Resubmissions

05-10-2022 12:52

221005-p4f29aeegr 6

28-09-2022 22:17

220928-17gczaacem 8

28-09-2022 22:13

220928-1489kshbd6 8

Analysis

  • max time kernel
    84s
  • max time network
    79s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-09-2022 22:17

General

  • Target

    https://disk.yandex.ru/d/TvSiY2PLhgXJog

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Drops file in Windows directory 2 IoCs
  • Detects Pyinstaller 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 58 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" https://disk.yandex.ru/d/TvSiY2PLhgXJog
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff805b74f50,0x7ff805b74f60,0x7ff805b74f70
      2⤵
        PID:5044
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1640 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:8
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1592 /prefetch:2
        2⤵
          PID:5116
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2288 /prefetch:8
          2⤵
            PID:4632
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2876 /prefetch:1
            2⤵
              PID:3624
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2864 /prefetch:1
              2⤵
                PID:948
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4132 /prefetch:8
                2⤵
                  PID:4236
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:1
                  2⤵
                    PID:4156
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4484
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5988 /prefetch:8
                    2⤵
                      PID:2948
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5956 /prefetch:8
                      2⤵
                        PID:3196
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6176 /prefetch:8
                        2⤵
                          PID:3520
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6168 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3980
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6036 /prefetch:8
                          2⤵
                            PID:4808
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6024 /prefetch:8
                            2⤵
                              PID:4940
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4348 /prefetch:8
                              2⤵
                                PID:420
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3488 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1488
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6040 /prefetch:8
                                2⤵
                                  PID:1240
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6076 /prefetch:8
                                  2⤵
                                    PID:1856
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:1
                                    2⤵
                                      PID:3308
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4064
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:1
                                      2⤵
                                        PID:416
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:1
                                        2⤵
                                          PID:4940
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4864 /prefetch:8
                                          2⤵
                                            PID:4796
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6520 /prefetch:8
                                            2⤵
                                              PID:1484
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6368 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2284
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:1
                                              2⤵
                                                PID:1764
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:1
                                                2⤵
                                                  PID:4844
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4132 /prefetch:8
                                                  2⤵
                                                    PID:752
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=776 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:344
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4132 /prefetch:8
                                                    2⤵
                                                    • Modifies registry class
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2404
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1556,5554809473584651290,5647537645954490401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2836
                                                • C:\Windows\system32\taskmgr.exe
                                                  "C:\Windows\system32\taskmgr.exe" /4
                                                  1⤵
                                                  • Drops file in Windows directory
                                                  • Checks SCSI registry key(s)
                                                  • Checks processor information in registry
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:2272
                                                • C:\Windows\System32\rundll32.exe
                                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                  1⤵
                                                    PID:3296
                                                  • C:\Users\Admin\Desktop\eth_promo_hour.exe
                                                    "C:\Users\Admin\Desktop\eth_promo_hour.exe"
                                                    1⤵
                                                    • Executes dropped EXE
                                                    PID:1232
                                                    • C:\Users\Admin\Desktop\eth_promo_hour.exe
                                                      "C:\Users\Admin\Desktop\eth_promo_hour.exe"
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:1612

                                                  Network

                                                  MITRE ATT&CK Matrix ATT&CK v6

                                                  Discovery

                                                  Query Registry

                                                  3
                                                  T1012

                                                  Peripheral Device Discovery

                                                  1
                                                  T1120

                                                  System Information Discovery

                                                  3
                                                  T1082

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\Desktop\ConfirmWrite.css
                                                    Filesize

                                                    381KB

                                                    MD5

                                                    01c6a457a8934dde20b9d9dd60acb18a

                                                    SHA1

                                                    da97c2d5ad136e9ce7271ad3a05d977b196d331d

                                                    SHA256

                                                    dd99963a8ac4d746898286fec9566e1a28223bf8fa20c1b60302c4385109dec0

                                                    SHA512

                                                    f920408d647679dee308dd0b05e16721ae5a5fc9d1938f8024ba464b3b5efdbba754a1b7b595a78cfceb8f830f84bc8dd1cbb936b42e96bc8f108bfbe0b97b67

                                                  • C:\Users\Admin\Desktop\ConnectAdd.ps1
                                                    Filesize

