d71e26efe28ddc6f3d08933d4144f088de6964491b7ada4010ca4bbcb9836455021065b6cb66d201baa8e0dd9fe9a72c25cfdbe6c246938e37f0

                                                                                • C:\Users\Admin\Desktop\SplitConnect.mhtml.cnhelp
                                                                                  MD5

                                                                                  ec92f2a3a8b1aa5f0f0ae29f922134aa

                                                                                  SHA1

                                                                                  bdea2263771036068e08f2db758185db31ddfa9e

                                                                                  SHA256

                                                                                  f96c5477ee5c709c6d873a93864962a4527634759285914eb5ee5fc9496ed759

                                                                                  SHA512

                                                                                  3a737b2b2ed3be0981d5d1127a8d3db0583e2dc9522e077aadd67691f6f594aee056db95bb26d16bfa9428a62a101e0b17e44e1a1b8be44fa5b77694cc743fde

                                                                                • C:\Users\Admin\Desktop\SplitDeny.tif.cnhelp
                                                                                  MD5

                                                                                  cf6f9383b1ef6bf8364648b8078faefb

                                                                                  SHA1

                                                                                  b6682175eae27b709079f3fba6d34d2bcabbd7b3

                                                                                  SHA256

                                                                                  3a3f7e4a9b392f73ef8a925817fffdf8913611abaa5a4263d71ac316c4a1a975

                                                                                  SHA512

                                                                                  0fc7f4fbf3a5df6f5b378ad9d5a817210ef9835d0eb033959c5dd860ff3c0899c03e8f8d4485d9eccc72e56e35cd9b46be83ae06ba969806c47a03e1785b2037

                                                                                • C:\Users\Admin\Desktop\StartRevoke.potx.cnhelp
                                                                                  MD5

                                                                                  ffa59a8c16b30b0ce14f94d790a999a5

                                                                                  SHA1

                                                                                  12c2c6dbbe0f25deccf02bcef0a6f6035651a01b

                                                                                  SHA256

                                                                                  194584d03c92fd7e1e1e5f3366373a30b398295192fe52dfb08c5afd1c7bd3ef

                                                                                  SHA512

                                                                                  49ba41519c7fe1b09b5771993d6fff1f3e563fcbbe97a358616e5d3e165ccac4cede29888d4494d6783335247037121de3c5ce2dda1bb6af7213effc5f8d90f9

                                                                                • C:\Users\Admin\Desktop\StartWatch.sys.cnhelp
                                                                                  MD5

                                                                                  a8414bd8078192be0c120f25629a8e2f

                                                                                  SHA1

                                                                                  3728db8048069188d329a4a8c939595066733592

                                                                                  SHA256

                                                                                  cfdb7710a702769b0a57a93d17cc69df94842f0937aaac9dd2b025434e7ec802

                                                                                  SHA512

                                                                                  a171f97ea9545b4430b5f097164b9b1e0a88a32798a840f879e3e7df2fa0c18e3ab2ba91191dda90a5ebe754b27d905cf61588d3642ab1f2d3051f094bd25d80

                                                                                • C:\Users\Admin\Desktop\StopReset.wma.cnhelp
                                                                                  MD5

                                                                                  9f5412f00765d0beb6b015b19c6a0e7a

                                                                                  SHA1

                                                                                  e8349d5bcd57ac3cf4335686a2e1f5c730369830

                                                                                  SHA256

                                                                                  23c9f19d3aa494c2c6ef90557b7b1df5dd109a866652c60abd2cbd8cc60bc987

                                                                                  SHA512

                                                                                  04ce721646ea7b43bebb34b740a792bcb2e5eb73f522676027c59396a810aa2ad300bd1574509a297e05d1996b04815e25d53ce094893218d56cd3cc164efd32

                                                                                • C:\Users\Admin\Desktop\SuspendCompare.ocx.cnhelp
                                                                                  MD5

                                                                                  e9cb7bfc511510cacb8f696b991be04d

                                                                                  SHA1

                                                                                  e2bc1e53628e8ebf924fae9e0abac69c5c3663ec

                                                                                  SHA256

                                                                                  92cc8b822615fc5c4375131e172440a38854d11abacaa329f482ce43b43777e3

                                                                                  SHA512

                                                                                  55d7f64834b7110568801da5e14913b8a2d485f1f5c3692fbdb3704217be650325f2510d4fb6608d555f0b4bdcf399c78a20136f3989c73e657fead4498f2e31

