Analysis
-
max time kernel
246s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2024, 13:24
Static task
static1
General
-
Target
Let's%20Compress.exe
-
Size
16.8MB
-
MD5
c34118d64ca94041f56cbeba5daf9abd
-
SHA1
14ef602cc6ea87ac0f961fc3dac25a4e56923e00
-
SHA256
61c1c11c4054e61ab9fa8777caeaf9c84821ad1b7e773e4bc8b5d844d90e8c7d
-
SHA512
ca6878539c9e4f590f628785794ee1fe7c0f0cb8148ef0657e57de33d37595439731b299a42008a6fc6cb282da6cca97adc48f9e52ca083d171568a9f1f3d150
-
SSDEEP
393216:neTuAoAu6yJEULuZmyGdM90bq/5H7hifJJ8fM:nAJZcEUSG40bY1ihJ8U
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 32 2588 powershell.exe 38 4336 powershell.exe 39 4464 powershell.exe 40 2760 powershell.exe 63 3312 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 2808 lets_compress.exe 3988 7z.exe 188 lets_compress.exe 3536 lets_compress.exe -
Loads dropped DLL 64 IoCs
pid Process 2212 Let's%20Compress.exe 2212 Let's%20Compress.exe 2264 MsiExec.exe 4424 MsiExec.exe 4424 MsiExec.exe 4424 MsiExec.exe 4424 MsiExec.exe 4424 MsiExec.exe 4424 MsiExec.exe 4424 MsiExec.exe 4424 MsiExec.exe 4424 MsiExec.exe 4424 MsiExec.exe 4424 MsiExec.exe 4424 MsiExec.exe 1464 MsiExec.exe 1464 MsiExec.exe 1464 MsiExec.exe 2212 Let's%20Compress.exe 1464 MsiExec.exe 1464 MsiExec.exe 4424 MsiExec.exe 4424 MsiExec.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 3988 7z.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 188 lets_compress.exe 3536 lets_compress.exe 3536 lets_compress.exe 3536 lets_compress.exe 3536 lets_compress.exe 3536 lets_compress.exe 3536 lets_compress.exe 3536 lets_compress.exe 3536 lets_compress.exe 3536 lets_compress.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Let's%20Compress.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: Let's%20Compress.exe File opened (read-only) \??\T: Let's%20Compress.exe File opened (read-only) \??\Z: Let's%20Compress.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: Let's%20Compress.exe File opened (read-only) \??\L: Let's%20Compress.exe File opened (read-only) \??\R: Let's%20Compress.exe File opened (read-only) \??\W: Let's%20Compress.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: Let's%20Compress.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: Let's%20Compress.exe File opened (read-only) \??\U: Let's%20Compress.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: Let's%20Compress.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: Let's%20Compress.exe File opened (read-only) \??\V: Let's%20Compress.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\A: Let's%20Compress.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\G: Let's%20Compress.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\M: Let's%20Compress.exe File opened (read-only) \??\X: Let's%20Compress.exe File opened (read-only) \??\Y: Let's%20Compress.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: Let's%20Compress.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: Let's%20Compress.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI2DF3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3363.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI2CD7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2D94.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI31EB.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{B97D3330-5AE2-4322-81E2-D11BBDC99C02} msiexec.exe File created C:\Windows\Installer\e582c1e.msi msiexec.exe File created C:\Windows\Installer\e582c1c.msi msiexec.exe File opened for modification C:\Windows\Installer\e582c1c.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI36DF.tmp msiexec.exe -
