Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05-08-2024 02:49

General

  • Target

    Mods.exe

  • Size

    108KB

  • MD5

    d0766f038dadc4963a8684b1b738451f

  • SHA1

    23759d331a6e502f2ce73daf02f53039bb1179f5

  • SHA256

    6f11f8ad7788e265e5dfc9c415c361a30bbd88d7a8ef80034cb82c7866143eeb

  • SHA512

    d37066021a0d00cbfa682a010d1c52352358bd5b6b299ad03ef1530c6542745fffe7e009bef33995480dfb9e24c71818eaf2d7c1a098ef5722a0cfd4eb71ea06

  • SSDEEP

    768:3jLBRoat5b0vuZKL4KTjfKZKfgm3EhiJ+YC8Qz:gpVL4KTjF7EAJw8

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1265745201981423616/iM82MxICrDVrvz1mdITQtz3DfzkhcwmfxWl438ReBQZxkcAAdGdNbo191wrdJRoCoTOJ

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks SCSI registry key(s) 3 TTPs 1 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Mods.exe
    "C:\Users\Admin\AppData\Local\Temp\Mods.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Checks SCSI registry key(s)
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:4408
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe44edcc40,0x7ffe44edcc4c,0x7ffe44edcc58
      2⤵
        PID:1572
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1864,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1856 /prefetch:2
        2⤵
          PID:4724
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2148 /prefetch:3
          2⤵
            PID:3980
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2156 /prefetch:8
            2⤵
              PID:5088
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3284 /prefetch:1
              2⤵
                PID:3528
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3328 /prefetch:1
                2⤵
                  PID:2352
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3792,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4444 /prefetch:1
                  2⤵
                    PID:4500
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4756,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4764 /prefetch:8
                    2⤵
                      PID:3628
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level
                      2⤵
                      • Drops file in Windows directory
                      PID:1152
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff7c7c44698,0x7ff7c7c446a4,0x7ff7c7c446b0
                        3⤵
                        • Drops file in Windows directory
                        PID:464
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4784,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4964 /prefetch:1
                      2⤵
                        PID:4756
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4412,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4748 /prefetch:1
                        2⤵
                          PID:4368
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3428,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4568 /prefetch:1
                          2⤵
                            PID:1892
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5132,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5192 /prefetch:1
                            2⤵
                              PID:4852
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3508,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4456 /prefetch:1
                              2⤵
                                PID:3380
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3484,i,3741322927917413297,11952250850607789615,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5040 /prefetch:1
                                2⤵
                                  PID:4120
                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                1⤵
                                  PID:4392
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                  1⤵
                                    PID:1972
                                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                    1⤵
                                    • Modifies registry class
                                    • Suspicious use of SetWindowsHookEx
                                    PID:4116

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    1KB

                                    MD5

                                    bb97b24ae4600fd375e07e58ab9036fb

                                    SHA1

                                    85ae3148351519de048db83196c76e6c4c757100

                                    SHA256

                                    06327c6f93d2c3742687c884c5070a4e989748c1135df57ff4de997e2479ed7b

                                    SHA512

                                    c5963782ba256c255899ac77a7f81c29a8f59860bd477111d25c23058ef2d40b97ead998b22f2f270da2d60329a82337806c986ed7cb8db872c59a26ae513fd2

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    8KB

                                    MD5

                                    7681e332a18a8344982dc62c33dbadf7

                                    SHA1

                                    ed31cc891de89047cf9158f5ed16fd52eb73292b

                                    SHA256

                                    22976bf224f55d46316f88fd7249b780ba20cb47c95017d5f367b38283089883

                                    SHA512

                                    bd4adea7246e72791b6e76d1304bee7165a71fb575e0e0c54f19436b97f6ee3bc74153babdb6186e5eea840d5907e2660a2682fe9fc5579281094bda1f4cc4c9