                                                    137KB

                                                    MD5

                                                    cd8b2bafdee879e8a33e35f6fc051d89

                                                    SHA1

                                                    98368a2450c7b9f97f70de9b3c4cccf377b2ce6f

                                                    SHA256

                                                    da8ba057147fa9ec32be60a3939094e98fcafe9d44573554fb64cca1d574ba87

                                                    SHA512

                                                    45d3d64a7a3ab941af8d4e086885771ef4160642f39657873c1e4b2ac03df9a72f3a436325875432ef5963c33abdfdd4ce2e2cb24512f6e3c4a83b53e21a8a55

                                                  • C:\Users\Admin\Desktop\ConnectProtect.cfg
                                                    Filesize

                                                    540KB

                                                    MD5

                                                    ad48654f4b4b482162cd55ea1d215a7b

                                                    SHA1

                                                    6caf98c154665817da54cc310d483727592ec47e

                                                    SHA256

                                                    cbd1ff2c7cfd75c2f52f7858281ae9b6efda7e58780c98991d3b3bf43aef66be

                                                    SHA512

                                                    512c69d64736ff4747a3b480a1da6e46fcaedcff3197d1bf143b1efd83a3382373eceefef68edaf7d450202e6fcdbf1bd813a33e8a36dd024f4ed17e1a5611aa

                                                  • C:\Users\Admin\Desktop\DisconnectRequest.jfif
                                                    Filesize

                                                    307KB

                                                    MD5

                                                    7e47835ce6f3d96205d24237afd73a70

                                                    SHA1

                                                    d70c4aaa0e70e9a2d9f6178dc9ce2f9d3c2c1754

                                                    SHA256

                                                    5ed82ae4455ec5f5e4ef43afb5fa73b66c8912f3bff82059f6cdc2ba239d0f05

                                                    SHA512

                                                    65eaa0501098ac9ff71caabb2654d659ad98308d2e01d0ef3d81b85eb70e86795f582c2fa9566f6ffb57467c00558f981b3b908b52e385e3bdb1d5ad1a9f93da

                                                  • C:\Users\Admin\Desktop\EnableFormat.001
                                                    Filesize

                                                    148KB

                                                    MD5

                                                    fb9cf5e529c270ba27f8a5935e109ba3

                                                    SHA1

                                                    17de84c3324e4c099718edb4e3307f9f3c8124b7

                                                    SHA256

                                                    134080b2d999000d994b28b12e80b244e2e1a4a649d285794f30675c3d32e2bc

                                                    SHA512

                                                    b2a719f67c5198e16c93d56c76a6da1f7a20e83ac933f85292d654b1a1be332161b241a90916370ab855de5be597a7cabf76f12ad117d0315a76e53984216f01

                                                  • C:\Users\Admin\Desktop\EnterRename.xhtml
                                                    Filesize

                                                    371KB

                                                    MD5

                                                    aae35b8ddc73c620d12533a040ef95bd

                                                    SHA1

                                                    96fc4414e7e4e47bfbe37328646fac91c3e591e9

                                                    SHA256

                                                    b51357f5626f407e4827d42e5d5d808170aefac262bb2f0619e6022de8574bc2

                                                    SHA512

                                                    39e6efdec2da5625ff74d5469f6a7d93e358f9e03177dd62fa81b94ea78769d2ec29d812b9eb70383c403db562886448fce19189c0f753657365d2f86b014ba8

                                                  • C:\Users\Admin\Desktop\ExpandStep.easmx
                                                    Filesize

                                                    286KB

                                                    MD5

                                                    4bd70c453485be192800ffc8e4cf74f3

                                                    SHA1

                                                    91c362cc54f55830c9d9d44474b8cb65996f36df

                                                    SHA256

                                                    4e7aa6b9817b63e3a137c5d4eb171e8ff2905e6c894bf4d9165c882f51ff78d1

                                                    SHA512

                                                    b69d7b9dc2df434e267cb0b93a3654f3496dd2e661db883ec2378717dcc96bb8159e553e46d42a392c76d9a196889154e5d7783aa7f0d39420a7e2e2982329be

                                                  • C:\Users\Admin\Desktop\LimitFind.txt
                                                    Filesize