pid Process 4296 powershell.exe 2588 powershell.exe 4336 powershell.exe 4464 powershell.exe 2760 powershell.exe 4928 powershell.exe 3312 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Let's%20Compress.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Modifies registry class 40 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ lets_compress.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 = 820074001c0043465346160031000000000047598e48120041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe47598e485c59346b2e0000005be1010000000100000000000000000000000000000097a613004100700070004400610074006100000042000000 lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0 = 56003100000000005c59246b1000526f616d696e6700400009000400efbe47598e485c59256b2e0000005ce1010000000100000000000000000000000000000067af710052006f0061006d0069006e006700000016000000 lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\MRUListEx = 00000000ffffffff lets_compress.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\0\NodeSlot = "5" lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg lets_compress.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" lets_compress.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" lets_compress.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" lets_compress.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\MRUListEx = 00000000ffffffff lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} lets_compress.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" lets_compress.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = 00000000ffffffff lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5 lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags lets_compress.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0 lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\0 = 66003100000000005c593d6b10004c45542753437e3100004e0009000400efbe5c59246b5c59406b2e000000f63b02000000090000000000000000000000000000008175f7004c006500740027007300200043006f006d0070007200650073007300000018000000 lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\0 lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\0\MRUListEx = ffffffff lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 14001f44471a0359723fa74489c55595fe6b30ee0000 lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 lets_compress.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" lets_compress.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 lets_compress.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU lets_compress.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell lets_compress.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\SniffedFolderType = "Generic" lets_compress.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 2808 lets_compress.exe 188 lets_compress.exe 3536 lets_compress.