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    8KB

                                    MD5

                                    d5d1ce325d0ad26e481efc72b7d02695

                                    SHA1

                                    37c3e3e80be18b6c98d33117db30561e726848aa

                                    SHA256

                                    4c3a8a2b0f7bb49fc986b09ff69efb23489de0d776e95a56a6700ab1b8b2b0a8

                                    SHA512

                                    72ab7a6d79e3ff72377df1c16de5a2cd0d2e67066003352e7d7fcfc605dc5cf6e46a9cafb1a02fa08c8e4dd25a6b90fe1e3afb3a9c62039aee518937332cc5be

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    195KB

                                    MD5

                                    a1f69ad9507d65c815b4e31be5070519

                                    SHA1

                                    94b89c6f838fc98f109db1374f855e42934768a5

                                    SHA256

                                    b10f88cc4ff703b5dd0da4d3e5c26139923aeef0364376c6f810cd7cafb053f1

                                    SHA512

                                    50f13da787437a38f8e60dd71ebff3861a16d0d7198871abb6fcd6eb0579b7a2f11d8fa589aed2518f9dde736df12d66cf5b0a3ad6957a7595dea5983ee18b65

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    195KB

                                    MD5

                                    089227e49c4b98ff7e11eb9ec7e45c64

                                    SHA1

                                    bf40a7e725d99b4a52f8686532f04d1302e85db2

                                    SHA256

                                    7d5882dcc7b5d5d114a932c67881eb32a00cd86cceca70733f928a26ff8b8c2a

                                    SHA512

                                    44a3d3d8e8bbfc65a207e2a98854582e36e25615fc11c7e75c0e3b9282d9a2f36e30def7435f6e7ae5274859437ae060820f9ae17179bd5a5545f0373773a97e

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                    Filesize

                                    10KB

                                    MD5

                                    3e1f5eeae74491d8850ef2c8b03a9a3b

                                    SHA1

                                    0c02c9c2550107de6dd0eb740ac5668f292883c0

                                    SHA256

                                    66756c0edf3925de7bcb685385e2a4f0b854cffd796a9e90eb1ed064b1fb0e30

                                    SHA512

                                    7637f0807d88dbceeb68823a044583e2248ac1ba73c000da6560f94075635a27d15970df7e52f8315bdc2f1c45cff6f1ab7690e916b58307a533f8df24329c2a

                                  • C:\Users\Admin\Desktop\ConfirmRemove.lock

                                    Filesize

                                    302KB

                                    MD5

                                    5fd7424d30162a688264df9b06bf3442

                                    SHA1

                                    be403915ff75deb0d8350456f164ebe838a112ef

                                    SHA256

                                    b68a34a67ddfb74c1c1405002946d3fa4b29ff0f3674aac47e3028ac3a19377e

                                    SHA512

                                    6f72f2f99140c049f80740f970859202d0d6f4ff5a926d4294b9ab0643a560dd9cb1829093f8e2c5b7383f61437703904bc96d86830e91b58c5fb5b050ec86e9

                                  • C:\Users\Admin\Desktop\ConnectCopy.zip

                                    Filesize

                                    605KB

                                    MD5

                                    01111a05797822b090238ba33d1b5e32

                                    SHA1

                                    a71dad9ab4f637d69800678a3f33fb76ccc0acf2

                                    SHA256

                                    4f108ff907f03320bf40410a9e37605b5ffabaa5e9b2ddffccd559bac6ee0dfd

                                    SHA512

                                    1dc69a37c0bade6209a7b50210168788e582119eee33ac0dcedfbaebd1dadeb64d7b28ff4deb99fe230826fc5ae225f8867764796bfdc637c714ef5a9413cfb7

                                  • C:\Users\Admin\Desktop\ConvertEnter.tmp

                                    Filesize

                                    1.2MB

                                    MD5

                                    700533ea8120762d015cbe2ef7b9db30

                                    SHA1

                                    d7f5c40c4efd90483f0d504950941131ec06bb05

                                    SHA256

                                    2280a669ac59927130fc357f39a3e29c3db0105f107d1c2f5d072aab4727b369

                                    SHA512

                                    3ab82127267f8ed170f98f2845fc6fec68efe1539a5dd618bdb5df4d589670a327d45b310d6dc2ba1258df880d4b86b22475cb5b726ebd73fcdeb32325a57d9c

