Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/01/2025, 01:00 UTC

250113-bcnq5axqbt 10

09/01/2025, 12:16 UTC

250109-pfhwyazjhs 10

06/01/2025, 14:21 UTC

250106-rpb6vs1kgr 10

02/01/2025, 20:47 UTC

250102-zlagvsvpdv 10

02/01/2025, 20:45 UTC

250102-zjvd9ayjar 10

Analysis

  • max time kernel
    427s
  • max time network
    428s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2025, 12:16 UTC

Errors

Reason
Machine shutdown

General

  • Target

    Firefox Installer (ratted).exe

  • Size

    170KB

  • MD5

    200eb10c73336127006740ae06003933

  • SHA1

    32ef06528018d4f9fc8da3a7e7e07363b3a143f4

  • SHA256

    b46624ea261bec807dc1f93431ab3156450646976443c27322a7a9c4eec5e5f0

  • SHA512

    026eb0e018f25449f664dbc2655cfb5c360fd60a928fec344bd31b3cefa01a3fcce4dd1fc87b3aabce7557db57cb1247a1984c69b3ecb00d83f388fd6b09a0ce

  • SSDEEP

    1536:4ig4nFL9z2BOwVCMs6se7llqn17KineXd2wVKtivEYoNRh8RX9EIKhI49No:5zFL9zWOw7sgbcUieNJqKoPC5+Lm

Malware Config

Extracted

Family

xworm

Version

5.0

C2

109.231.31.129:2021

Mutex

H7HNKbba3h7eEPOa

Attributes
  • Install_directory

    %AppData%

  • install_file

    FlrefoxUpdate.exe

aes.plain
1
zHSQlSCgdEuMRL3acPSBPw==

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 5 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 14 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies registry class 10 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Firefox Installer (ratted).exe
    "C:\Users\Admin\AppData\Local\Temp\Firefox Installer (ratted).exe"
    1⤵
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2700
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FlrefoxUpdate" /tr "C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2744
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\How To Decrypt My Files.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1696
    • C:\Windows\system32\taskkill.exe
      taskkill /F /IM explorer.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1576
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1548
    • C:\Windows\System32\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall set allprofiles state off
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:2396
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" stop wuauserv
      2⤵
      • Launches sc.exe
      PID:1444
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config wuauserv start=disabled
      2⤵
      • Launches sc.exe
      PID:316
    • C:\Windows\system32\shutdown.exe
      shutdown.exe /f /s /t 0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2888
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {ED349F1A-5E0C-4F2F-B3F8-3010FC46AD38} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:332
    • C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2124
    • C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:876
    • C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2188
    • C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1516
    • C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2744
    • C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2200
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x270
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2224
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:948
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1520
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1792

      Network

        No results found
      • 109.231.31.129:2021
        Firefox Installer (ratted).exe
        38.9kB
        1.9MB
        782
        1472
      • 204.79.197.200:443
        ieonline.microsoft.com
        tls
        iexplore.exe
        747 B
        7.8kB
        9
        12
      • 204.79.197.200:443
        ieonline.microsoft.com
        tls
        iexplore.exe
        747 B
        7.8kB
        9
        12
      • 204.79.197.200:443
        ieonline.microsoft.com
        tls
        iexplore.exe
        779 B
        7.8kB
        9
        12
      • 109.231.31.129:2021
        Firefox Installer (ratted).exe
        1.1kB
        132 B
        5
        3
      • 109.231.31.129:2021
        Firefox Installer (ratted).exe
        1.4kB
        1.6kB
        29
        28
      No results found

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        cf205a0f217ebc3ed76a82f3d943370c

        SHA1

        d3fa7197740cb05d494f4fe7aab6772066e0c3b1

        SHA256

        272e33e3f90ec92fed1c495234f3b6a228a5e75b02a5aa20e6b3ae296b5e31ae

        SHA512

        763d27a18a71f3cf06d8c526c62e0c3c04531380875fac1e75f6d50995120844a91ef2641b2af3ed855f5e2ae0a02ccaf55acb04e05e33b4d3011731bca9f4e7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        7bdd4e45779f6c8f0618484c4c4d74c6