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4296 powershell.exe 4296 powershell.exe 4296 powershell.exe 2588 powershell.exe 2588 powershell.exe 2588 powershell.exe 4336 powershell.exe 4336 powershell.exe 4336 powershell.exe 4464 powershell.exe 4464 powershell.exe 4464 powershell.exe 2760 powershell.exe 2760 powershell.exe 2760 powershell.exe 400 msiexec.exe 400 msiexec.exe 4928 powershell.exe 4928 powershell.exe 4928 powershell.exe 3312 powershell.exe 3312 powershell.exe 3312 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2808 lets_compress.exe 3536 lets_compress.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 400 msiexec.exe Token: SeCreateTokenPrivilege 2212 Let's%20Compress.exe Token: SeAssignPrimaryTokenPrivilege 2212 Let's%20Compress.exe Token: SeLockMemoryPrivilege 2212 Let's%20Compress.exe Token: SeIncreaseQuotaPrivilege 2212 Let's%20Compress.exe Token: SeMachineAccountPrivilege 2212 Let's%20Compress.exe Token: SeTcbPrivilege 2212 Let's%20Compress.exe Token: SeSecurityPrivilege 2212 Let's%20Compress.exe Token: SeTakeOwnershipPrivilege 2212 Let's%20Compress.exe Token: SeLoadDriverPrivilege 2212 Let's%20Compress.exe Token: SeSystemProfilePrivilege 2212 Let's%20Compress.exe Token: SeSystemtimePrivilege 2212 Let's%20Compress.exe Token: SeProfSingleProcessPrivilege 2212 Let's%20Compress.exe Token: SeIncBasePriorityPrivilege 2212 Let's%20Compress.exe Token: SeCreatePagefilePrivilege 2212 Let's%20Compress.exe Token: SeCreatePermanentPrivilege 2212 Let's%20Compress.exe Token: SeBackupPrivilege 2212 Let's%20Compress.exe Token: SeRestorePrivilege 2212 Let's%20Compress.exe Token: SeShutdownPrivilege 2212 Let's%20Compress.exe Token: SeDebugPrivilege 2212 Let's%20Compress.exe Token: SeAuditPrivilege 2212 Let's%20Compress.exe Token: SeSystemEnvironmentPrivilege 2212 Let's%20Compress.exe Token: SeChangeNotifyPrivilege 2212 Let's%20Compress.exe Token: SeRemoteShutdownPrivilege 2212 Let's%20Compress.exe Token: SeUndockPrivilege 2212 Let's%20Compress.exe Token: SeSyncAgentPrivilege 2212 Let's%20Compress.exe Token: SeEnableDelegationPrivilege 2212 Let's%20Compress.exe Token: SeManageVolumePrivilege 2212 Let's%20Compress.exe Token: SeImpersonatePrivilege 2212 Let's%20Compress.exe Token: SeCreateGlobalPrivilege 2212 Let's%20Compress.exe Token: SeCreateTokenPrivilege 2212 Let's%20Compress.exe Token: SeAssignPrimaryTokenPrivilege 2212 Let's%20Compress.exe Token: SeLockMemoryPrivilege 2212 Let's%20Compress.exe Token: SeIncreaseQuotaPrivilege 2212 Let's%20Compress.exe Token: SeMachineAccountPrivilege 2212 Let's%20Compress.exe Token: SeTcbPrivilege 2212 Let's%20Compress.exe Token: SeSecurityPrivilege 2212 Let's%20Compress.exe Token: SeTakeOwnershipPrivilege 2212 Let's%20Compress.exe Token: SeLoadDriverPrivilege 2212 Let's%20Compress.exe Token: SeSystemProfilePrivilege 2212 Let's%20Compress.exe Token: SeSystemtimePrivilege 2212 Let's%20Compress.exe Token: SeProfSingleProcessPrivilege 2212 Let's%20Compress.exe Token: SeIncBasePriorityPrivilege 2212 Let's%20Compress.exe Token: SeCreatePagefilePrivilege 2212 Let's%20Compress.exe Token: SeCreatePermanentPrivilege 2212 Let's%20Compress.exe Token: SeBackupPrivilege 2212 Let's%20Compress.exe Token: SeRestorePrivilege 2212 Let's%20Compress.exe Token: SeShutdownPrivilege 2212 Let's%20Compress.exe Token: SeDebugPrivilege 2212 Let's%20Compress.exe Token: SeAuditPrivilege 2212 Let's%20Compress.exe Token: SeSystemEnvironmentPrivilege 2212 Let's%20Compress.exe