Resubmissions

20/11/2024, 14:06

241120-red8gaybpq 8

28/10/2024, 13:24

241028-qnrdqaxqfm 8

Analysis

  • max time kernel
    246s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2024, 13:24

General

  • Target

    Let's%20Compress.exe

  • Size

    16.8MB

  • MD5

    c34118d64ca94041f56cbeba5daf9abd

  • SHA1

    14ef602cc6ea87ac0f961fc3dac25a4e56923e00

  • SHA256

    61c1c11c4054e61ab9fa8777caeaf9c84821ad1b7e773e4bc8b5d844d90e8c7d

  • SHA512

    ca6878539c9e4f590f628785794ee1fe7c0f0cb8148ef0657e57de33d37595439731b299a42008a6fc6cb282da6cca97adc48f9e52ca083d171568a9f1f3d150

  • SSDEEP

    393216:neTuAoAu6yJEULuZmyGdM90bq/5H7hifJJ8fM:nAJZcEUSG40bY1ihJ8U

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 13 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 40 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Let's%20Compress.exe
    "C:\Users\Admin\AppData\Local\Temp\Let's%20Compress.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Let's Compress\Let's Compress 2.3.26.0\install\DC99C02\Let's Compress 06052024.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\Let's%20Compress.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1729881284 "
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:3308
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:400
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 28C6CB9C8387C6E28961DFFC46FDC5CE C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2264
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A2E12031F16290C8A2845175E89059B5 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4424
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssA6B3.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiA6B0.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrA6B1.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrA6B2.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4296
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssBA4F.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiBA4C.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrBA4D.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrBA4E.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2588
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssD52F.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiD51D.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrD51E.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrD52E.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4336
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssE419.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiE416.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrE417.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrE418.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4464
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssF2D3.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiF2D0.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrF2D1.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrF2D2.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2760
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss53F4.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi53E1.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr53E2.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr53E3.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3312
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3016
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 781D266ABD4C5EAFE7721593551ACC7D
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss36ED.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi36EA.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr36EB.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr36EC.txt" -propSep " :<->: " -testPrefix "_testValue."
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4928
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:4044
    • C:\Users\Admin\AppData\Roaming\Let's Compress\lets_compress.exe
      "C:\Users\Admin\AppData\Roaming\Let's Compress\lets_compress.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Roaming\Let's Compress\util\7z.exe
        util\7z.exe a -tzip C:/Users/Admin/Desktop/Desktop.7z C:/Users/Admin/Desktop/ProtectReset.ods -r
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3988
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3368
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3604
      • C:\Users\Admin\AppData\Roaming\Let's Compress\lets_compress.exe
        "C:\Users\Admin\AppData\Roaming\Let's Compress\lets_compress.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of FindShellTrayWindow
        PID:188
      • C:\Users\Admin\AppData\Roaming\Let's Compress\lets_compress.exe
        "C:\Users\Admin\AppData\Roaming\Let's Compress\lets_compress.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        PID:3536

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e582c1d.rbs

        Filesize

        22KB

        MD5

        3d4895f89bc7e0db9225cbd54125e3a9

        SHA1

        4c465bd2110434e89e827492da37d8d9d946a33a

        SHA256

        acea19d8a9cbd2f87483d1b1be1a2419a8e807c35a59844cb0edaf710fb67130

        SHA512

        16a151c697e91156901275e9a2bc25c2073354515998956856af5447c6e482af5ac9dc7b1b7cf7134078100de55657e10540de77d341d020f628ff6e0be995f1

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_0874219B044A8B455E064D4219E8929B

        Filesize

        1KB

        MD5

        9a51d037527d03be21f47ad984a6502b

        SHA1

        4d2b0c380182c18ef1df41ea112c9c06bae54894

        SHA256

        e6811ff70958d8f26c04aef9d13cb6dcdd5576a24cd5554368a48bcb3e1e7684

        SHA512

        93b1119ded4f92d9fe2a3bb98a6a4ffc767e9c86342b617eedf4fbe905686cfba19da4d6db6ecb86a5a555e393ae70aabd456643bd6bcd1eef117eb1aa03aa92

