Resubmissions

18-07-2024 14:09

240718-rgaytssakp 8

18-07-2024 13:33

240718-qtg28szhqj 10

Analysis

  • max time kernel
    1557s
  • max time network
    1345s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-07-2024 14:09

General

  • Target

    file.ps1

  • Size

    1B

  • MD5

    7215ee9c7d9dc229d2921a40e899ec5f

  • SHA1

    b858cb282617fb0956d960215c8e84d1ccf909c6

  • SHA256

    36a9e7f1c95b82ffb99743e0c5c4ce95d83c9a430aac59f84ef3cbfab6145068

  • SHA512

    f90ddd77e400dfe6a3fcf479b00b1ee29e7015c5bb8cd70f5f15b4886cc339275ff553fc8a053f8ddc7324f45168cffaf81f8c3ac93996f6536eef38e5e40768

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 19 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\file.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2736
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1688
    • C:\Windows\System32\control.exe
      "C:\Windows\System32\control.exe" SYSTEM
      1⤵
        PID:956
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
        1⤵
          PID:3036
        • C:\Windows\System32\control.exe
          "C:\Windows\System32\control.exe" SYSTEM
          1⤵
            PID:2288
          • C:\Windows\SysWOW64\DllHost.exe
            C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
            1⤵
              PID:1084
            • C:\Windows\SysWOW64\DllHost.exe
              C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
              1⤵
                PID:624
              • C:\Windows\System32\control.exe
                "C:\Windows\System32\control.exe" SYSTEM
                1⤵
                  PID:2804
                • C:\Windows\SysWOW64\DllHost.exe
                  C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                  1⤵
                    PID:2816
                  • C:\Windows\SysWOW64\DllHost.exe
                    C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                    1⤵
                      PID:2988
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\main.cpl ,1
                      1⤵
                      • Modifies Control Panel
                      PID:2920
                    • C:\Windows\helppane.exe
                      C:\Windows\helppane.exe -Embedding
                      1⤵
                      • Modifies Internet Explorer settings
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:3056
                      • C:\Windows\system32\control.exe
                        "C:\Windows\system32\control.exe" /name Microsoft.FolderOptions
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1944
                        • C:\Windows\System32\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" shell32.dll,Options_RunDLL 0
                          3⤵
                            PID:1356
                      • C:\Windows\SysWOW64\DllHost.exe
                        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                        1⤵
                          PID:1468
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" http://c;/
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2724
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:2
                            2⤵
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:2740
                        • C:\Windows\system32\taskkill.exe
                          "C:\Windows\system32\taskkill.exe" /f /im explorer.exe & start explorer.exe
                          1⤵
                          • Kills process with taskkill
                          PID:1684
                        • C:\Windows\system32\cmd.exe
                          "C:\Windows\system32\cmd.exe"
                          1⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1192
                          • C:\Windows\system32\taskkill.exe
                            taskkill /f /im explorer.exe
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1732
                          • C:\Windows\explorer.exe
                            explorer.exe
                            2⤵
                            • Boot or Logon Autostart Execution: Active Setup
                            • Drops file in Windows directory
                            • Modifies Internet Explorer settings
                            • Modifies registry class
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2564
                            • C:\Windows\system32\NOTEPAD.EXE
                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini
                              3⤵
                                PID:1812
                            • C:\Windows\explorer.exe
                              explorer
                              2⤵
                                PID:2292
                              • C:\Windows\system32\NOTEPAD.EXE
                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini
                                2⤵
                                  PID:2616
                                • C:\Windows\system32\taskmgr.exe
                                  taskmgr
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:2156

                              Network

                              MITRE ATT&CK Matrix ATT&CK v13

                              Execution

                              Command and Scripting Interpreter

                              1
                              T1059

                              PowerShell

                              1
                              T1059.001

                              Persistence

                              Boot or Logon Autostart Execution

                              1
                              T1547

                              Active Setup

                              1
                              T1547.014

                              Privilege Escalation

                              Boot or Logon Autostart Execution

                              1
                              T1547

                              Active Setup

                              1
                              T1547.014

                              Defense Evasion

                              Modify Registry

                              2
                              T1112

                              Discovery

                              System Information Discovery

                              1
                              T1082

                              Query Registry

                              1
                              T1012

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\$IOTA03D
                                Filesize