Token: SeChangeNotifyPrivilege 2212 Let's%20Compress.exe Token: SeRemoteShutdownPrivilege 2212 Let's%20Compress.exe Token: SeUndockPrivilege 2212 Let's%20Compress.exe Token: SeSyncAgentPrivilege 2212 Let's%20Compress.exe Token: SeEnableDelegationPrivilege 2212 Let's%20Compress.exe Token: SeManageVolumePrivilege 2212 Let's%20Compress.exe Token: SeImpersonatePrivilege 2212 Let's%20Compress.exe Token: SeCreateGlobalPrivilege 2212 Let's%20Compress.exe Token: SeCreateTokenPrivilege 2212 Let's%20Compress.exe Token: SeAssignPrimaryTokenPrivilege 2212 Let's%20Compress.exe Token: SeLockMemoryPrivilege 2212 Let's%20Compress.exe Token: SeIncreaseQuotaPrivilege 2212 Let's%20Compress.exe Token: SeMachineAccountPrivilege 2212 Let's%20Compress.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2212 Let's%20Compress.exe 3308 msiexec.exe 2808 lets_compress.exe 3308 msiexec.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 2808 lets_compress.exe 188 lets_compress.exe 3536 lets_compress.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2808 lets_compress.exe 2808 lets_compress.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3368 OpenWith.exe 3368 OpenWith.exe 3368 OpenWith.exe 2808 lets_compress.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 400 wrote to memory of 2264 400 msiexec.exe 90 PID 400 wrote to memory of 2264 400 msiexec.exe 90 PID 400 wrote to memory of 2264 400 msiexec.exe 90 PID 2212 wrote to memory of 3308 2212 Let's%20Compress.exe 91 PID 2212 wrote to memory of 3308 2212 Let's%20Compress.exe 91 PID 2212 wrote to memory of 3308 2212 Let's%20Compress.exe 91 PID 400 wrote to memory of 4424 400 msiexec.exe 92 PID 400 wrote to memory of 4424 400 msiexec.exe 92 PID 400 wrote to memory of 4424 400 msiexec.exe 92 PID 4424 wrote to memory of 4296 4424 MsiExec.exe 95 PID 4424 wrote to memory of 4296 4424 MsiExec.exe 95 PID 4424 wrote to memory of 4296 4424 MsiExec.exe 95 PID 4424 wrote to memory of 2588 4424 MsiExec.exe 100 PID 4424 wrote to memory of 2588 4424 MsiExec.exe 100 PID 4424 wrote to memory of 2588 4424 MsiExec.exe 100 PID 4424 wrote to memory of 4336 4424 MsiExec.exe 104 PID 4424 wrote to memory of 4336 4424 MsiExec.exe 104 PID 4424 wrote to memory of 4336 4424 MsiExec.exe 104 PID 4424 wrote to memory of 4464 4424 MsiExec.exe 106 PID 4424 wrote to memory of 4464 4424 MsiExec.exe 106 PID 4424 wrote to memory of 4464 4424 MsiExec.exe 106 PID 4424 wrote to memory of 2760 4424 MsiExec.exe 108 PID 4424 wrote to memory of 2760 4424 MsiExec.exe 108 PID 4424 wrote to memory of 2760 4424 MsiExec.exe 108 PID 400 wrote to memory of 3016 400 msiexec.exe 117 PID 400 wrote to memory of 3016 400 msiexec.exe 117 PID 400 wrote to memory of 1464 400 msiexec.exe 119 PID 400 wrote to memory of 1464 400 msiexec.exe 119 PID 400 wrote to memory of 1464 400 msiexec.exe 119 PID 1464 wrote to memory of 4928 1464 MsiExec.exe 120 PID 1464 wrote to memory of 4928 1464 MsiExec.exe 120 PID 1464 wrote to memory of 4928 1464 MsiExec.exe 120 PID 4424 wrote to memory of 3312 4424 MsiExec.exe 125 PID 4424 wrote to memory of 3312 4424 MsiExec.exe 125 PID 4424 wrote to memory of 3312 4424 MsiExec.exe 125 PID 2808 wrote to memory of 3988 2808 lets_compress.exe 140 PID 2808 wrote to memory of 3988 2808 lets_compress.exe 140 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Let's%20Compress.exe"C:\Users\Admin\AppData\Local\Temp\Let's%20Compress.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Let's Compress\Let's Compress 2.3.26.0\install\DC99C02\Let's Compress 06052024.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\Let's%20Compress.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1729881284 "2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3308