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

        Filesize

        1KB

        MD5

        79df848363c36f21701d48268bdf9de5

        SHA1

        04685cb5280e727539163ee014d05281435dfbd7

        SHA256

        798dc26e769ecb929cb3fdb056fff8001b8143c531be6094c48e18038fa10ee7

        SHA512

        e25c46d3373f3212a8ea4f096c5343aa1bcf455145182b469120b9a83976e42b8e09fad7a1164c88504a5d05955b30f227733bedade176e7ffea72382901f33b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_0874219B044A8B455E064D4219E8929B

        Filesize

        536B

        MD5

        f4657a5358dcfa6f175357fa3af6bef1

        SHA1

        8c69d4b9cbc314330a26c5225a69573da8b39121

        SHA256

        950d98ec5644d7dd0575c162c612fbe98a575a32585af32501058afdba9a136e

        SHA512

        2a789d1d922c4f9304ac339f8a181e7a2f8c0ecf1a8f8e14ffa0a7f3d69fc11764cc61d170e84d49e98861b05bbfa0b82c875974c46088fa06ea1a75e2c1dc5b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

        Filesize

        536B

        MD5

        b4910942d062621312b372cbd67c384e

        SHA1

        fc2aa9799d96952c66564fda34b04c1a31ccdbc8

        SHA256

        b246d18612c2063428710e55f4bae9f64db36927e643e6716dbcaff131e1ce95

        SHA512

        75ee3cb8803e9ae7ef22b2d9e9a53a49d6dea2b0403e6e7ef3285fb7f8a0a0d71fc1a30c8c26d51d3a78a96ea584ef556e0132877626150109b43173028e5774

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        74a0c40c4e2bd9cfac76970d0557a5d4

        SHA1

        809088957d92a603f2aaf0fca5b30168e5ed0dd3

        SHA256

        316285729dfec8a91b0c3fa76f4af643e7fe8627f3fb3fbe2ed45ac917439a47

        SHA512

        a8019212e2657b6f4ca5695de263ecb4efd01f137e9a50adaea4b22844af7081fe11982f03cfbeebe1a5bf14bf4d638a7b6c42413efbb87b12e8a4188ad2c93d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        19KB

        MD5

        c129de1eb97fd48f6c4f069c2417fda5

        SHA1

        75e47f5520c6b834e162a2cf6a3e17de63f92b55

        SHA256

        066a88fd186e01548a9bef9777bba9b95213c9c4faf1584ee1d8ef367b1b8266

        SHA512

        7f846d8f4027d5fb53038719c4fcd0a160191f65f3fd4958532795644a61f5d2c170386a85d5cdad217cb3ff32c67341d26dbad406854b9e0d90d9ca5f5821a8

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        19KB

        MD5

        eed86351428abe8853576c44f87cf640

        SHA1

        61c1363170d919c2f62981f2da3e443dac7ae668

        SHA256

        6a201c5fae777fdb2f3132de06c7c9116d879dbfdbf0c71f4d35395f10dbb978

        SHA512

        4132865d4967ef8ef847839f2e672048390916ca7c10f7a0aadc24badb18bc67895993bfff8102af9515af81d39ad96065a3b796fcccbd027ceea7ea2cac41f6

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        19KB

        MD5

        df52e3dc4c16a3649222f25fc526575d

        SHA1

        74ae1a0f87dcc8d1eef177fa46e34755491d9c63

        SHA256

        9bc455f25906df0916b945ebead5c17c8a6b91260cc5b7ac7c8a970fb3804f55

        SHA512

        9020d491b24f207d8de00faa7ea55e67b027fcb6629489e14a3e857fcf372a3e2889db4a8ff1d2249e611e46cd872dfc3c79ca249bf02ab61a1182578fc91d90

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        19KB

        MD5

        d0a9fa77dff1fe9ed30f01af2f455adf

        SHA1

        e03ccedc2e08bb30e8959d9b7b6b133e9287fa64

        SHA256

        b0705471d95fda95efd6236a5b57a5b7e8d3383e9eccbf8bec9d27b86987dc39

        SHA512

        92471366a8aa356bb3c99568e684031420441112b07c4478a331941bd7eebb5103db266e187573e2dfd9dc517686de3ff8c27464837c70b6a86749334c5b8d8b