        SHA1

        25bc8d0e6dd5dbe1d48bc917282df92a11ad0f92

        SHA256

        42d7f0013fbad612e77ded73aa777852ebe89bf0d9b174912577899bc7ea87e6

        SHA512

        b8088f02ef0304f57fa3fa820d1f457af586b10d3b997b63d66ce5dcbce61a88ff20616f8252f13f930a835c40c757f2dae011940e3dd7d241ed97d1facac1fb

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f7147cd96b316f4c3bf3b77f093e8a17

        SHA1

        a3e9fdbfcb125e1e48ac2e36c320e8f23a880954

        SHA256

        f60fd7198eb08e1f8080b50f164596a976c5c725692e3d06b4f26fcd90843941

        SHA512

        477bf9b4f44858eee0e2101861c7484b75d575e4e2d463dc826e1ac7213e9fae634e9dfccc79e850c398621c07ce6902078ad901005b8c2cd619ebf953083e97

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        eff19b87a7a7e25dac461e09c2e7816b

        SHA1

        34841542f1f3876ab4b2ea8c41d42dc998f19f09

        SHA256

        47ea7978c7a89eba7cdd9586eafe74aa612ba641bcb3d43eed2a33b022a79a6f

        SHA512

        50a7e341d18401c2fed2208c9653e94241cb8097dfb9446eb497859e7deb370d7ce165df60078666e63c94c94b2dd7999104bc285b1e6f5f8d6bcf3eaa5f25e7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        475712fc6cec1481ffc963b62e75b32d

        SHA1

        6f12e4e9ea2485d9702fc0906f4913421d3425d4

        SHA256

        535753b7833d8f6e0227b6f255051ae2da9129578f5840e8e845d64a96a435b2

        SHA512

        586d21ab50186c7e970f95f674bd4f261c5dee3f15e07eed7d3d12b856f057ca4fd7929190fc09d38b7c6844ac337a9adf8b059caa8ac275f9810a3ad02e4d31

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        0a5d94f1b0cca593d35780148b189b73

        SHA1

        a30564fc15a50ef0bde332010df95ca893d3c766

        SHA256

        c2ac6f52885e16167169af9a465ab92513cbf307893841c7a0900d8b813a7688

        SHA512

        9d085b9a7cadc23188630095fa12b17e98ec95cec255d0a10cbcbd8467583c57ef4c5a45607784667d58e2d159f76e290f8a4aac8d77d76c96e5d071d24e7a5a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        df0e53dfc8251ac4d04367b4fb817232

        SHA1

        669756fb7ef226c5a0c36000e6d05241c2429dd1

        SHA256

        ed148013fe3b1dd945cc3943b51177fcd329312f932516c57de5c22f60f04ae6

        SHA512

        06a7015310e26249e6f539d3fc3fb9432bc058bb1d6940034df6e98b0461d64f595fe7b447da36c0ee49e071a332e43213d1f4b3ee93c708903cbd6f3fc3b46b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        689361a851839f833f2ae633fd59df0c

        SHA1

        8b5a564ee6d37e3b9089f5dd0e12b3eede03b6fa

        SHA256

        a1674f5fba45ddf1b7b4db72f088d017422028dcac3395d8815e22c43b2f3482

        SHA512

        569737c2876e2f9789b159279aae63f42ff37eb864d31c9c95529b590b80da1299a2cb5288b2cffc9a90dec22c00efd0730d0f9b224f01856ff86666f4b10377

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        c6f5bfad07efaace836a53316256fde3

        SHA1

        a78b0ed90bed9effa377ea10c69c4faed99445ce

        SHA256

        abae00ab6f25b75b1ea2889479105ae21293c971fc28962d80abf138681c068b

        SHA512

        84243cbb10507d832a54d8cf521f7baed388daf82420068ed95762ddc0e30a2bf4c251f608bb4828d4149c3af4c10d9804ec898a175eccf8eca324b9ed9dc212

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        9e9f16442c40077f3fc80fcb7e4a3632

        SHA1

        5929477a64ba6c70a660740352dc07e8e38ed85e

        SHA256

        1f832ad837fb6431457609deae5447c8b5312726851d91a4d9d42639692d526b

        SHA512

        b391a60868ef104dca841e31af62dd5138f10966a7bc7564503420c36b88a4029456c89285e66b0dccfd451674f659cbd5866810ddfe1c335a29f2d26b174c14

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e60df3818e0a57af15222984b8fb3e11