                                  • C:\Users\Admin\Desktop\ConvertToGrant.hta

                                    Filesize

                                    715KB

                                    MD5

                                    75272d3477656f143f78cb242e4864e1

                                    SHA1

                                    13e3a5ae79aad3be4a5689b84d80d70624e2613d

                                    SHA256

                                    55de7b46fd5c81c27dbd16eb931bf9359f39960ddeb3b49dc695c8fd778e29c4

                                    SHA512

                                    951134ef225fdfbd737e3a179a8b795a677eca589b94dd55bd22c719e76d0e5c2827151551a128c8ed6bcc985356684a5b772009920ce0c095028dd0ecb308c0

                                  • C:\Users\Admin\Desktop\FindConvertTo.jpg

                                    Filesize

                                    825KB

                                    MD5

                                    25d7e99d00285deff094075d18fed589

                                    SHA1

                                    a2fcec2ff58a2269acb09be086df984f6568add1

                                    SHA256

                                    991538b43bd8dcb482151e391b3d9cb58915035994de7e313dd444406192ff8a

                                    SHA512

                                    f64f9a1192772c9b7edeb15248bccf623e980f6609d4edb3e043341e10c1deeb4e8fe91e26d9d6ab210d4efb2178627da87a102d78c768be2da18c5b1624f7b9

                                  • C:\Users\Admin\Desktop\GroupAssert.xlsx

                                    Filesize

                                    11KB

                                    MD5

                                    10132069bd82fd8dea7278cf660b83d4

                                    SHA1

                                    6fd23c7d0b7025e2045b1f19491e464a0d44af96

                                    SHA256

                                    29a7156f131f838dc0bdd846c616d9bff67836202284c22edaef0a7d256c2f3f

                                    SHA512

                                    4f62f70a1cc2cfba77fd2e6ee95eeeee8e586f6812cb7f4eec9d5f9ab9ad9fbabf85154f3be98d9c01e61ee81fe4f75ca18e0768c68d1fdeae69c0bfa4817f6d

                                  • C:\Users\Admin\Desktop\LimitImport.docx

                                    Filesize

                                    20KB

                                    MD5

                                    bf5753b9b43d679b652f0ac47b146752

                                    SHA1

                                    bad4c982cbe54cd8486e6b5f64c39f40ee2b32d8

                                    SHA256

                                    4c39e9497c6a7d2eebec20ec95d1f1805499825d4e1ec01f973745e33e3ddaba

                                    SHA512

                                    9ebed55e022827e4a2cfc29fffb78f21499baea63a13569b43679bae0914cd42dc2b7578d80fb47a2480a59eee8410869b7549d169b669b5b562cbb98c0b20d6

                                  • C:\Users\Admin\Desktop\MeasureInstall.htm

                                    Filesize

                                    385KB

                                    MD5

                                    f60b397e6c7c97c3ea9099623cfe3d0c

                                    SHA1

                                    97a944f5704766a2a0ef90de272ef69fe912df3d

                                    SHA256

                                    092db6e5cbc37e8b19c2afbd9fcfc6f5be6aad1332755ac299cdbf6f9b2dc9f9

                                    SHA512

                                    d78afe9e071a1d42138a85dd73aac18a4d1b0a9826127b9774d55f806f5be6ea83639f76c2c2ae65a98f64faef0466ed2c0cc81d5802ce8209515b2972195edf

                                  • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                    Filesize

                                    2KB

                                    MD5

                                    c0e97487e611bac0e794011a21f63781

                                    SHA1

                                    f4635321f4206677d22ac20372f66decc8b0c0ab

                                    SHA256

                                    f07ceed92d7c70c803ae961f3d32023650d918a584f25e14c627e9234be10147

                                    SHA512

                                    e1da2fce930421cb1de9c346704537ec895e3ebcd911e135dd4c6f4b1475ce1d8dedfaaf4bb311c8446578c9ea93f636b87857f02be0b168aebf3f9f557ffeeb