                                544B

                                MD5

                                b431ecdc11a656be17f1a88a8ac5e5c8

                                SHA1

                                4df02f49eec33ff9e7e309ccd8e77168419603cb

                                SHA256

                                b6778433d817cfc2763b77344c6d3fafb0f12f14af59cdf1f8347e7c37b3f7f5

                                SHA512

                                874d4d3d8b09719ad9c63998bf270b7e0b28c47849b42628211029bcb6030fe96b90a02653a1011b9520731ee6f18a29f5c556ed234232123c005fa2d659bc2a

                              • C:\Users\Admin\Desktop\DenyStop.TS
                                Filesize

                                714KB

                                MD5

                                cf211faf66605437f2f0ddfe0ae9937c

                                SHA1

                                143ee4223ffc5b88df1bbcaae1749de217e8c977

                                SHA256

                                9e8e6b89a89177f8639163a73e0a07b8050058db2fe68ef9e03cc90ff046438d

                                SHA512

                                655039b039547ccd9de779da14c0c4c1c8445fbea2f6025c8e40a0d63ed730e1fa92d610c36477550d4ea8dc474d8a6cedc7098f9e27ebd8539b5049dedf0f0a

                              • C:\Users\Admin\Desktop\EnableConvertTo.m3u
                                Filesize

                                539KB

                                MD5

                                0fe241eb7b3db95d206e8a781ebd3bca

                                SHA1

                                c20550342bffef45c9746aa485a9bfbb12e44f25

                                SHA256

                                16142674a985712eeeb5900855090e2969f2f6d5939a28feac6ccc603d4a145f

                                SHA512

                                0f9b063991793d65e5e0d98c7ae7d948b15ef6925860fe776dbd9d7aa88481a8c1f04a7aa99fadd88efa51ed3b967ca8ea847cc599e81425923a281eaa698a6b

                              • C:\Users\Admin\Desktop\FormatTrace.ttf
                                Filesize

                                609KB

                                MD5

                                1ac982b3989aca9fc2b00c2417f6dd49

                                SHA1

                                23ad5a8f0c117e277d138312e702116f0d8e8235

                                SHA256

                                c9933ec6199b6833f0153f271b46e20c5dc75106625cab82ca38111ab5c52346

                                SHA512

                                41d062111174ad82020dd7b59e5150537b1ccebefe5cf3f2129c4cdcd616cf16347f0262ef6d0b1f837ebfb028034122d330e3a04a133b00dca44a01f1412743

                              • C:\Users\Admin\Desktop\GetMove.bmp
                                Filesize

                                922KB

                                MD5

                                1bc473a1d2095fe158cc3c7754c695f8

                                SHA1

                                b49ae4db6a9e835b34c4bdbdaaf555c4793c3c2a

                                SHA256

                                c7d1be14c2e7fd446133051ac1f55d314698cccbdcf8021618de3f4a88ae7223

                                SHA512

                                a232daf5c4a6cb11b7627af08a7de6d24c0fba67e1400d73f07129ac4a8e10443cb970eb1a497c75b945a013ac042741e5fe1b6ded0937302d3db00c4a0f6851

                              • C:\Users\Admin\Desktop\GetSet.easmx
                                Filesize

                                748KB

                                MD5

                                37f4bdef1b4237a99b6e452663c351b2

                                SHA1

                                e6b99a9d192d534c8be1f6f086ea4c7ef4c19245

                                SHA256

                                ad7e6e2a53c92b7be8008c745d5f26a8189590a234d6da6e64cad1c7067e8528

                                SHA512

                                4406e00f417d8517a5d4357232c97bb564e8da9300915350905b604ce2c40e54ecb7e0c6da903d19743942cd0ebfe6d3cb53b6d6cf1d7e868af42ecd786672bf

                              • C:\Users\Admin\Desktop\ImportCompare.xls
                                Filesize

                                853KB

                                MD5

                                0641a247347bacb596686fbd1aa1f840

                                SHA1

                                faf9d99cf7738ec3729009491fcad8478e6c818d

                                SHA256

                                e37086657ea5b885ef2e9eba1d9fdae7de7831217ccebe354d5f8b4fb18c041e

                                SHA512

                                dc86228b1b2d619946c57f6a8c560faa8e465371dbc70ccf1546efd80cf2a903248519195c7f45184a7eefd7904f72b5305d76e805472e768fc4037a1383f4d6

                              • C:\Users\Admin\Desktop\InstallHide.htm
                                Filesize