                                                                                • C:\Users\Admin\Desktop\SyncRemove.TS.cnhelp
                                                                                  MD5

                                                                                  6c62fb45f5d25f83b7670ced730773cb

                                                                                  SHA1

                                                                                  5fe4ac95220cec960a77bf74ae9cea67b40b709e

                                                                                  SHA256

                                                                                  239c4c391e0dc9a4773004f45dab6f664c348c2cbb38a941e3d2a9fb15ed0f1e

                                                                                  SHA512

                                                                                  ade572de61574afc77d28cb34c45efce4d23ed7905ed49d14678e50c826a288b79d6b7194598b9886a9f42ae0c49124886d34badae04133718df8af3a9cf3b2f

                                                                                • C:\Users\Admin\Desktop\UninstallExpand.jtx.cnhelp
                                                                                  MD5

                                                                                  d5e340d528a2bba8880b4914c6d7383f

                                                                                  SHA1

                                                                                  5c1270dbd9fe9cf02219f437b4d94d55b85e6014

                                                                                  SHA256

                                                                                  95c52fb94acb6c444ddb01d51558d60580c53f8b72230fcd17c0e179f896849d

                                                                                  SHA512

                                                                                  5e9d5b101d34ba2afb0c98fda421eb9187fba798b84646a1ae4cacbe820ab5c9b89025a326d791cc996ad04f2b4ec63c92c5529e07521444bbbb4b7932c97eca

                                                                                • C:\Users\Admin\Desktop\UnlockUndo.mpa.cnhelp
                                                                                  MD5

                                                                                  4c1e97c963cf36dbec416fb376f55d0d

                                                                                  SHA1

                                                                                  b45edcba7b2d169c13189c665cda700ca28eb7f1

                                                                                  SHA256

                                                                                  263be491dffabe6bf3704033ea5df804cb5a4842f9219bc6f6636fbff7ca9f89

                                                                                  SHA512

                                                                                  f618c8d50820379807518c8fe10462e63be9b73ba799ee91db6b5c5b7dec419f1ac22b7a13a649f371fb9ec7179b7cf859527b5c541bc4577a464ae09d9c61c0

                                                                                • C:\Users\Admin\Desktop\UseGroup.inf.cnhelp
                                                                                  MD5

                                                                                  2c1b1c28a6e6a78b7b8dc29df8170694

                                                                                  SHA1

                                                                                  51cc7bb80f79b58ee17eff0547bf6ba03af952fd

                                                                                  SHA256

                                                                                  65a2e18817962dc4e27ef7a38c67c2bbc6a85bbee693a9478221e5ec9c7bdb69

                                                                                  SHA512

                                                                                  691e4b66b17633826246ec9a360ffd39ead5f2847d4fe3f7815c9720bf1d1c2464c1bfcdbabb60dec51567e01d39686aa386d0bbbf45d66ce8abffb3ff560e4f

                                                                                • C:\Users\Public\Desktop\HOW_TO_RETURN_FILES.txt
                                                                                  MD5

                                                                                  daf47760204eef6db5c5440b98f1eb50

                                                                                  SHA1

                                                                                  52756553b5101000263b641a3c307b270033ee86

                                                                                  SHA256

                                                                                  077bebd3572738fd0807ca990db964823937190017fa0aab7d76cd5a39071964

                                                                                  SHA512

                                                                                  aeac7156938680320fce4fe71dc1c88f77da441765d60c588005b5ed4f9e31e9e8469d211d8e0c02704a8e813f1549a49a5eac0e45e73dca7e3865cfa543190c