                                                    201KB

                                                    MD5

                                                    333405ab60ab91659139768277802ad1

                                                    SHA1

                                                    43ecb7612ee73cd4c055d28bae36883809fabc9a

                                                    SHA256

                                                    727b454036cfee6f647702ba94e0a08afaf2d6872577c8178281a337fc886198

                                                    SHA512

                                                    aec43a83012f397c1ab01677473e1ac53ec0834ccfac16e657d3b98817f49d9108c207d5dead39a54e85f7fc7a632240f0a626f27b3bff770d1a05612919d25d

                                                  • C:\Users\Admin\Desktop\MergeBlock.pcx
                                                    Filesize

                                                    296KB

                                                    MD5

                                                    80ff4ab739ae8a696a8b10f7e3a363e3

                                                    SHA1

                                                    84ec635f33198691371737032e0aec74fe8a5d56

                                                    SHA256

                                                    77353f815e95b2e1c1ec7c574341894e36722a3e154f0e744b9b09bd5448d960

                                                    SHA512

                                                    b4fabd6f5704ebcf031a0d14724513c91a2471cdc56c823479aed652ec2ce4e8472b7a72ed1fa3690a999286c7a305bec566688ff863cde424341725db123609

                                                  • C:\Users\Admin\Desktop\MountProtect.ttc
                                                    Filesize

                                                    275KB

                                                    MD5

                                                    0355fccbcf619305938e22d265880e5e

                                                    SHA1

                                                    1940df9dc0922e2f950de92513e495ec63339ca0

                                                    SHA256

                                                    9771ceaee425d2a4f7accbd73f1a56f0b37207ca576ce97cee1a7bd8fde9f5dd

                                                    SHA512

                                                    e2f54a9824c78843551d2663788e2db3a7968b208ee31de49e65f1aeb4ea8d0a811a98f19ee8f5d6c8faaf461475d9dff8b2fd9454ad805486688d3fda1c2be9

                                                  • C:\Users\Admin\Desktop\MountSync.cmd
                                                    Filesize

                                                    328KB

                                                    MD5

                                                    71a6c79e217e5c78e727c4c476607839

                                                    SHA1

                                                    5a8f83e8e494985863f6394adcadf9686b10312a

                                                    SHA256

                                                    027da55ed2d8568fa9cc9017b8324cdf672389b37c81722a587df79d12c38261

                                                    SHA512

                                                    ec2e91a791655169a1a58bfda0596a3fd03c5cda12c5f69ff0345455e3ff27dad69011fe0579334a19043ca0818ab134ba529c11fcc0dd5158c64ffaf5868cd3

                                                  • C:\Users\Admin\Desktop\MoveMerge.css
                                                    Filesize

                                                    392KB

                                                    MD5

                                                    c9212a609f0e33bb7e63be20964235f5

                                                    SHA1

                                                    ae63bfe3fb6bdae61fa0a5c536846d7919702dac

                                                    SHA256

                                                    4af01ab568e50dc7e2f35ca0696416d5718107afc9fa1955e282092ddf953308

                                                    SHA512

                                                    03bee3331701e30eb23aab68c8db1ec3f31a5707403242a1581f771085d2ec0370ed43ec26ea3f009a107d60f505f5c9c1a9bd87f80b67c72456cb77b1f302ab

                                                  • C:\Users\Admin\Desktop\PushEnable.dotm
                                                    Filesize

                                                    233KB

                                                    MD5

                                                    cd22656d5f4985393500379e924e6ef6

                                                    SHA1

                                                    3ded30df518e4ee2dfe5f8d96c98d45b5f46e52d

                                                    SHA256

                                                    d777acce73a107938ff0f9d8ff6af38007032bee29e37df4080af1e6f6d384a1

                                                    SHA512

                                                    4a1b8d86f3517faf198427bd2950e69f0aa38f429417da053f801d49bea6792d8b87222bf8e47a21e736218f89be4c9bbb3b4e7ccd0182c32fa602b0487b725b

                                                  • C:\Users\Admin\Desktop\ReceivePush.xml
                                                    Filesize

                                                    339KB

                                                    MD5

                                                    006042a3324145a8b1667b9955891d9a

                                                    SHA1

                                                    5e44014f8dd9416ad3500a8140a28832361a75ae

                                                    SHA256

                                                    91bb1d92026badcae583b4b3ec1d854be1f0d8a045457e89f5fcf251c79472ca

                                                    SHA512

                                                    d5604f82aa135fa02d21e75f95c865e076881e1acec4b129d44a942b2bf9f1749eaf0a9848dd9e7ce67dc16f068607f7d570bcae852b37e66de475cddbececde