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 28C6CB9C8387C6E28961DFFC46FDC5CE C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A2E12031F16290C8A2845175E89059B5 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssA6B3.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiA6B0.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrA6B1.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrA6B2.txt" -propSep " :<->: " -testPrefix "_testValue."3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssBA4F.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiBA4C.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrBA4D.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrBA4E.txt" -propSep " :<->: " -testPrefix "_testValue."3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssD52F.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiD51D.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrD51E.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrD52E.txt" -propSep " :<->: " -testPrefix "_testValue."3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssE419.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiE416.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrE417.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrE418.txt" -propSep " :<->: " -testPrefix "_testValue."3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssF2D3.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiF2D0.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrF2D1.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrF2D2.txt" -propSep " :<->: " -testPrefix "_testValue."3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss53F4.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi53E1.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr53E2.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr53E3.txt" -propSep " :<->: " -testPrefix "_testValue."3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3016
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 781D266ABD4C5EAFE7721593551ACC7D2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss36ED.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi36EA.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr36EB.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr36EC.txt" -propSep " :<->: " -testPrefix "_testValue."3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:4044
-
C:\Users\Admin\AppData\Roaming\Let's Compress\lets_compress.exe"C:\Users\Admin\AppData\Roaming\Let's Compress\lets_compress.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Roaming\Let's Compress\util\7z.exeutil\7z.exe a -tzip C:/Users/Admin/Desktop/Desktop.7z C:/Users/Admin/Desktop/ProtectReset.ods -r2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3988
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3368
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3604
-