      • C:\Users\Admin\AppData\Local\Temp\MSIA123.tmp

        Filesize

        386KB

        MD5

        72b1c6699ddc2baab105d32761285df2

        SHA1

        fc85e9fb190f205e6752624a5231515c4ee4e155

        SHA256

        bf7f6f7e527ab8617766bb7a21c21b2895b5275c0e808756c2aadcd66eff8a97

        SHA512

        cde1e754d8dfb2fa55db243517b5dd3d75b209ea6387ef2e4be6157875e536db2373f23434a9e66c119150301c7b7cdf97de5a5544d94c03247b4ae716cbc170

      • C:\Users\Admin\AppData\Local\Temp\MSIA688.tmp

        Filesize

        670KB

        MD5

        846afe3ed676561d5f2cb293177f6c03

        SHA1

        bd31e948dca976ab54f8a01b87cbd6920659dc92

        SHA256

        d3f27a9fb0862de63db0e05de28a02c7913139c10440e0b9bff25c76a90806ed

        SHA512

        e5c10552930223fc818f5e973de482e0d9664defa3771be208be05dd944bef2ae279285a14ac0278ff4cc9d7384e4811e46434018dde314d6150855d9238457e

      • C:\Users\Admin\AppData\Local\Temp\ProE41A.tmp

        Filesize

        25B

        MD5

        1b43037b95cb93e3ecc6b8b52d222bbb

        SHA1

        bada46a26d7531bf320308f1ec9dee2257811ec1

        SHA256

        a12412aaafbe703d3cf088a104de212bcec0b1dda826957a18a093e1fd353037

        SHA512

        ae8c4c36081e29963b8d5d05db81f4dff5dc8a877df912e14bbe2f4d594004a747a8585c962dab33ec7a2e3c5769ff62321c5f764668c4e7a052de3e73f2768c

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oudqxhpj.qj5.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\msiBA4C.txt

        Filesize

        202B

        MD5

        dc0deabc7403be926e4388180d04c50e

        SHA1

        1b8b9320419c3164ae1491587061d2632ff73cec

        SHA256

        884dcb3a49831d2fe08e9c6190b4821a927e5a327d0d73f6aef7cbbf6f448fc0

        SHA512

        681d991009e83844f75b9ffede5180650995acdfd935556705e8594385d3cac4109efaf4924d889e89f22cc7ac708c8f1a22ccdfbbb7baa083cf458833f9b4e5

      • C:\Users\Admin\AppData\Local\Temp\pssA6B3.ps1

        Filesize

        5KB

        MD5

        8f69da7a9f4b3c2d0f423583b262ed49

        SHA1

        b6d2ceb18fe78d279f76f412e4660bff5f6a88c7

        SHA256

        dc6b6e1812f41c80ee67a72ebcb7a999488c866d805354936fb7506667005b43

        SHA512

        71782d54137e87ec8d4311adf83b9b269aadfcba55b753ce8562d0fe74cc95f00118b01f3139b8ff0a142156d6461bececfc38380e9acd0c117b2fff0e846edf

      • C:\Users\Admin\AppData\Local\Temp\pssBA4F.ps1

        Filesize

        35KB

        MD5

        921c1530f468a03721ad3b5778ff21c4

        SHA1

        92ec47a71e3a5dfcf4afef6a04087b50451ae46c

        SHA256

        c1fc70194720b6984284845817d40e54d51588156a0cc6a49fe888c1bba9bf0f

        SHA512

        90d33523b37014c3224312ae5a29c769eeb9505faa79e5fc286187916c8cc0e18a44c09a3b671a77972d97c473598039289764ef4beed3450b5691ebad1fd559

      • C:\Users\Admin\AppData\Local\Temp\pssD52F.ps1

        Filesize

        35KB

        MD5

        0791096e8b998a86a3a8d11256244059

        SHA1

        b38c9b06c02738db0182e806d766370ae5439362

        SHA256

        975cd5eb18dee3067e12bf7a0609ab53b3bb1e68c48337647b3112e20f9fb8e3

        SHA512

        5f6c7bcf95dc71d732c3bc89e37ca94795962715f8fe2d183e23f07215cf018c6a56d01dab2deab1707898385b3dc9f1b56281096132d5b927a1260b6b7ee3ae