                                  • C:\Users\Admin\Desktop\OutSuspend.easmx

                                    Filesize

                                    357KB

                                    MD5

                                    57d8b5604fd7cbb83b48863fbea1fbe4

                                    SHA1

                                    5f7b29747b67d8bbc844a816ef0bf6154b4807d2

                                    SHA256

                                    e21560af42c918adefc1f783b8aea86764d088f758ffde89b246e3f135609d1b

                                    SHA512

                                    0cd5c238faeb8f9965211aa81a306d2b918fc1e1e1572fffe719636de3fcd538ebedab06c9efb3fb9cc672145328749f0636d62b8bd71551d95e991abd513de4

                                  • C:\Users\Admin\Desktop\PingEdit.xlsx

                                    Filesize

                                    12KB

                                    MD5

                                    68b80692afd6f8f6e0cbc4019b5bcde5

                                    SHA1

                                    e0c20e67cb22c42b5f460756ee8cd28ebf71f502

                                    SHA256

                                    f94e34839f76513fa5e2ee3926257b890431ff4836efa4347e8d00bbe212ad9d

                                    SHA512

                                    bdd4ab8b681cc2eb669bda738d9bfc393fbe41783c385ee240eb846591cac819d8e583f92945f64654525db7f4db902d403738741082a319a184ca546e0de08f

                                  • C:\Users\Admin\Desktop\PingResize.M2V

                                    Filesize

                                    550KB

                                    MD5

                                    c05c803dd567f09fcb3d0a6bdffd7b9e

                                    SHA1

                                    cc4e0ec646857202859c338775af136c53770af1

                                    SHA256

                                    9671143693901ce24720d40736c3062ba71459094935fda232c9d667b23fe7a8

                                    SHA512

                                    adfb7c59921e416b18de7d05436fdfe19caf4d1e5151e750d8e93065ca3e545b3b708eced77b83333357c840912bf52c3d237cecc08923bece34a2923c87730e

                                  • C:\Users\Admin\Desktop\PingUnblock.xlsx

                                    Filesize

                                    11KB

                                    MD5

                                    f30709b25eba6df33b54c0a514ec86a4

                                    SHA1

                                    adc36700cbb6837f1aee4e3a748cf40b34d64b6a

                                    SHA256

                                    ecaf65f98e553f3cd52fbf95c492dc2dbe0f8ddd937296025ef1ca22599e1fcf

                                    SHA512

                                    0189cd91d39e2ca145d8a11847a8d648b2c546d3e9340434c9ef829d1596c10ca218a52b2676fd38d71a8465bca9a7344a6fb3cf7d54b11680342173cc8400a0

                                  • C:\Users\Admin\Desktop\RenameGet.mht

                                    Filesize

                                    660KB

                                    MD5

                                    f57036771f23d4d3218581a479a1f382

                                    SHA1

                                    33039b162c141fc74f51d9a6c4ecc513e8b978d2

                                    SHA256

                                    10004a200bc9ecfd30f848d91b09fb841c7e5c28be53a80268a6b2bf45433aac

                                    SHA512

                                    939b74b73fb7441ed6bfb5d7108c69400ae30761e3be6a51b351e42bd86275cc26ec4405ea60326336ce91dc6ca2bbca082b79e1226b3a449f140c5d269ad3fd

                                  • C:\Users\Admin\Desktop\RepairUndo.cfg

                                    Filesize

                                    495KB

                                    MD5

                                    7fa484dabb81971f78fa385e5fb8fa66

                                    SHA1

                                    686864a7e56dd5b44a7cb0e78bbb03ff64d03212

                                    SHA256

                                    4059fab1749b51afc29459ca3b92e9b5658fed2a4305d6812e31af65cc5eb45c

                                    SHA512

                                    c65a59d49e24fe90e569ca3e5ff0c56cd68bc786c23186c895c6f8704e8032594a1d35a32ceb335540517ef9441c03580b11b31f2da4ac590e13f7d142320e1f