                                                  • C:\Users\Admin\Desktop\RepairConvertTo.mp3
                                                    Filesize

                                                    159KB

                                                    MD5

                                                    df53180286d839d7d8a9d28643e146e8

                                                    SHA1

                                                    e07c02edd1f626734b81172ccf7e0c01ab0f1dcd

                                                    SHA256

                                                    184bdd079c39827e68e849898faba5f5863b5363c281de82544da4d17d8f0a53

                                                    SHA512

                                                    4f2096b0161e4752d4234420f0eb92c09f92347bf0c64c9ee6b0fa660eb4b908f00bb27ba190f4dbdabfbf637cd08124092e377ed86b95f2a3ab8498960ce1ac

                                                  • C:\Users\Admin\Desktop\RequestStart.wmf
                                                    Filesize

                                                    360KB

                                                    MD5

                                                    f74cbed2a7bb422cd0ea1035d709e499

                                                    SHA1

                                                    d107612250c42948dc745d0b40d8c23e7e16eab9

                                                    SHA256

                                                    775e5c20814a7594f7f12e0221c19966e9de4a80871fd83c60ffb2c2c529418a

                                                    SHA512

                                                    dca2aef37d97e1e6b8784b03193f53a8692e108925a190336ef429ee72054372041df9898a13a8842d8b083fb67aeb4922bced997b21fd9c1eede19dee70f121

                                                  • C:\Users\Admin\Desktop\ResumeHide.mpe
                                                    Filesize

                                                    212KB

                                                    MD5

                                                    2c52c517fbe95a4ceddbe3542c530fea

                                                    SHA1

                                                    cfb0701a74c6f746259c4de2a1d53d72c93eee77

                                                    SHA256

                                                    9d8fe4d8601b48de9e9cafe93b907a74b244f0c4d943df6f4ddee09fe8b8586f

                                                    SHA512

                                                    74962cc2ef0e2049c7842d4028e43105d96071313d50142af5c4546431b2db21522cd6e8b573ff422fccc8fdcc579ca0be5a2df51fa178b18f6b7022b706d831

                                                  • C:\Users\Admin\Desktop\RevokeGrant.001
                                                    Filesize

                                                    222KB

                                                    MD5

                                                    6d80a90cc64525f105625e9d31a43d6a

                                                    SHA1

                                                    9a4da9b524d268a58be104ff50395e632376649a

                                                    SHA256

                                                    1ddc88b217e140591444a2bfe1e0a39ca7eff81439fc00b6ae2c2bf100a47ce4

                                                    SHA512

                                                    6c2ceccfc785640cfb1972c1a14ef7075b702da774e375696ea0371d4b864840279b7ad84f9ce96bc06764a9fbf1abfb45c4971b7dec7b665eb061bff1c63e8d

                                                  • C:\Users\Admin\Desktop\RevokeOut.M2T
                                                    Filesize

                                                    190KB

                                                    MD5

                                                    3de45eeff4e4ac5d3510759f45aa6d84

                                                    SHA1

                                                    09fc5d2500c8068985a3b7c85d5f83f724c7842b

                                                    SHA256

                                                    5164152f3f53961f9224dd527dd6c9ce104c08d46de0a9e7c6c51b68430a1b5a

                                                    SHA512

                                                    254eda88562341b0d0fb9c95246753efbc017a86b325ac5daf6d1ab3cbc99297394f73c3e9f0d5bee1f5c0db5f53937f9bdf11de0a94e9e89552befa4d0f816f

                                                  • C:\Users\Admin\Desktop\ShowStop.mp3
                                                    Filesize

                                                    349KB

                                                    MD5

                                                    013b2dd65a12d0c8ce1a0d267e1eac93

                                                    SHA1

                                                    448345c3bb59d88c7fa396fe7177a062d751b81a

                                                    SHA256

                                                    f75c11c563d5c83a44ea48feb814fbf887cc3933d1f7264994b5ef0107d4843d

                                                    SHA512

                                                    be9b8722d07ae19cdf89f0fbc61450f25393ab2d55bfef4554cdb217121796387e4f96e87354c1c57a48118237f7dd04f8662702e07d78070bdb15eaef6bd03c