      • C:\Users\Admin\AppData\Local\Temp\pssE419.ps1

        Filesize

        35KB

        MD5

        1771da38a05dbc54dedba7bb06b0c719

        SHA1

        9582f4cd02f7c17a4f30af5bb1ba94e3fc8df727

        SHA256

        e983eba5229fd09430d942005b6873aceb7910ce5378ca2ee5991be0f8905028

        SHA512

        92adec8d4837c4792f04a2c079b42a973da0a1d36da5846dbd4c24ed7286369623f16d753190c5deae945349e5b2c21b77b2a59d69d814d1b75ddc699e306aff

      • C:\Users\Admin\AppData\Local\Temp\pssF2D3.ps1

        Filesize

        35KB

        MD5

        4a5e7ccc783aca1dadaf19400bb30243

        SHA1

        a65e5cab0569abe833b0201ebbc381753501a247

        SHA256

        d5660753ec720c3761c2df95279968257abed016b4aa890cb858a577cb8d5954

        SHA512

        b3e53c2ebc7f0ff8019e5afc1cd724143f1c3718a5a98c65b51da9666a3059c4836b950a9c438d45c68f8e731f4b3de27246bc22f45dd46593455ccdaa1dd931

      • C:\Users\Admin\AppData\Local\Temp\scrA6B1.ps1

        Filesize

        1KB

        MD5

        112071ff00de034a6d5a4738d0112015

        SHA1

        f4dadedefebb237a3da3a8d38fe7cd1890f5e999

        SHA256

        caeff8215d14706bb3de55f6fe8811f22ae36bde28a619f48480596ab93514e4

        SHA512

        a784445f14a20d5ff5cff5afc7f3bf2cc8a11dd752a728e3d09ff10282954eb0018d90ebd621b98a07ca8e022adbe63643c11a7e72455ce6b899c1d605016dcc

      • C:\Users\Admin\AppData\Local\Temp\scrBA4D.ps1

        Filesize

        30KB

        MD5

        293c08e42d131f47adcb654164db8691

        SHA1

        b621e8a63a9dd801cb669e5ba11bb04f0de5407a

        SHA256

        83a430db3c56e3637873f292b90cb4e643479ee9d8fff8f4f00b40e9ebd3f606

        SHA512

        9d8f9d9896badb302ced635e658ef899fed4e1dfedaf14af075691e50f2682e25b27ae8d7210eb4129ea244335e55202d82d7e727cca5ea15293f06e1e4620e7

      • C:\Users\Admin\AppData\Local\Temp\scrD51E.ps1

        Filesize

        30KB

        MD5

        32a9a87385259b48bb0e1abd4208047b

        SHA1

        ccbbb91ba87b695cd1a8f9d3e41e617c41d17d0e

        SHA256

        bd9de559cbc14abbd1be0f514137a908e557eacd53b660f117bbf8cae05c0988

        SHA512

        3ed049eef080021a4b6f4e40ee08e1ab5c8bc0a4b209bd2e96431db0b9f0c18627ec98603da93915927df9dfd4876944786c280181c39609c0e42947048df132

      • C:\Users\Admin\AppData\Local\Temp\scrE417.ps1

        Filesize

        30KB

        MD5

        849c1e53d083ba3303ffb0e452d5a3ba

        SHA1

        636df73cdc17565438fdcc1c83f412707ec6ac7b

        SHA256

        ed1db5eac86be404d164953f67c0fe49e1dbe773fcea1306a388ba9a69bde454

        SHA512

        045d22dd1a960705612b7c1c54e98dfa63e6bc47902cd21e71b911a49895f0b08540323f249c18cae152033032de83e0ba955ea21d4193899136811111c1d3dc

      • C:\Users\Admin\AppData\Local\Temp\scrF2D1.ps1

        Filesize

        30KB

        MD5

        0aeaffae4dfae7a6881f9c4ebf793fff

        SHA1

        ce85584d4e97649681256f76b9fad523ab943eb6

        SHA256

        456620d70528f746a9d7f4dfe6de0a17b33b4f18606fb71a7dbcd2f275c63dd2

        SHA512

        0e10bff3cb045ec46ffe90b60579654970ccdfb1e333aa3372f8601bf5a8941587408b5249ba14680c4beb9e8f48f7b54db9fe85c580fd9ecaabaa4f96b3d8e4