C:\Users\Admin\AppData\Roaming\Let's Compress\lets_compress.exe"C:\Users\Admin\AppData\Roaming\Let's Compress\lets_compress.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
PID:188
-
C:\Users\Admin\AppData\Roaming\Let's Compress\lets_compress.exe"C:\Users\Admin\AppData\Roaming\Let's Compress\lets_compress.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD53d4895f89bc7e0db9225cbd54125e3a9
SHA14c465bd2110434e89e827492da37d8d9d946a33a
SHA256acea19d8a9cbd2f87483d1b1be1a2419a8e807c35a59844cb0edaf710fb67130
SHA51216a151c697e91156901275e9a2bc25c2073354515998956856af5447c6e482af5ac9dc7b1b7cf7134078100de55657e10540de77d341d020f628ff6e0be995f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_0874219B044A8B455E064D4219E8929B
Filesize1KB
MD59a51d037527d03be21f47ad984a6502b
SHA14d2b0c380182c18ef1df41ea112c9c06bae54894
SHA256e6811ff70958d8f26c04aef9d13cb6dcdd5576a24cd5554368a48bcb3e1e7684
SHA51293b1119ded4f92d9fe2a3bb98a6a4ffc767e9c86342b617eedf4fbe905686cfba19da4d6db6ecb86a5a555e393ae70aabd456643bd6bcd1eef117eb1aa03aa92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize1KB
MD579df848363c36f21701d48268bdf9de5
SHA104685cb5280e727539163ee014d05281435dfbd7
SHA256798dc26e769ecb929cb3fdb056fff8001b8143c531be6094c48e18038fa10ee7
SHA512e25c46d3373f3212a8ea4f096c5343aa1bcf455145182b469120b9a83976e42b8e09fad7a1164c88504a5d05955b30f227733bedade176e7ffea72382901f33b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_0874219B044A8B455E064D4219E8929B
Filesize536B
MD5f4657a5358dcfa6f175357fa3af6bef1
SHA18c69d4b9cbc314330a26c5225a69573da8b39121
SHA256950d98ec5644d7dd0575c162c612fbe98a575a32585af32501058afdba9a136e
SHA5122a789d1d922c4f9304ac339f8a181e7a2f8c0ecf1a8f8e14ffa0a7f3d69fc11764cc61d170e84d49e98861b05bbfa0b82c875974c46088fa06ea1a75e2c1dc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize536B
MD5b4910942d062621312b372cbd67c384e
SHA1fc2aa9799d96952c66564fda34b04c1a31ccdbc8
SHA256b246d18612c2063428710e55f4bae9f64db36927e643e6716dbcaff131e1ce95
SHA51275ee3cb8803e9ae7ef22b2d9e9a53a49d6dea2b0403e6e7ef3285fb7f8a0a0d71fc1a30c8c26d51d3a78a96ea584ef556e0132877626150109b43173028e5774
-
Filesize
2KB
MD574a0c40c4e2bd9cfac76970d0557a5d4
SHA1809088957d92a603f2aaf0fca5b30168e5ed0dd3
SHA256316285729dfec8a91b0c3fa76f4af643e7fe8627f3fb3fbe2ed45ac917439a47
SHA512a8019212e2657b6f4ca5695de263ecb4efd01f137e9a50adaea4b22844af7081fe11982f03cfbeebe1a5bf14bf4d638a7b6c42413efbb87b12e8a4188ad2c93d
-
Filesize
19KB
MD5c129de1eb97fd48f6c4f069c2417fda5
SHA175e47f5520c6b834e162a2cf6a3e17de63f92b55
SHA256066a88fd186e01548a9bef9777bba9b95213c9c4faf1584ee1d8ef367b1b8266
SHA5127f846d8f4027d5fb53038719c4fcd0a160191f65f3fd4958532795644a61f5d2c170386a85d5cdad217cb3ff32c67341d26dbad406854b9e0d90d9ca5f5821a8
-
Filesize
19KB
MD5eed86351428abe8853576c44f87cf640
SHA161c1363170d919c2f62981f2da3e443dac7ae668
SHA2566a201c5fae777fdb2f3132de06c7c9116d879dbfdbf0c71f4d35395f10dbb978
SHA5124132865d4967ef8ef847839f2e672048390916ca7c10f7a0aadc24badb18bc67895993bfff8102af9515af81d39ad96065a3b796fcccbd027ceea7ea2cac41f6
-
Filesize
19KB
MD5df52e3dc4c16a3649222f25fc526575d
SHA174ae1a0f87dcc8d1eef177fa46e34755491d9c63
SHA2569bc455f25906df0916b945ebead5c17c8a6b91260cc5b7ac7c8a970fb3804f55
SHA5129020d491b24f207d8de00faa7ea55e67b027fcb6629489e14a3e857fcf372a3e2889db4a8ff1d2249e611e46cd872dfc3c79ca249bf02ab61a1182578fc91d90
-
Filesize