                                                  • C:\Users\Admin\Desktop\SkipGet.vdx
                                                    Filesize

                                                    180KB

                                                    MD5

                                                    bf50480540bde9bdd140c9395fbcdb7d

                                                    SHA1

                                                    3a5f467a708a355e4570aee999104f85b1fe872d

                                                    SHA256

                                                    e73c2b2fc2c17a3bde0b1a5b6d2e0f4999bf9aa5bd4acbc920e1bf6200e9d7af

                                                    SHA512

                                                    926574d651e027f1651293e5a4be3a6bb945f767293b4e96fb9b534ccc04733d582ab173f9fca28c770e249238b1b70e4913b739810f1ae50d2fe822a773155b

                                                  • C:\Users\Admin\Desktop\StartMeasure.zip
                                                    Filesize

                                                    265KB

                                                    MD5

                                                    511e9b32c3a146ebb0673a94517f5d09

                                                    SHA1

                                                    6dca66fe5d1112e482efd05199644e2f5e5bda34

                                                    SHA256

                                                    156ec288ec90715723d4f32d207f65830117f3ec6901c77be1c74acc6842a2a9

                                                    SHA512

                                                    f5d059dd9da4d462f7d14e264a277a0a3382a8eb9b805c6d51f0f8754ab55bd0dd8fbb598a3a48da1ebb195cf832231f415d8f5207dc54f6ade66b3e2d3582f9

                                                  • C:\Users\Admin\Desktop\SuspendHide.mid
                                                    Filesize

                                                    318KB

                                                    MD5

                                                    c5c129f3abcd28f9dc7b558a68cd2c20

                                                    SHA1

                                                    32f595e577f9dd8ae68d4efc48a0f84113ab226d

                                                    SHA256

                                                    9c3527c4d9062b317030b27569d2e479de64b83fb795085a2a1a5f406458d95b

                                                    SHA512

                                                    d61183c1d637a136b66c4c848e32d6a435d41823d4f1c1b660f91a89127aac8c2f269d7ec1e1b013caf4aecbd810f8bee2b5ff987ed79c85cb599be51ba81079

                                                  • C:\Users\Admin\Desktop\TestStop.wdp
                                                    Filesize

                                                    243KB

                                                    MD5

                                                    1416f389aaca933ffdbee10497096571

                                                    SHA1

                                                    188791c746186c3bfe6182c945b800068a3bd026

                                                    SHA256

                                                    cbda2498378bfc6a71ccbf3a16050b36d8a33fbb2ea15966b5065c7a87c1046a

                                                    SHA512

                                                    44ad69ae6f52065d041633fae7ae4cf98f17abdb4a29f25d6953b23f8dc10b2a68a1bde9438d39d6bddc9ac0635f9b5ccf8ce181834071994550836c06176b7c

                                                  • C:\Users\Admin\Desktop\UndoHide.jtx
                                                    Filesize

                                                    169KB

                                                    MD5

                                                    ce5064ccda521abe2655f027a5d57a52

                                                    SHA1

                                                    2cdd11d01ea016b119ba4fdf611285bee5f8243f

                                                    SHA256

                                                    0825e583f80f62283f98d38198fe1338641a97986158a0a74e264b4dba1617c8

                                                    SHA512

                                                    d06c1bf03541e4f6e4cd41096f71a4a7ddcf1b17448857b482bb2b791a3c478ffd683a0e30b51a945b0763540dc1179ed6417c6a5673293cddef1efb31d2f423

                                                  • C:\Users\Admin\Desktop\UninstallResize.TTS
                                                    Filesize

                                                    254KB

                                                    MD5

                                                    184469be9cd6a0ed80f0e0a4b73ba856

                                                    SHA1

                                                    742c312bbd7748532703c472511751aa88441be3

                                                    SHA256

                                                    9ce93dabf2debeb3d0770d7da0fe103dcf53a5c226f0dc050afc966a47a51237

                                                    SHA512

                                                    68d53b6a3b86edd036c5effa5d9dda98fcc6f8f8762bf2a1751b8ee851f259bfa1b9dfe1ce7ec0d617310b3fab05d4b8b9e5bed51b7baa2ed701e1a249a6f0d1

                                                  • C:\Users\Admin\Desktop\eth_promo_hour.exe
                                                    Filesize