                                818KB

                                MD5

                                8f1048b77e5e400fe208efcb9db4bbef

                                SHA1

                                a37cdd78c44f0372b20dd080c0f3baa9b78ee38c

                                SHA256

                                cbad9ff3207f16b2e75595357c49e02e7e92e0bcc3cc94aa935ba0a659c85ff8

                                SHA512

                                56ff2531a21df5c15790c299d43fff59ac684dbf70189fd85a75346f7d4f50215d8f58038b11e915b7347033d0d59c1afe2491d683b63a31e68c867f8f3684c6

                              • C:\Users\Admin\Desktop\InstallUndo.wmx
                                Filesize

                                470KB

                                MD5

                                08b57afab3869daa9e02e491c07a1986

                                SHA1

                                c884632a4a8ce1590f060293e6c402c64f1ce48b

                                SHA256

                                f9c37d4af130acbdbd98975682dd9abbea07fcc07d2812756a6e3e14d9368e1a

                                SHA512

                                7192f0c2e5338cc168a0e241fabb10756ecda8474c4d9431d87974a6351b97b134a36c6937ff024ad8e8f3abea46928439b5ad344c485a7d1c8ebea599cf242c

                              • C:\Users\Admin\Desktop\InvokeClear.temp
                                Filesize

                                505KB

                                MD5

                                d7bae9814e3b5b12210d389d49126d70

                                SHA1

                                7ab7048d454c1f4a181332a0570d0da4be1d2676

                                SHA256

                                4d1500649c01f3b917c38a7441fec6b433afdd54defa94870578c1808c498859

                                SHA512

                                6dccff0f9d87697f8002fa0f78c465559b231aa49731e0ced42fb4990caf8a50ffbec623e3557a8034a20392bfe9755eb8df334d941e60777e421f8394db7cd4

                              • C:\Users\Admin\Desktop\MountInitialize.contact
                                Filesize

                                1.4MB

                                MD5

                                6e8b832fad3ef15d76cab1ba7d549b9e

                                SHA1

                                2ed5cc8f69b9cd15ad53fd0194b7357af4f6d498

                                SHA256

                                322dba7dd1c8f44cc5b271fd0b17410f6d876be45cf344562ee7c830da8d338f

                                SHA512

                                8e0226f460940115f9a28ee3e27d66386f859e37da62e770941570ff6750bc739bdce98f77d0a058de4d37f634dee3f628df6e3d73bae419dbfcee0eac9de1d4

                              • C:\Users\Admin\Desktop\ProtectSuspend.mhtml
                                Filesize

                                574KB

                                MD5

                                806af1d8bc4d22f73749df276dae13d9

                                SHA1

                                4c11b773a7a9204f279716db068d37d61e205f59

                                SHA256

                                26d86a951381a7db430a241bf432295bb2a8ecda2efdf5e2e4d2d372f415afe8

                                SHA512

                                f1ccfc6e837fe26337cb2d369bc48a9bc7412abfd4beaa0eb25614f38e4b9ac9f4f5ec86e06e53e59507c7325526ca4e089e127d3c1e03dc53a42b68631209b7

                              • C:\Users\Admin\Desktop\Recycle Bin - Shortcut.lnk
                                Filesize

                                359B

                                MD5

                                e91e2e19d333d2869ecd4e84dadce0b1

                                SHA1

                                4cc8f4571869f83e2c0ebfac3dd17f0c51654bd6

                                SHA256

                                1bae20e282456a5df55249f23d3c89430ed079c5e0f25d16976128f303db9e61

                                SHA512

                                b540108474cd92140d824e7aedc50b24fc30bcd9d5a87ac9c5f6af11b1079d518006c1942a156da093f3e27481cb5182d60118c4e984f099a38cff68fbb59867

                              • C:\Users\Admin\Desktop\RegisterRestart.vbs
                                Filesize

                                783KB

                                MD5

                                482d465181c1b1245cc29a9cfccb4493

                                SHA1

                                7edd35dde62c49261a8891c3b114272a82e5e422

                                SHA256

                                0ae5e835e2037edeb46ea85feb11f7bfe2e6c88f82c8ef5268057c0512e89ab3

                                SHA512

                                5a95bf84cd50c899d7893e0494b22365c19ad55d6206b706d3c478473210982aefd6b3f216b3533b8b0c146da75e8277de688ea468da8b3930daf392a0b2499f

                              • C:\Users\Admin\Desktop\RestartSync.vdw
                                Filesize