                                  • C:\Users\Admin\Desktop\ResizeOut.xlsx

                                    Filesize

                                    11KB

                                    MD5

                                    d64e429803060b5424a1b7bf759f2541

                                    SHA1

                                    25f467e9683fd2e2da59530f7d721abe6139d302

                                    SHA256

                                    68ea18e110cbe55c897df2566f7fc5f90994aee1a95f197cd9dac32d75de6330

                                    SHA512

                                    8a0e454130053e9c8e76386d9ca19f4435dfa3dbccb9c320b811f62759e78d9402ad09c6dad96d5c683a820c2d0af6b0b0b7e64f0c514f344e1292f4ec0d5d86

                                  • C:\Users\Admin\Desktop\RestartPing.ppt

                                    Filesize

                                    632KB

                                    MD5

                                    8fdca7f68287eb1d981a14e135c89d85

                                    SHA1

                                    a4c9e792ce7fb815fdd3d77616c34ca09d1b269e

                                    SHA256

                                    cf561b13960c054356ac074c8cff2b21279ebd0d01a4ddc9b77c761505ed42c1

                                    SHA512

                                    89b5b7a4f2aed063ac1f618070a0d31715b258dca46bd92aee6a1f8f9f011b1615047eaca06b679199a87cbaf19c5c10d32e767ee61d826697713276aff5dd53

                                  • C:\Users\Admin\Desktop\ResumePublish.asf

                                    Filesize

                                    797KB

                                    MD5

                                    b6dec94d57b093b605a3ee633bf9dc7e

                                    SHA1

                                    97327e8bbe38f88697fbbe977fd587ae9eb8cfc4

                                    SHA256

                                    c04b704f3abbdb05e48c8eb730a599e69bd9f4cf2b2e7ea050d7197520d481fb

                                    SHA512

                                    894b956c44d70c5d2a31b96b31171873dde827ffbca894ebebd13fb5e1e81245b666b8c89665d8bf6e1961c034f235e6209a7b1153923d5bd95da149d7c07f66

                                  • C:\Users\Admin\Desktop\RevokeSkip.pps

                                    Filesize

                                    770KB

                                    MD5

                                    585063846d5a8fe90593b0f5906c496c

                                    SHA1

                                    8350d3a7e18003bb0e517012ca16e117400356e3

                                    SHA256

                                    4c11c21b6d6ad34a058536f3e821856a3d03cefd9dc2fa49b8b2257de0622e0a

                                    SHA512

                                    3cc687feec428e28ca51c7f15889f159c880fe5a6b9b30198fbf70a7bd3f58f75703688d6459da51544f24e02801c48a5371f920812ef79ac115b4089b15143d

                                  • C:\Users\Admin\Desktop\SelectStart.xlsx

                                    Filesize

                                    11KB

                                    MD5

                                    291d879f72afa30b1db658e6bfb4cc89

                                    SHA1

                                    61e7a8e75ec5f682e0450e6f4dca5a50b6c555ae

                                    SHA256

                                    bf8a5c89c7e98ba157ee2c08a78763a48e138f7954e41bc7f6d66b8d67a9ff81

                                    SHA512

                                    babd4954a8c8926a290af346d368c4829182202997c1a9101f2cd74b6e4660ea01c418667a20626bda278b35c24fa63d965811c16a5f1e0230292270722ef694

                                  • C:\Users\Admin\Desktop\SkipOpen.wmf

                                    Filesize

                                    522KB

                                    MD5

                                    780294cdac8dabfea67b2f453d4623e9

                                    SHA1

                                    8e6c6b98a9cdfaf05c34d89879d2c9d8433c6bad

                                    SHA256

                                    5c1e374ac3dcc9014307d199179f56abe8a437ce94903b080a6f5a68ec540b58

                                    SHA512

                                    03ed0f4a90929d5418d6fe8e76a3edfd48e26b8537c0d1cc9e474907fb641d91f8445aa928a808622cb034a25110c5d4bbe8791639abbe3982ca787311c4d21a