                                                    6.7MB

                                                    MD5

                                                    eceadc7fd68a1da4f9b09977de3320d8

                                                    SHA1

                                                    3e7dfec410a773b1378e64e7381baecd64804079

                                                    SHA256

                                                    c1d6c1a84b17fe953d28ea043b799563b60bba64e5ee7e1fe4165e26b650304e

                                                    SHA512

                                                    98c85bbe7bec1b1d534719956fd9cd7e2b17083514813cbd23b9d43b959ddbe233b800d96c7272f62fe8fc2e8136a7c14badedca31827aef41a515b9e1dcf19c

                                                  • C:\Users\Admin\Desktop\eth_promo_hour.exe
                                                    Filesize

                                                    6.7MB

                                                    MD5

                                                    eceadc7fd68a1da4f9b09977de3320d8

                                                    SHA1

                                                    3e7dfec410a773b1378e64e7381baecd64804079

                                                    SHA256

                                                    c1d6c1a84b17fe953d28ea043b799563b60bba64e5ee7e1fe4165e26b650304e

                                                    SHA512

                                                    98c85bbe7bec1b1d534719956fd9cd7e2b17083514813cbd23b9d43b959ddbe233b800d96c7272f62fe8fc2e8136a7c14badedca31827aef41a515b9e1dcf19c

                                                  • C:\Users\Public\Desktop\Acrobat Reader DC.lnk
                                                    Filesize

                                                    2KB

                                                    MD5

                                                    1ebbb288e289f75b22d126a8934be4cd

                                                    SHA1

                                                    9004cf4c71ca0c4ed886555dc1afa0d0186a8c2a

                                                    SHA256

                                                    13f522e5097e678a66aa2f5cca2e3fd08b96f67a76cd981328f55cf837dc88c7

                                                    SHA512

                                                    d76ef5b295d188a825f5ff20585c770186d4f6f39d5e1d3bc6dcdebd66de015ed1b76d2295655919d4e2cc71624a7d13c1c93de8abdc79cf8c174b7d16011772

                                                  • C:\Users\Public\Desktop\Firefox.lnk
                                                    Filesize

                                                    1000B

                                                    MD5

                                                    17ba9daa03d1b079a11b324f7c478d98

                                                    SHA1

                                                    80569a58d1014394e46505734d3e4f02338e5907

                                                    SHA256

                                                    389f64f010bcb40db7c537ce9796e06419837ee7f37378cbd34580ad5cd84066

                                                    SHA512

                                                    6be8d7240dbfabb458bbf7a2620d849c870a065c8da9fdbfb1e89ea0b6112b2e3342d29348cf07c637d2fc23e93c110f74661ea8c390889413e8a945d706e8bd

                                                  • C:\Users\Public\Desktop\Google Chrome.lnk
                                                    Filesize

                                                    2KB

                                                    MD5

                                                    ca9b1e755a886f99a03578715d86ed7b

                                                    SHA1

                                                    57045d121b71d095ab7ef70a43e1ae24400321c0

                                                    SHA256

                                                    0107306ccca8aad44b5f59f5310abf2053502b026ced58515088ac63e3ffe8c2

                                                    SHA512

                                                    f4aaa234d7686cecba0c6d85bf2b28f41d788d7fc3f7a15893cbec4d0e12038264c79f73e2368790286e7ac27ececb753beedf8a1cb5da2e964372836d76b805

                                                  • C:\Users\Public\Desktop\VLC media player.lnk
                                                    Filesize

                                                    923B

                                                    MD5

                                                    1cead698ef53962d1bacef8759ba11e0

                                                    SHA1

                                                    90e1df26d1da590dece1246d1398ba6ab4953380

                                                    SHA256

                                                    c17041cbab6a24b85dd79f2d808f134e8c0a0da947132b18fa209dc708d71225

                                                    SHA512

                                                    daafb4c1a396bbf82d5251305f39b9af80ae8f3d5bbd75dd1ca4a260bf9f766f9cd16c531e78e0df633c67206800c8f1b2d7bf8765892457675cd1848fcbcfd3

                                                  • \??\pipe\crashpad_1968_JETXZWZNAHDEISSZ
                                                    MD5

                                                    d41d8cd98f00b204e9800998ecf8427e

                                                    SHA1

                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                    SHA256

                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                    SHA512

                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                  • memory/1612-149-0x0000000000000000-mapping.dmp