                                365KB

                                MD5

                                59a864f52272f213e4b41bdd550b18dd

                                SHA1

                                1287b4819f693ce0988d9349810fb06a5fe048b1

                                SHA256

                                dbd0d261c3a28b3735c17fea4ba064bd6cdbc4ac47c3bbb5af6f8d1dc514ede8

                                SHA512

                                48b0b6e6ba1bd5d221d3e445debc38b994caf5f16f0ba2e707a7027c77944e421032f59c058acbb21773ad63acf0e566c5245942b38860ee9e7fd19af2999bdf

                              • C:\Users\Admin\Desktop\S-1-5-21-3434294380-2554721341-1919518612-1000 - Copy (10)
                                MD5

                                d41d8cd98f00b204e9800998ecf8427e

                                SHA1

                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                SHA256

                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                SHA512

                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                              • C:\Users\Admin\Desktop\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop (2).ini
                                Filesize

                                129B

                                MD5

                                a526b9e7c716b3489d8cc062fbce4005

                                SHA1

                                2df502a944ff721241be20a9e449d2acd07e0312

                                SHA256

                                e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                SHA512

                                d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                              • C:\Users\Admin\Desktop\SendBackup.xlsx
                                Filesize

                                12KB

                                MD5

                                db183532e6189ea42ad0caa368fc40bf

                                SHA1

                                11cc091ea900d95b2835a6de85483cf0f75cf11a

                                SHA256

                                986c30619350112526fb7320ad671eb6ae9e874de38d98fd29f6a196bbd1fce0

                                SHA512

                                89f96fbd80bedbd87db2bdc11232aafe06463dc6da2026802b6d1af502e3ce94d0ddde45645f729d63e84c9e96fb46ecc5f301f9a62e619a12706ee10173285c

                              • C:\Users\Admin\Desktop\SetPush.vssx
                                Filesize

                                644KB

                                MD5

                                6458386b0152a6f67ffb72599d67a7f9

                                SHA1

                                ab269e8055dbb17900d2d8e8b7590f1bc955a17b

                                SHA256

                                969edb8892d5d521540aa24fd86933eb5c1b6ee7b3f509cb859f8df3c45c9d7d

                                SHA512

                                0733540b990bcfb11b2cb82eb94f8b3fb94df466096d04fb8e0e0842fab0f1bb55461a9a9e451d9118bf3b8721b0448158b9eb08925e940e3f4c45b34f231415

                              • C:\Users\Admin\Desktop\SplitDeny.wma
                                Filesize

                                957KB

                                MD5

                                5dec1a393b472d6aeb04093fbc4da14a

                                SHA1

                                43ebdd76b57d4f49f89ad14964db8d9e663d2e2c

                                SHA256

                                0daffbd8f41bbf87a70c77ebaede58ad58858f8f6b09f22c41efa7a9676d3638

                                SHA512

                                a4d082473dff5fcb5e4225bff9c49aae3f8d815299be8aa7b3539f8ce1775a74393d34c64b6d5062d460270561c4678b2417e8fe659332ce72ffc1d28e4016f1

                              • C:\Users\Admin\Desktop\StepStart.docx
                                Filesize

                                20KB

                                MD5

                                2c28de05de5bc9a71b3579e01caf3aee

                                SHA1

                                b327dc2e5f145e4878b70f483e372c3aba02f29b

                                SHA256

                                9160e95e93f297454562b0015c1bd08800a28e8c087a12e14354eda4c6408b24

                                SHA512

                                a4fd2735e32252e7ff4395e459ffec7cf2d3cf5b3f11d031b9704065301528e8ab5d9e4e21b31640f5f0d338f234c5b8a61cb97f88360bc945e8378529fe49b3

                              • C:\Users\Admin\Desktop\SyncLimit.ppsx
                                Filesize

                                992KB

                                MD5

                                562a51ee5fed0e7a10d50e660846501b

                                SHA1

                                e3079622ff662a61ca103ae51b8db94cca52050e

                                SHA256

                                4c4594f077f839e9c5602cbe46d5cfc0bf39ce37bbab7c28bbbf781d73eeee13

                                SHA512

                                6f8a5bd5e4e6f96b98b8fff9704f4822dde9d0b536818c7e910758d80a9938f32336ed9e2b760e58e0745e14d31e894c04d1c74008268736c794800036d0b14b

                              • C:\Users\Admin\Desktop\UnblockRename.vsd
                                Filesize