        SHA1

        31a2613e5b3406c622da1b8bbc8accee567c5ffb

        SHA256

        69b500d6c55a1fd130352ea44faf684bc5414563b485eeb23ef0723558d02fdf

        SHA512

        1d137f1a1865e92993a91216019401bf71b4a7ae532a385060f294910b7d435bad6b82743d18ed257b82dfd7d95a244cba217f3aebcb6f5dcc795171bcc774d0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f2ad03b824b063df597154955069ca8e

        SHA1

        101e6354324399b3e5dd1483ddc1eeca522813c4

        SHA256

        3ea277844378adf35d0251d4aa5d0c2561f8dd41c3fdcf731c0123638d3e0bbc

        SHA512

        c3cd5af68084a176bbebc36046ab91ee1ce09d26b9975a479f7c8edd11ecb8031ca1ae502c3cee2961bf8bcf2a5e475319ad00c7045ce8f69a989c2240b5c79c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        69e7fc0e581101ab4b1da77fdbe3e4da

        SHA1

        54a22070d63c7e0f0b66b7f134637731770e7077

        SHA256

        a88835e750d308773efb13b4e24727ca405fe72be26d652c463707ae716e5237

        SHA512

        c21c965f75e6946704aea2b7c9ec816aa391a6539dbd1ff89ebbb5a48f05fe506a4c064c4b5db03351cb475879754c25636190bf794aaefe76fb5fa3e708bf49

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        4461bc568a256faa5c2513d938ec4162

        SHA1

        4a2f52f492c115c3efdf8f457143a50566c79329

        SHA256

        049520709ec4ed2fe0344f462d5f404251a8b6844545aef715db549008d93f2d

        SHA512

        eb587e14e3c585f35f4d2c3be83a524138da129a98fcab873ed778414f0e416ddda3d8804566051e7669606c5b0aab4718c8dc8bbd0e57a542f1cdf0dee0b6b7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        7239abc7a745e4a833b1ef92270cef2f

        SHA1

        0f048b9f91d26b44eecb293ea2138bd2e24e9fed

        SHA256

        9c9b2ecaa03e51db13aa07071ec72b75ce58350092555407f66d626f8afc8434

        SHA512

        bf8d685707ea8caaf0dd3e6b74c2675d757cd81b06c689237b1b82cdacf5388bc1022e02b6c0ddc0cc3e116b4b58e00334655584ecb699c99fd31bf83b7fb540

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        3ebec51e3583ff701ec75113baf4756d

        SHA1

        fda8dafa37ec387e75fae40bf9956a4d07cd32f6

        SHA256

        6d4de654de74cc2c6e673b099725413907ab633f8ca4bfbe30e3a64af0975a88

        SHA512

        bdf44bcb5018079df58c7a9ab13ce7d562928d3b581465505a0593eb167ff1e5444ad61b2445b5a2eb4d7946a956df22ea9144d7d40a0d06b97eeff5a0611da2

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e075822209e10ee35e0f4be2b1c74273

        SHA1

        cd7f7465da6129ed209239bc3baecd40510cc36d

        SHA256

        49609bf4eeeac0846598072d69b6e6d09cd1ebfddf0496c467fe95ee90cd6eed

        SHA512

        54d0e8d7226a2c7bd7f0aa473b3d848e863593845d14acf2a70c776d014e6c46da32ecc49a37ae1c5d83872e63735e58d05a8ecaf86dca71214b14fa225c13d1

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        7e4501bd98a4c55bde7470806dbbbbdc

        SHA1

        58178ff0db76af07a2ae1152e257e55717a1089d

        SHA256

        769c017b2f096ed8dec2390ab8405b221ce4111b9ade9718020cfc94c89f5c12

        SHA512

        14b180ef962281cf42d24b36c1566686b6b700ae8894e93069418ce49b6214df1ce69d5fe7266fdf108f9199cbf2c21314b7ca798a7353c8ced7ba148efab7e2

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        650e540c3609708dc75a13875bc341ec

        SHA1

        63485684aaf3de1bba2ac0751f16bcf47647c916

        SHA256

        c35225cefc98cd55cb8e5b1fa5438c03d153c03ec76bfa5b44f4145d479ef3bc

        SHA512

        9d4f7787ca5cb9706a0f016bccccd808a74635026b833e5a5fa3b50bd6b4d0f63283c528673ac65101bf304aad1457709e4e4988fef998e0564ba7beac125875

