Analysis

  • max time kernel
    89s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 14:07

General

  • Target

    https://gofile.io/d/6gbhxP

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unexpected DNS network traffic destination 4 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 62 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: LoadsDriver 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/6gbhxP
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9931e46f8,0x7ff9931e4708,0x7ff9931e4718
      2⤵
        PID:3536
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
        2⤵
          PID:1356
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4496
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:8
          2⤵
            PID:1716
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
            2⤵
              PID:3956
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
              2⤵
                PID:4036
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:1
                2⤵
                  PID:1928
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:8
                  2⤵
                    PID:4996
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1696
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:1
                    2⤵
                      PID:3996
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4804 /prefetch:8
                      2⤵
                        PID:4960
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:1
                        2⤵
                          PID:4844
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1544
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:1
                          2⤵
                            PID:1504
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:1
                            2⤵
                              PID:1496
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5036
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:1
                              2⤵
                                PID:3604
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2044,8576038085724472447,3233945842824335260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6196 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2264
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2784
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3968
                                • C:\Windows\system32\OpenWith.exe
                                  C:\Windows\system32\OpenWith.exe -Embedding
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4032
                                • C:\Windows\system32\OpenWith.exe
                                  C:\Windows\system32\OpenWith.exe -Embedding
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious use of SetWindowsHookEx
                                  PID:3996
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:4344
                                  • C:\Program Files\7-Zip\7zG.exe
                                    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap13530:110:7zEvent28043
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    PID:3764
                                  • C:\Users\Admin\Desktop\HitmanPro by EMPTERROR\HitmanPro_CRACKED BY EMPTERROR.exe
                                    "C:\Users\Admin\Desktop\HitmanPro by EMPTERROR\HitmanPro_CRACKED BY EMPTERROR.exe"
                                    1⤵
                                    • Drops file in Drivers directory
                                    • Executes dropped EXE
                                    • Impair Defenses: Safe Mode Boot
                                    • Enumerates connected drives
                                    • Maps connected drives based on registry
                                    • Drops file in Program Files directory
                                    • System Location Discovery: System Language Discovery
                                    • Checks SCSI registry key(s)
                                    • Modifies system certificate store
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of SendNotifyMessage
                                    PID:5084
                                  • C:\Program Files\HitmanPro\hmpsched.exe
                                    "C:\Program Files\HitmanPro\hmpsched.exe"
                                    1⤵
                                    • Executes dropped EXE
                                    PID:3624
                                  • C:\Program Files\HitmanPro\HitmanPro.exe
                                    "C:\Program Files\HitmanPro\HitmanPro.exe"
                                    1⤵
                                      PID:2284
                                    • C:\Program Files\HitmanPro\HitmanPro.exe
                                      "C:\Program Files\HitmanPro\HitmanPro.exe"
                                      1⤵
                                        PID:1104

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Program Files\HitmanPro\hmpsched.exe

                                        Filesize

                                        151KB

                                        MD5

                                        17258e9f01ee7d4ad1d96d9de8f58d54

                                        SHA1

                                        41ae9e246ee160c8940714867f0adbeca4d2087a

                                        SHA256

                                        1c8a8f227e747f534f5e493e0d2f2ecac1c8eafe83f54f58106f2f49e48d972a

                                        SHA512

                                        8c3c93704ca08c7ac8943954547519b3a8913087e70cddfe0d237d054ca532997a045d8e2f220ef2121db7224ce61911e065a4e91d97615ee9dd134bbda601b0

                                      • C:\ProgramData\HitmanPro\Remnants.bin

                                        Filesize

                                        475KB

                                        MD5

                                        3533c9a6748aa5987d29cc6e76cbb883

                                        SHA1

                                        f38263e90d1d1140544b83cd682862e6f3cf94ae

                                        SHA256

                                        5d12303064aafabecd12ff6614a011ecbbab2bd223595c89e78c2e112d072c3c

                                        SHA512

                                        ffd5f225dcb025d8621cc49b6c432739dde5604173c0f4bc1877bcdd37e7786ed813bef746c3558bae3730249d9a643fe79c09ae1133d081f99792cfd6af25ec

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        f9664c896e19205022c094d725f820b6

                                        SHA1

                                        f8f1baf648df755ba64b412d512446baf88c0184

                                        SHA256

                                        7121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e

                                        SHA512

                                        3fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        847d47008dbea51cb1732d54861ba9c9

                                        SHA1

                                        f2099242027dccb88d6f05760b57f7c89d926c0d

                                        SHA256

                                        10292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1

                                        SHA512

                                        bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        288B

                                        MD5

                                        95e3bf29363eeb0a2a0239c45f462639

                                        SHA1

                                        6690781987d5bdc30e5170836c99f5c2627fb0aa

                                        SHA256

                                        272d7fc73f850847d55659b5215db9c869ad7a5c2502c78c02929a6cd5ff4d04

                                        SHA512

                                        58279262d0b697845e4ecd139cbfed3c592cd657bfed383dd4fdba1287b029139d4681d8c62e1c12ff7afc5ed35fcfc708298d4b214e125e024faed2980d6678