                                400KB

                                MD5

                                0f0859042bdb5f4dcf2bbf14d0bac0ea

                                SHA1

                                9e74d13101bb631c902b567a0d2af2021fc3f5bf

                                SHA256

                                4aa743766d839484ee2e03b1cc36ab4686c2603165f59dfb66924c1618052cf1

                                SHA512

                                ada5e3c13715b2a51f13ea822ac865d22b5e67c9598ab9f6d9a01229ab0277cd88ee03cf262739940bc0271876832cfcbe7242b741ae4bf1b53b79f456a56014

                              • C:\Users\Admin\Desktop\UndoOut.tif
                                Filesize

                                1.0MB

                                MD5

                                55686e0ad339eda5a1cdf82f67a6a62c

                                SHA1

                                6a7690505350a1814e0304ebd8e60b153fc41ff2

                                SHA256

                                a8e0de179fd9da96fbc5801db38d03c6966eb923447b3c14fbec49f9dc975c95

                                SHA512

                                5560f1981eaac23ec4c003c242de3e5c4ea47e397e507b4af2b4162091d63b91387a6f3cd69f949f84872291c68396c571ee84cf97be236fff9549da1a6ede23

                              • C:\Users\Admin\Desktop\UndoRemove.docx
                                Filesize

                                14KB

                                MD5

                                0993a1f2a6c10191622f70c1b6298eb8

                                SHA1

                                9d2fb7e618969107a129cccf1e16ec80e282fb0e

                                SHA256

                                67270d2cad4eb833ec95570f24f59241b4a27f484be45f9734a355ef646805ba

                                SHA512

                                31c58c30a60443bfa3654660c20f776973b594fa437e78656f849826309f96383e7c6a51b2b410e24dfbd3d07a4c08fab47f5921cc212d279e07a0bf5fbe7247

                              • C:\Users\Admin\Desktop\UnpublishReceive.sys
                                Filesize

                                435KB

                                MD5

                                3ec4e4b09400e2fdc0f987f838368514

                                SHA1

                                61895d65e33cc3530193dc0a257c922e5fb68eef

                                SHA256

                                0a60022ecdfc12aafd77b13b809748e96582fd78c4c76c6057246decdb64caa0

                                SHA512

                                3ba3be6c12487f349da61e1ec3cd9f8950910c435b8772a9f1c8cf4440c7203eb2a7f30ddc2ce58d3152e85af63dc858b7369cad0f3cf24161c81248af32b214

                              • C:\Users\Admin\Desktop\UnpublishUninstall.ps1
                                Filesize

                                679KB

                                MD5

                                6a9486bfede57a64b1a002d4faf31ea0

                                SHA1

                                7d111c305e46f236492637b4140b89b8b500f81f

                                SHA256

                                83b278ff7bfdf8ae42cdcfef067db792047c3daa126b1f1b51b6729c6660cb35

                                SHA512

                                1bf5705b7e7a62b637c90c61a318815b28ca3db85df9e72eb35d5d214723f5b794e109fa09a54e2398bc653277066eb1689805e3848fd2d5034202154dd84672

                              • C:\Users\Admin\Desktop\WriteHide.xps
                                Filesize

                                888KB

                                MD5

                                5c5eb0d02c315b943f45b43daa42a891

                                SHA1

                                cafc9a7d4268ce35e6d228b767474064e5b2d5b2

                                SHA256

                                2914d6180d707159a0f0f0d1fd8eb76c15e346680584e9e438f9b5dff0c8e2ff

                                SHA512

                                3b471ac043cb1abfadb943a370192ed728f1f31bb688b4466506e3152b9998a9918a839b288f81d68ea15d8a3fdf7b6ded36c153048118872188776fee8952e7

                              • C:\Users\Admin\Desktop\desktop.ini
                                Filesize

                                282B

                                MD5

                                9e36cc3537ee9ee1e3b10fa4e761045b

                                SHA1

                                7726f55012e1e26cc762c9982e7c6c54ca7bb303

                                SHA256

                                4b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026

                                SHA512

                                5f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790

                              • C:\Users\Public\Desktop\Adobe Reader 9.lnk
                                Filesize

                                1KB

                                MD5

                                f7833a6b4d0d3c6252c5bae72ce4ffbe

                                SHA1

                                3eb6826cc838d14053c9136e3cd5d2c82c8582b9

                                SHA256

                                2c5f9ff9573aa5522f947629e208b0501a3a526fde950a5a715914b1a68c4d2a

                                SHA512

                                bbb7fe2d40bdaf68d0dbd7178949eda11569843c435449d6ed2180d37607f2d97fd3e547aabde8fdc2186ae906d747de56bc29d24f076d346ea772e716bf8081