                                  • C:\Users\Admin\Desktop\TestConvert.aiff

                                    Filesize

                                    577KB

                                    MD5

                                    c985a9a49cd6b838ed88b9ce5ce13867

                                    SHA1

                                    2b2c3ec956f90804b03d793f48a764efc4511af8

                                    SHA256

                                    b98c879e1352a2d0a740e04b8098d0af6153bb9c7be72a92491038d6da4d33ec

                                    SHA512

                                    2e27f94f9845d653e8ab86d441a8600599a690bbf4c7d2c0f690531b1a7475c5f8faad33534f31201c9bdbe9d178df5ca45ce032046460cb7686777f6ccb77fc

                                  • C:\Users\Admin\Desktop\UndoClear.gif

                                    Filesize

                                    440KB

                                    MD5

                                    ded26ce92e448f363854d7ff6cb551df

                                    SHA1

                                    d0e5a7c976b61612839714b6c00543e50cab36e2

                                    SHA256

                                    f28a7b7531d5f8d94b62ce63c9d8382adf2aea438e7632c3e3fbc21b97b2e874

                                    SHA512

                                    7b65c2c59f8afb79a62a9caeb283e12b34a6bc15e7313365d3c52c75b77ed0d9dea7c3dcfc127ec2f8e3fce55f15ed3df23c766a98b719164d0de1fb0392c308

                                  • C:\Users\Admin\Desktop\UndoDisconnect.midi

                                    Filesize

                                    687KB

                                    MD5

                                    84eea8ab86c616694977a0357c022718

                                    SHA1

                                    ad809a1a1386a22476598b76ed3a7558d1308087

                                    SHA256

                                    00f704161a5658af8ac186d596ac3b7bcdeb0b269ed43bf9036e44c3d5fc0151

                                    SHA512

                                    6da8279934e735073e06efb732f70c379ac48254ebdd924d33aab60e81d25255b9201288da54f667e7b9306d757f4331029c2648c147a356f4597612770c41ab

                                  • C:\Users\Admin\Desktop\UnlockCompress.svgz

                                    Filesize

                                    742KB

                                    MD5

                                    c4e79ace956d7b53e317648317e582e8

                                    SHA1

                                    81ac6ca99a4e3bca7228f623541aef931612b120

                                    SHA256

                                    dcb20cefcdaf964175ae96260bda73197ea2a80df155d23fb4ab0f3ebe6b7824

                                    SHA512

                                    63ff2c94eab022d3ca2961e003b0f41b6793dfe495d004e792c979dbff3c07f5973dad87cfdb0f5f3b3d384137c0fd0471798a23926dcb019e9f46c78d6fae33

                                  • C:\Users\Admin\Desktop\UnpublishSet.potm

                                    Filesize

                                    412KB

                                    MD5

                                    c184c06d9c6622bd31b5db232bf0349f

                                    SHA1

                                    1c312257651fcd6a3a14b76adbf001ffbef3e0c3

                                    SHA256

                                    8ca145426f5ec847bbc3b01b1991c0f937131520e07b61687f828cbe201af96b

                                    SHA512

                                    4e91dff9947ce06f4c54b06873662e68b82624ba23f2484431339727745ffbfb169b5c7d4d4a19fe65b6bcbd975825188ba668474ab9738c04d6681e3e75cd2f

                                  • C:\Users\Admin\Desktop\UnpublishSkip.ADT

                                    Filesize

                                    467KB

                                    MD5

                                    4cf15d61d50545682d4226f2b0d26a13

                                    SHA1

                                    7bfb4200c976a2748b0b94981a068c48671a012d

                                    SHA256

                                    6d0acdeb89dd489f04cc6c29675007320422bccf2bd9f390d4843b511a3675cd

                                    SHA512

                                    2292d4e14cc8727c1eec85204cdced78e4c9c5fe10b7321944bd96f636b19fc928cad42c64bd2a8a4686985f05e68bba45c29e4e3a3aba2104b1128166d0c179