19KB
MD5d0a9fa77dff1fe9ed30f01af2f455adf
SHA1e03ccedc2e08bb30e8959d9b7b6b133e9287fa64
SHA256b0705471d95fda95efd6236a5b57a5b7e8d3383e9eccbf8bec9d27b86987dc39
SHA51292471366a8aa356bb3c99568e684031420441112b07c4478a331941bd7eebb5103db266e187573e2dfd9dc517686de3ff8c27464837c70b6a86749334c5b8d8b
-
Filesize
386KB
MD572b1c6699ddc2baab105d32761285df2
SHA1fc85e9fb190f205e6752624a5231515c4ee4e155
SHA256bf7f6f7e527ab8617766bb7a21c21b2895b5275c0e808756c2aadcd66eff8a97
SHA512cde1e754d8dfb2fa55db243517b5dd3d75b209ea6387ef2e4be6157875e536db2373f23434a9e66c119150301c7b7cdf97de5a5544d94c03247b4ae716cbc170
-
Filesize
670KB
MD5846afe3ed676561d5f2cb293177f6c03
SHA1bd31e948dca976ab54f8a01b87cbd6920659dc92
SHA256d3f27a9fb0862de63db0e05de28a02c7913139c10440e0b9bff25c76a90806ed
SHA512e5c10552930223fc818f5e973de482e0d9664defa3771be208be05dd944bef2ae279285a14ac0278ff4cc9d7384e4811e46434018dde314d6150855d9238457e
-
Filesize
25B
MD51b43037b95cb93e3ecc6b8b52d222bbb
SHA1bada46a26d7531bf320308f1ec9dee2257811ec1
SHA256a12412aaafbe703d3cf088a104de212bcec0b1dda826957a18a093e1fd353037
SHA512ae8c4c36081e29963b8d5d05db81f4dff5dc8a877df912e14bbe2f4d594004a747a8585c962dab33ec7a2e3c5769ff62321c5f764668c4e7a052de3e73f2768c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
202B
MD5dc0deabc7403be926e4388180d04c50e
SHA11b8b9320419c3164ae1491587061d2632ff73cec
SHA256884dcb3a49831d2fe08e9c6190b4821a927e5a327d0d73f6aef7cbbf6f448fc0
SHA512681d991009e83844f75b9ffede5180650995acdfd935556705e8594385d3cac4109efaf4924d889e89f22cc7ac708c8f1a22ccdfbbb7baa083cf458833f9b4e5
-
Filesize
5KB
MD58f69da7a9f4b3c2d0f423583b262ed49
SHA1b6d2ceb18fe78d279f76f412e4660bff5f6a88c7
SHA256dc6b6e1812f41c80ee67a72ebcb7a999488c866d805354936fb7506667005b43
SHA51271782d54137e87ec8d4311adf83b9b269aadfcba55b753ce8562d0fe74cc95f00118b01f3139b8ff0a142156d6461bececfc38380e9acd0c117b2fff0e846edf
-
Filesize
35KB
MD5921c1530f468a03721ad3b5778ff21c4
SHA192ec47a71e3a5dfcf4afef6a04087b50451ae46c
SHA256c1fc70194720b6984284845817d40e54d51588156a0cc6a49fe888c1bba9bf0f
SHA51290d33523b37014c3224312ae5a29c769eeb9505faa79e5fc286187916c8cc0e18a44c09a3b671a77972d97c473598039289764ef4beed3450b5691ebad1fd559
-
Filesize
35KB
MD50791096e8b998a86a3a8d11256244059
SHA1b38c9b06c02738db0182e806d766370ae5439362
SHA256975cd5eb18dee3067e12bf7a0609ab53b3bb1e68c48337647b3112e20f9fb8e3
SHA5125f6c7bcf95dc71d732c3bc89e37ca94795962715f8fe2d183e23f07215cf018c6a56d01dab2deab1707898385b3dc9f1b56281096132d5b927a1260b6b7ee3ae
-
Filesize
35KB
MD51771da38a05dbc54dedba7bb06b0c719
SHA19582f4cd02f7c17a4f30af5bb1ba94e3fc8df727
SHA256e983eba5229fd09430d942005b6873aceb7910ce5378ca2ee5991be0f8905028
SHA51292adec8d4837c4792f04a2c079b42a973da0a1d36da5846dbd4c24ed7286369623f16d753190c5deae945349e5b2c21b77b2a59d69d814d1b75ddc699e306aff
-
Filesize
35KB
MD54a5e7ccc783aca1dadaf19400bb30243
SHA1a65e5cab0569abe833b0201ebbc381753501a247
SHA256d5660753ec720c3761c2df95279968257abed016b4aa890cb858a577cb8d5954
SHA512b3e53c2ebc7f0ff8019e5afc1cd724143f1c3718a5a98c65b51da9666a3059c4836b950a9c438d45c68f8e731f4b3de27246bc22f45dd46593455ccdaa1dd931
-
Filesize
1KB
MD5112071ff00de034a6d5a4738d0112015
SHA1f4dadedefebb237a3da3a8d38fe7cd1890f5e999
SHA256caeff8215d14706bb3de55f6fe8811f22ae36bde28a619f48480596ab93514e4
SHA512a784445f14a20d5ff5cff5afc7f3bf2cc8a11dd752a728e3d09ff10282954eb0018d90ebd621b98a07ca8e022adbe63643c11a7e72455ce6b899c1d605016dcc