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        391B

                                        MD5

                                        af70db1887381980b2e8b6cabbededc2

                                        SHA1

                                        b5259f04715316d365c733e90c8768a8f7aa68e6

                                        SHA256

                                        fbb070db6f3a8745c65d094352de10556b5fb45173b6aa56e5de9d016187b265

                                        SHA512

                                        67a439819258cc6e2bcdc3e9a75a3f270d411362094afd768301481c3e31c32e5200afd2ef06932eae855112ef08137d52e580ab3958f6ae71c2d1bca2889503

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        987260a4fd026369377299f875beb292

                                        SHA1

                                        0f35e5482e4f2b8fe34cb84c034db50f7ba2aa7d

                                        SHA256

                                        a6936cc1d335c3c8eea763817c67a358d4e7576c10f2f8817ac8d9b651a1772e

                                        SHA512

                                        5f1c930772718e0f7722e1334abc7cc99d96d1304259364f700e5946374f213fac8914c2e0240ff20a2727623716975cbc0a1182309f339a15f2c68e64459db3

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        5aab4f0dd5a3bfffdffc55aaf4803bd1

                                        SHA1

                                        795cd008b3f4fddcf5c9bc390a7a2cbb0220c834

                                        SHA256

                                        f10ad412fa052ddf626f482af3bcb79b22efa6b3ce1c97c973aa8b91f9b440ac

                                        SHA512

                                        8c5f51f9d6db785adc8fe2f29b1ee70e6f265f80b78201e3e6f7b52383c840590b0fea7c9ba8717f3a48f754b9eee2abd9658a717bf28df769ac51d8f695e948

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        0b1fdd802483df5581ee40c54ee22f24

                                        SHA1

                                        34b9bcdd7eec9df7f794c35d1b5091c23ab4493a

                                        SHA256

                                        12f39554c8edc3975e5fed3a660dd748204b79b16283f36ccf75b8382a9c626e

                                        SHA512

                                        5aebd9dd26f6d6fe0c5e18655d46ba950d7198a4f24a82801df408527ace46a8e6ae6ba9756d510ca615b47918d319611af7e06aecfcc37340aab0f12967520d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        3c3cd18e13a9197935bba13b1ec64c96

                                        SHA1

                                        3d48c1b7b113adbd3783ae8017495e9c451a1c63

                                        SHA256

                                        6423319cec646b17bb154c449ac0bfb2e99bdc3dd83444a10e6d61deee93f587

                                        SHA512

                                        3e299b55739c185636dfec16542da719d67072844aaa99224112fe3aad508ee017988cd80da14e1196d82fe6ea97053acb5a2dd30b2850ccade556fe3ba515b2

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        3272415863459819879de075c0924beb

                                        SHA1

                                        a8b3c30c65ad15f664ac24f8642db4756d5be3f8

                                        SHA256

                                        ec79fe448e9b071abecf9d17811c812b984111fffb52421240616a07fa47cd14

                                        SHA512

                                        7c02214d0d04ac151b931956cb544587b52dac98da3bd8fc7163b0cb12ad4b06ae25ac75d5ff6576402292928b11faa48b1af3ae389691fb195327df012202b4

                                      • C:\Users\Admin\Desktop\HitmanPro by EMPTERROR\HitmanPro_CRACKED BY EMPTERROR.exe

                                        Filesize

                                        13.6MB

                                        MD5

                                        9ee22083c1505b1768f80cc0a0714e76

                                        SHA1

                                        7c11614b064690a693578a4661a0486d133442d1

                                        SHA256

                                        c527e21c8b5fef86490a379ec5d022086cdfd9a45331dc664373f69ac9b7823a

                                        SHA512

                                        299e2492a3374e740b20904b3a9053d7557cad1d97d5632a753d96f59b112c3c7eed11be44827eabf479b5e7ba8f8fce674f9e4b4ded80667c3941abfd68cb38

                                      • C:\Users\Admin\Downloads\Unconfirmed 352242.crdownload

                                        Filesize

                                        8.8MB

                                        MD5

                                        94739a6cf73968d472449c2577ef9291

                                        SHA1

                                        128e7cb7bac991277cafad2607b459d3a4a087b0

                                        SHA256

                                        f6678bb40ac2d5324391c6ed26500b126f60b81f4ba876fd7d147a9c3ab1d9e0

                                        SHA512

                                        8d3be0710a73dbce1e52dd88cff16467bf21fe9268173c2be4f89033a3a67a31feeeb8657c6425698cf1fce23d76187a35c26f42c5316efd08cfe40c8e20d56c

                                      • C:\Windows\System32\drivers\hitmanpro37.sys

                                        Filesize

                                        41KB

                                        MD5

                                        55b9678f6281ff7cb41b8994dabf9e67

                                        SHA1

                                        95a6a9742b4279a5a81bef3f6e994e22493bbf9f

                                        SHA256

                                        eb5d9df12ae2770d0e5558e8264cbb1867c618217d10b5115690ab4dcfe893c6

                                        SHA512

                                        d2270c13dc8212b568361f9d7d10210970b313d8cd2b944f63a626f6e7f2feb19671d3fcdbdf35e593652427521c7c18050c1181dc4c114da96db2675814ab40

                                      • memory/5084-279-0x0000026D1F440000-0x0000026D1F45D000-memory.dmp

                                        Filesize

                                        116KB

                                      • memory/5084-284-0x0000026D1F440000-0x0000026D1F45D000-memory.dmp

                                        Filesize

                                        116KB