      • C:\Users\Admin\AppData\Roaming\Let's Compress\Let's Compress 2.3.26.0\install\DC99C02\Let's Compress 06052024.msi

        Filesize

        2.9MB

        MD5

        6e0a0b2f7c7ecd3556ec495aedc3d2c3

        SHA1

        13e1b312e594a1b35602391e32334080dee68eaa

        SHA256

        f1fe9acd58595bc3c85275ac9ba790c7bee2e5d00c8e5b42298f77af00ed7e0e

        SHA512

        9513eea25c77bfa01eddb918c87234a9e1cf2fc753ff6078ea040408c7978519f896110a4b8446b3075f9390b6662bbd2a7fb794e064142006dc8238427f670b

      • C:\Users\Admin\AppData\Roaming\Let's Compress\Let's Compress 2.3.26.0\install\DC99C02\translations\qt_ar.qm

        Filesize

        156KB

        MD5

        ced94831acb03de85d682ef997425446

        SHA1

        bdcb654b0b665e7e222343b24224c5e1620292ba

        SHA256

        eb09d3211567f7a0419738a8b29c8f8dffd33a72cc7826f8a06b04dd63e7b80d

        SHA512

        7731afa705de33543d0db78ae8a2b1368977abac302a005733be861b80f8f23acccb94c106d7f7006299689c506ea861877100647968d264225ce9c3d804b37e

      • C:\Users\Admin\AppData\Roaming\Let's Compress\Let's Compress 2.3.26.0\install\DC99C02\util\7z.dll

        Filesize

        1.7MB

        MD5

        bbf51226a8670475f283a2d57460d46c

        SHA1

        6388883ced0ce14ede20c7798338673ff8d6204a

        SHA256

        73578f14d50f747efa82527a503f1ad542f9db170e2901eddb54d6bce93fc00e

        SHA512

        f68eb9c4ba0d923082107cff2f0e7f78e80be243b9d92cfab7298f59461fcca2c5c944d4577f161f11a2011c0958a3c32896eba4f0e89cd9f8aed97ab5bc74f9

      • C:\Users\Admin\AppData\Roaming\Let's Compress\Let's Compress 2.3.26.0\install\DC99C02\util\7z.exe

        Filesize

        543KB

        MD5

        a0c70c70012ceeb9f530591b06afe301

        SHA1

        4f07a76400d351234c0608b1cf82e67aa0dd424f

        SHA256

        3ea06b3bb6df1917ae2c6721ccaf1af368acbeb560c4587025467a0865b66863

        SHA512

        13a1a91f702ab0e87044e318f0e6b5558c01eb231b411dd77597dacee72d8d75d9a0bb6293a7a16a1eb342aeb06e1033e144facaefc7073e20a248de352caff5

      • C:\Users\Admin\AppData\Roaming\Let's Compress\Let's Compress 2.3.26.0\install\decoder.dll

        Filesize

        206KB

        MD5

        9d45f2790dda55df2d99ef66dcb2019d

        SHA1

        f2a369c1b82476e2e0641f95394dd4dee8223f01

        SHA256

        9b7ff49f7e1d0a39826ec458c8004b20a65a4bd0592b083f38b01e2dbc2b510f

        SHA512

        9bef561ec6908dcd7e75f5f63cff8b1ec73e9be2b4e4aa5602182cde18d691cc28259b980c87246c5d27b4284bc783fba44d92a202f77b15f3e65c89dd3aa069

      • C:\Windows\Installer\MSI2DF3.tmp

        Filesize

        544KB

        MD5

        40117f705bff008c3d96a73162dad044

        SHA1

        2735813836f36b5de83a745c47628053a0f61f66

        SHA256

        32211c43bcfee2ea3ae54899af178d1fc0c2b1111b2a9e3cc3fd125e1ab7daad

        SHA512

        eace1d55d479c4cf5692ec1dc98a6738e94874901bebe14a0a0a93eefd00fc4bd55a701e4629a1f7c47f72ac91fe3b698d590a8463119998852e05d6682f91a4