                                  • C:\Users\Admin\Desktop\UpdateExit.vst

                                    Filesize

                                    330KB

                                    MD5

                                    26d40d533879518699cb47ad6530accf

                                    SHA1

                                    e36274e1265260d725476dab53c443c284ea2770

                                    SHA256

                                    4b8e165391c6a7dfe9a0ba65cff87ca98bf7c8c9c4705b7918a105b61c291e1e

                                    SHA512

                                    3bc291a083eb097b7430af6f438937c9e16e623a66f13c635c67ab2d42546ebd4bbea64cb393e7842829612f90a18cab1780d6eb0378798c8ae869b7aa41a673

                                  • C:\Users\Admin\Desktop\WaitResume.3g2

                                    Filesize

                                    852KB

                                    MD5

                                    facdbb56ed72fa525de4e240ea6ca02a

                                    SHA1

                                    9bc0811191e9a035f631969ad665b61f69b543e4

                                    SHA256

                                    4f15215352362c2b7d6d23a7d57899af7bc606c646352b4b2891ef1b3682ebc8

                                    SHA512

                                    940d79aa29f8b8e3665a5eba0a8274fbd2c53a4a5675b651da4de011af7f2166e6f92a6c302a7a799e5ce59925c78dd46c78a4b837310676484cdb42d6b82544

                                  • C:\Users\Public\Desktop\Acrobat Reader DC.lnk

                                    Filesize

                                    2KB

                                    MD5

                                    37176a63ec66e139488a100371d27c2b

                                    SHA1

                                    28c61fa0c1d88cb9ded6809be7120e7a886a22f8

                                    SHA256

                                    777f2283f570341e0cb669b41aad62c4317539de361f9011cf42466bb0ab6368

                                    SHA512

                                    b2db630469854c47e2caa5d87a96c3b06d8143ad9a40901fa10e8b8f0b75793250878d73b8df99dcfc586b1373d6184131875bfcab74f93770da3965ca736544

                                  • C:\Users\Public\Desktop\Firefox.lnk

                                    Filesize

                                    1000B

                                    MD5

                                    d846d01a6f7dd11a847912a55481c275

                                    SHA1

                                    32fcfda6597f0f72d06cfa53f358631f9e8a59b4

                                    SHA256

                                    fd908d27a4e92ba2f4550d059cc846d2c27252022ca2f4f0f85edd7d41dfd4e5

                                    SHA512

                                    fb1d3e8a555210046bf21da5cc6fd749275f286e5c0ba0c795878bed17f9683f2ea1adda457e5dffac1c464b3e87865267cd89a9cb7dd8051f3f8055640eb7ac

                                  • C:\Users\Public\Desktop\Google Chrome.lnk

                                    Filesize

                                    2KB

                                    MD5

                                    76d6c8d8cc0662401dfb4f0352c17a93

                                    SHA1

                                    607ffe84bdf882c857c1305b6ad62d979b191546

                                    SHA256

                                    14cfbf99d5e84b489caa7866df24c36e291c35cf563f93af1933022702ec1f28

                                    SHA512

                                    c24b0a366532d2854970efcd543899ec3680960bda3c46a8239b2d73aa63f8ac5f04c254429fbd6be85fd3fbd8f535e7ab33c2ee978006a31da1a1d7a7677d8c

                                  • C:\Users\Public\Desktop\VLC media player.lnk

                                    Filesize

                                    923B

                                    MD5

                                    36e0a2d04eb8f496a46d0cff9f782913

                                    SHA1

                                    090f5654d09158eb0b56c54a463eb997449a3f17

                                    SHA256

                                    8b7b84b4d773e0e85dbcffe954cc0694a9a3fbcb1bf742d192c6aa00da913de8

                                    SHA512

                                    7c8cb247de203b4e4e21282ed5c59d5ed68388dfcb401d01a52dc757d96564ac9c488146e9e4a941d815a242d83780a9eee4d386e995988daae7d739a7790d3d

                                  • memory/4408-2-0x00007FFE44430000-0x00007FFE44EF2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4408-4-0x00007FFE44430000-0x00007FFE44EF2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4408-0-0x00007FFE44433000-0x00007FFE44435000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/4408-1-0x0000000000150000-0x0000000000170000-memory.dmp

                                    Filesize

                                    128KB