                                                                                • memory/240-32-0x0000000000000000-mapping.dmp
                                                                                • memory/304-34-0x0000000000000000-mapping.dmp
                                                                                • memory/304-50-0x0000000000000000-mapping.dmp
                                                                                • memory/308-22-0x0000000000000000-mapping.dmp
                                                                                • memory/332-11-0x0000000000000000-mapping.dmp
                                                                                • memory/364-10-0x0000000000000000-mapping.dmp
                                                                                • memory/432-55-0x0000000000000000-mapping.dmp
                                                                                • memory/524-49-0x0000000000000000-mapping.dmp
                                                                                • memory/576-43-0x0000000000000000-mapping.dmp
                                                                                • memory/580-20-0x0000000000000000-mapping.dmp
                                                                                • memory/592-12-0x0000000000000000-mapping.dmp
                                                                                • memory/636-31-0x0000000000000000-mapping.dmp
                                                                                • memory/816-17-0x0000000000000000-mapping.dmp
                                                                                • memory/820-14-0x0000000000000000-mapping.dmp
                                                                                • memory/896-52-0x0000000000000000-mapping.dmp
                                                                                • memory/1036-24-0x0000000000000000-mapping.dmp
                                                                                • memory/1040-16-0x0000000000000000-mapping.dmp
                                                                                • memory/1040-33-0x0000000000000000-mapping.dmp
                                                                                • memory/1080-40-0x0000000000000000-mapping.dmp
                                                                                • memory/1084-47-0x0000000000000000-mapping.dmp
                                                                                • memory/1116-3-0x0000000000000000-mapping.dmp
                                                                                • memory/1120-25-0x0000000000000000-mapping.dmp
                                                                                • memory/1132-19-0x0000000000000000-mapping.dmp
                                                                                • memory/1220-9-0x0000000000000000-mapping.dmp
                                                                                • memory/1236-30-0x0000000000000000-mapping.dmp
                                                                                • memory/1372-21-0x0000000000000000-mapping.dmp
                                                                                • memory/1396-59-0x0000000000000000-mapping.dmp
                                                                                • memory/1396-95-0x00000000040A0000-0x00000000040A1000-memory.dmp
                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/1396-60-0x000007FEFB431000-0x000007FEFB433000-memory.dmp
                                                                                  Filesize

                                                                                  8KB

                                                                                • memory/1428-2-0x0000000000000000-mapping.dmp
                                                                                • memory/1444-45-0x0000000000000000-mapping.dmp
                                                                                • memory/1444-15-0x0000000000000000-mapping.dmp
                                                                                • memory/1500-35-0x0000000000000000-mapping.dmp
                                                                                • memory/1500-18-0x0000000000000000-mapping.dmp
                                                                                • memory/1588-39-0x0000000000000000-mapping.dmp
                                                                                • memory/1608-13-0x0000000000000000-mapping.dmp
                                                                                • memory/1620-26-0x0000000000000000-mapping.dmp
                                                                                • memory/1620-54-0x0000000000000000-mapping.dmp
                                                                                • memory/1636-46-0x0000000000000000-mapping.dmp
                                                                                • memory/1664-37-0x0000000000000000-mapping.dmp
                                                                                • memory/1748-56-0x000007FEFBB21000-0x000007FEFBB23000-memory.dmp
                                                                                  Filesize

                                                                                  8KB

                                                                                • memory/1748-57-0x0000000001DA0000-0x0000000001DB1000-memory.dmp
                                                                                  Filesize

                                                                                  68KB

                                                                                • memory/1748-58-0x0000000002380000-0x0000000002381000-memory.dmp
                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/1760-48-0x0000000000000000-mapping.dmp
                                                                                • memory/1808-98-0x000007FEF74A0000-0x000007FEF771A000-memory.dmp
                                                                                  Filesize

                                                                                  2.5MB

                                                                                • memory/1836-27-0x0000000000000000-mapping.dmp
                                                                                • memory/1860-38-0x0000000000000000-mapping.dmp
                                                                                • memory/1912-7-0x0000000000000000-mapping.dmp
                                                                                • memory/1924-96-0x0000000000000000-mapping.dmp
                                                                                • memory/1928-53-0x0000000000000000-mapping.dmp
                                                                                • memory/1932-42-0x0000000000000000-mapping.dmp
                                                                                • memory/1932-6-0x0000000000000000-mapping.dmp
                                                                                • memory/1940-29-0x0000000000000000-mapping.dmp
                                                                                • memory/1968-4-0x0000000000000000-mapping.dmp
                                                                                • memory/1968-51-0x0000000000000000-mapping.dmp
                                                                                • memory/1972-36-0x0000000000000000-mapping.dmp
                                                                                • memory/2004-5-0x0000000000000000-mapping.dmp
                                                                                • memory/2004-41-0x0000000000000000-mapping.dmp
                                                                                • memory/2012-28-0x0000000000000000-mapping.dmp
                                                                                • memory/2028-23-0x0000000000000000-mapping.dmp
                                                                                • memory/2040-8-0x0000000000000000-mapping.dmp
                                                                                • memory/2040-44-0x0000000000000000-mapping.dmp