-
Filesize
30KB
MD5293c08e42d131f47adcb654164db8691
SHA1b621e8a63a9dd801cb669e5ba11bb04f0de5407a
SHA25683a430db3c56e3637873f292b90cb4e643479ee9d8fff8f4f00b40e9ebd3f606
SHA5129d8f9d9896badb302ced635e658ef899fed4e1dfedaf14af075691e50f2682e25b27ae8d7210eb4129ea244335e55202d82d7e727cca5ea15293f06e1e4620e7
-
Filesize
30KB
MD532a9a87385259b48bb0e1abd4208047b
SHA1ccbbb91ba87b695cd1a8f9d3e41e617c41d17d0e
SHA256bd9de559cbc14abbd1be0f514137a908e557eacd53b660f117bbf8cae05c0988
SHA5123ed049eef080021a4b6f4e40ee08e1ab5c8bc0a4b209bd2e96431db0b9f0c18627ec98603da93915927df9dfd4876944786c280181c39609c0e42947048df132
-
Filesize
30KB
MD5849c1e53d083ba3303ffb0e452d5a3ba
SHA1636df73cdc17565438fdcc1c83f412707ec6ac7b
SHA256ed1db5eac86be404d164953f67c0fe49e1dbe773fcea1306a388ba9a69bde454
SHA512045d22dd1a960705612b7c1c54e98dfa63e6bc47902cd21e71b911a49895f0b08540323f249c18cae152033032de83e0ba955ea21d4193899136811111c1d3dc
-
Filesize
30KB
MD50aeaffae4dfae7a6881f9c4ebf793fff
SHA1ce85584d4e97649681256f76b9fad523ab943eb6
SHA256456620d70528f746a9d7f4dfe6de0a17b33b4f18606fb71a7dbcd2f275c63dd2
SHA5120e10bff3cb045ec46ffe90b60579654970ccdfb1e333aa3372f8601bf5a8941587408b5249ba14680c4beb9e8f48f7b54db9fe85c580fd9ecaabaa4f96b3d8e4
-
C:\Users\Admin\AppData\Roaming\Let's Compress\Let's Compress 2.3.26.0\install\DC99C02\Let's Compress 06052024.msi
Filesize2.9MB
MD56e0a0b2f7c7ecd3556ec495aedc3d2c3
SHA113e1b312e594a1b35602391e32334080dee68eaa
SHA256f1fe9acd58595bc3c85275ac9ba790c7bee2e5d00c8e5b42298f77af00ed7e0e
SHA5129513eea25c77bfa01eddb918c87234a9e1cf2fc753ff6078ea040408c7978519f896110a4b8446b3075f9390b6662bbd2a7fb794e064142006dc8238427f670b
-
C:\Users\Admin\AppData\Roaming\Let's Compress\Let's Compress 2.3.26.0\install\DC99C02\translations\qt_ar.qm
Filesize156KB
MD5ced94831acb03de85d682ef997425446
SHA1bdcb654b0b665e7e222343b24224c5e1620292ba
SHA256eb09d3211567f7a0419738a8b29c8f8dffd33a72cc7826f8a06b04dd63e7b80d
SHA5127731afa705de33543d0db78ae8a2b1368977abac302a005733be861b80f8f23acccb94c106d7f7006299689c506ea861877100647968d264225ce9c3d804b37e
-
Filesize
1.7MB
MD5bbf51226a8670475f283a2d57460d46c
SHA16388883ced0ce14ede20c7798338673ff8d6204a
SHA25673578f14d50f747efa82527a503f1ad542f9db170e2901eddb54d6bce93fc00e
SHA512f68eb9c4ba0d923082107cff2f0e7f78e80be243b9d92cfab7298f59461fcca2c5c944d4577f161f11a2011c0958a3c32896eba4f0e89cd9f8aed97ab5bc74f9
-
Filesize
543KB
MD5a0c70c70012ceeb9f530591b06afe301
SHA14f07a76400d351234c0608b1cf82e67aa0dd424f
SHA2563ea06b3bb6df1917ae2c6721ccaf1af368acbeb560c4587025467a0865b66863
SHA51213a1a91f702ab0e87044e318f0e6b5558c01eb231b411dd77597dacee72d8d75d9a0bb6293a7a16a1eb342aeb06e1033e144facaefc7073e20a248de352caff5
-
Filesize
206KB
MD59d45f2790dda55df2d99ef66dcb2019d
SHA1f2a369c1b82476e2e0641f95394dd4dee8223f01
SHA2569b7ff49f7e1d0a39826ec458c8004b20a65a4bd0592b083f38b01e2dbc2b510f
SHA5129bef561ec6908dcd7e75f5f63cff8b1ec73e9be2b4e4aa5602182cde18d691cc28259b980c87246c5d27b4284bc783fba44d92a202f77b15f3e65c89dd3aa069
-
Filesize
544KB
MD540117f705bff008c3d96a73162dad044
SHA12735813836f36b5de83a745c47628053a0f61f66
SHA25632211c43bcfee2ea3ae54899af178d1fc0c2b1111b2a9e3cc3fd125e1ab7daad
SHA512eace1d55d479c4cf5692ec1dc98a6738e94874901bebe14a0a0a93eefd00fc4bd55a701e4629a1f7c47f72ac91fe3b698d590a8463119998852e05d6682f91a4