                              • C:\Users\Public\Desktop\Firefox.lnk
                                Filesize

                                931B

                                MD5

                                c7a442b0cc33249f397470b1846890a5

                                SHA1

                                fe68d996c69127b3a8c521fbba06b740ea707db8

                                SHA256

                                e4662963a01dc464d7157011460a227fd4136a8c5593762584657aee3d4134a3

                                SHA512

                                b549f82a1142a78e6666cbc55aaccccedfa8b99fdd510e249708b330539fe75ab7f7f010a748478e2a234a4d1ef2316e5706bfd7c3e05f42a6838aad6936f916

                              • C:\Users\Public\Desktop\Google Chrome.lnk
                                Filesize

                                2KB

                                MD5

                                b1fb1da90e3920c93556f2f85dfca9b7

                                SHA1

                                3008eae1f155928ef7477c44154624c314a15e97

                                SHA256

                                7cbaa0e3aba25ff5230928503699abaac70268810d6b8f7259242604a143315b

                                SHA512

                                3235df04640552d64e74fd43030e03e88fba7a7145935503c9a30cffda5ee02207303fad5dbbb2060f5371acbccb9b0fdc5e96972c25cb63d249cfdd1a11deca

                              • C:\Users\Public\Desktop\VLC media player.lnk
                                Filesize

                                878B

                                MD5

                                51389fc9204a2c44a09cc6573a58d44e

                                SHA1

                                38b86b7e193aa034d11d5fd657230b6e51a05101

                                SHA256

                                49a096a737f387c490c495b0e26eb0e32777e26073256e21cc50854e78cea6ed

                                SHA512

                                0697313dc31a053a0ddc7c90b5e9ef45652bda929770406d7ade3187ecafeef33e906d3a9f2468b8e9ad722692f7bfef087851c5970068df7eeebe3a75fa00e4

                              • C:\Users\Public\Desktop\desktop.ini
                                Filesize

                                174B

                                MD5

                                dc723b859dec1526568ad581aec334d5

                                SHA1

                                74e7432df4a66f246b5214d60b190b67e2f6ce52

                                SHA256

                                7148fbbf1aac8b5a54d248df19b60c00d3c0dcb2fd5bb2a1efd4e0f0eac6dd0f

                                SHA512

                                9bb97339f18dc8744bfb7cb8fd9392c580765e707ddc228ef5045150375510b43f1f4c310274e20fc1c0c51f50f40d4430f40561d5cff46ff42214e465490074

                              • memory/2156-174-0x0000000140000000-0x00000001405E8000-memory.dmp
                                Filesize

                                5.9MB

                              • memory/2156-166-0x0000000140000000-0x00000001405E8000-memory.dmp
                                Filesize

                                5.9MB

                              • memory/2156-175-0x0000000140000000-0x00000001405E8000-memory.dmp
                                Filesize

                                5.9MB

                              • memory/2156-167-0x0000000140000000-0x00000001405E8000-memory.dmp
                                Filesize

                                5.9MB

                              • memory/2564-113-0x0000000004100000-0x0000000004110000-memory.dmp
                                Filesize

                                64KB

                              • memory/2736-8-0x000007FEF5DD0000-0x000007FEF676D000-memory.dmp
                                Filesize

                                9.6MB

                              • memory/2736-9-0x000007FEF5DD0000-0x000007FEF676D000-memory.dmp
                                Filesize

                                9.6MB

                              • memory/2736-7-0x000007FEF5DD0000-0x000007FEF676D000-memory.dmp
                                Filesize

                                9.6MB

                              • memory/2736-10-0x000007FEF5DD0000-0x000007FEF676D000-memory.dmp
                                Filesize

                                9.6MB

                              • memory/2736-5-0x000000001B580000-0x000000001B862000-memory.dmp
                                Filesize

                                2.9MB

                              • memory/2736-12-0x000007FEF5DD0000-0x000007FEF676D000-memory.dmp
                                Filesize

                                9.6MB

                              • memory/2736-4-0x000007FEF608E000-0x000007FEF608F000-memory.dmp
                                Filesize

                                4KB

                              • memory/2736-11-0x000007FEF5DD0000-0x000007FEF676D000-memory.dmp
                                Filesize

                                9.6MB

                              • memory/2736-6-0x00000000027E0000-0x00000000027E8000-memory.dmp
                                Filesize

                                32KB