      • memory/188-548-0x00007FFD1E600000-0x00007FFD1EBC1000-memory.dmp

        Filesize

        5.8MB

      • memory/2588-144-0x0000000005C40000-0x0000000005F94000-memory.dmp

        Filesize

        3.3MB

      • memory/2588-146-0x0000000006820000-0x000000000686C000-memory.dmp

        Filesize

        304KB

      • memory/2588-150-0x00000000081D0000-0x0000000008392000-memory.dmp

        Filesize

        1.8MB

      • memory/2760-223-0x0000000005D80000-0x00000000060D4000-memory.dmp

        Filesize

        3.3MB

      • memory/2808-522-0x00007FFD1D820000-0x00007FFD1DDE1000-memory.dmp

        Filesize

        5.8MB

      • memory/3312-536-0x0000000006730000-0x000000000677C000-memory.dmp

        Filesize

        304KB

      • memory/3312-526-0x0000000006060000-0x00000000063B4000-memory.dmp

        Filesize

        3.3MB

      • memory/3536-549-0x00007FFD1F570000-0x00007FFD1FB31000-memory.dmp

        Filesize

        5.8MB

      • memory/4296-113-0x0000000007280000-0x000000000729E000-memory.dmp

        Filesize

        120KB

      • memory/4296-82-0x00000000057F0000-0x0000000005856000-memory.dmp

        Filesize

        408KB

      • memory/4296-102-0x0000000007240000-0x0000000007272000-memory.dmp

        Filesize

        200KB

      • memory/4296-103-0x000000006E260000-0x000000006E2AC000-memory.dmp

        Filesize

        304KB

      • memory/4296-100-0x00000000082F0000-0x000000000896A000-memory.dmp

        Filesize

        6.5MB

      • memory/4296-99-0x00000000076C0000-0x0000000007C64000-memory.dmp

        Filesize

        5.6MB

      • memory/4296-98-0x00000000063A0000-0x00000000063C2000-memory.dmp

        Filesize

        136KB

      • memory/4296-97-0x0000000006350000-0x000000000636A000-memory.dmp

        Filesize

        104KB

      • memory/4296-96-0x0000000007020000-0x00000000070B6000-memory.dmp

        Filesize

        600KB

      • memory/4296-117-0x0000000007560000-0x0000000007584000-memory.dmp

        Filesize

        144KB

      • memory/4296-94-0x0000000005ED0000-0x0000000005F1C000-memory.dmp

        Filesize

        304KB

      • memory/4296-93-0x0000000005E20000-0x0000000005E3E000-memory.dmp

        Filesize

        120KB

      • memory/4296-92-0x0000000005960000-0x0000000005CB4000-memory.dmp

        Filesize

        3.3MB

      • memory/4296-118-0x000000006E3C0000-0x000000006E714000-memory.dmp

        Filesize

        3.3MB

      • memory/4296-81-0x0000000005780000-0x00000000057E6000-memory.dmp

        Filesize

        408KB

      • memory/4296-80-0x0000000004F80000-0x0000000004FA2000-memory.dmp

        Filesize

        136KB

      • memory/4296-79-0x00000000050A0000-0x00000000056C8000-memory.dmp

        Filesize

        6.2MB

      • memory/4296-78-0x0000000002830000-0x0000000002866000-memory.dmp

        Filesize

        216KB

      • memory/4296-116-0x0000000007530000-0x000000000755A000-memory.dmp

        Filesize

        168KB

      • memory/4296-115-0x00000000073B0000-0x00000000073BA000-memory.dmp

        Filesize

        40KB

      • memory/4296-114-0x00000000072B0000-0x0000000007353000-memory.dmp

        Filesize

        652KB

      • memory/4336-172-0x0000000005870000-0x0000000005BC4000-memory.dmp

        Filesize

        3.3MB

      • memory/4928-510-0x0000000007CC0000-0x0000000007CD1000-memory.dmp

        Filesize

        68KB

      • memory/4928-509-0x0000000007A40000-0x0000000007AE3000-memory.dmp

        Filesize

        652KB

      • memory/4928-499-0x000000006E6A0000-0x000000006E9F4000-memory.dmp

        Filesize

        3.3MB

      • memory/4928-498-0x000000006E330000-0x000000006E37C000-memory.dmp

        Filesize

        304KB

      • memory/4928-497-0x0000000005F40000-0x0000000006294000-memory.dmp

        Filesize

        3.3MB