      • C:\Users\Admin\AppData\Local\Temp\Cab7F50.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Tar7FFF.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe

        Filesize

        170KB

        MD5

        200eb10c73336127006740ae06003933

        SHA1

        32ef06528018d4f9fc8da3a7e7e07363b3a143f4

        SHA256

        b46624ea261bec807dc1f93431ab3156450646976443c27322a7a9c4eec5e5f0

        SHA512

        026eb0e018f25449f664dbc2655cfb5c360fd60a928fec344bd31b3cefa01a3fcce4dd1fc87b3aabce7557db57cb1247a1984c69b3ecb00d83f388fd6b09a0ce

      • C:\Users\Admin\Desktop\AssertComplete.xlsm

        Filesize

        444KB

        MD5

        8a1f5195b81093def22aedac6835a218

        SHA1

        8394f5d8d74a395479a7d07eb5479cb9028e4f95

        SHA256

        1b69bf7b8aeb51afd9e7724c9cf0ecd1469546d8a04cdb9fc6b5d0b83d7aee04

        SHA512

        58d4af11c52eb1fa6131f7f1bde64e7682f5dd81fe9a84ba87ae641ef54f6fb0bb68b27e81dee8d8fc1d53444d09fae40fc0a7ac0cb0523ce302471f332ba2ef

      • C:\Users\Admin\Desktop\CheckpointDeny.xht

        Filesize

        287KB

        MD5

        793de48baec54825c73745c08a90beb7

        SHA1

        d524259c6007e3d979fea2886f07f1672dc11d7e

        SHA256

        545d0570f935a69bcacdfce5e16949696d6092ec3411f7a4c93b54eb099cf53c

        SHA512

        4a2c7d0f7dbe28a5fde051e847af92e0283fc65338d41f8c2b4346405df41a281fdc5a691e3fc89f0028b77d03a46a81d3f294610f997202f34ff202300febbc

      • C:\Users\Admin\Desktop\DisconnectUndo.mpg

        Filesize

        566KB

        MD5

        cd03e8622b8375aa6176150054df8f41

        SHA1

        0882717d786ebc9341f80a9bbcd53ab7c6605bc5

        SHA256

        a4b7d75f9e2c37fa36caeaefceae0d4c860ea82b62e7cffb1ab04d5dc8dddba7

        SHA512

        e3361d569fbbc615205c4c51350ce7d561ff6aa6214cd35823e6e863d0454eb4a2dac701098b4c8d1d3904e73626f06825053044bd5f18954e2fed1b59f562ea

      • C:\Users\Admin\Desktop\DismountPublish.dxf

        Filesize

        235KB

        MD5

        63eac906dbef2f2ab1306c78f159e886

        SHA1

        b9f26f6ba640c45711cd3dbcfa185c60d6ee6e10

        SHA256

        54cd4d34e21dfcda0d774557fea5788a0cfbe881788c97e068b05f42035a4e01

        SHA512

        0c00755a410a4421823206ef4f063b0dfcc7763395937b7b32d9e3a9bcb8adc5f89bf444f94815546683cce392c468957f3538544ccda415e9a57c0a5a142256

      • C:\Users\Admin\Desktop\EditTrace.cab

        Filesize

        496KB

        MD5

        aaf548d29ab0aa9263b7fd791fe8835f

        SHA1

        e21928f62f0845a8aa9d76aa35f49ff1ac36e668

        SHA256

        aacf9204d48fe1efe05c2e44cd2afe0e624dd5d53cfcf70fac811ae436038333

        SHA512

        3c0ccaf961f5cdcca0f010ac09f773c2eca553110aacb4dcc4f7279ea2232653860de515b844ad411625aea2f9bb24e20211ac29eb19933a33918e7afb140974

      • C:\Users\Admin\Desktop\ExitDisconnect.mpeg2

        Filesize

        357KB

        MD5

        b75e04d651a622541e14cef1d6da67dd

        SHA1

        21ba40fbbca30fc44f5f0c8debd7aafd18963e8e

        SHA256

        cd33c7d1a58930131aca3b9e2f2f5ea68da36a659148f111b6fbc7de8e15cad0

        SHA512

        01e8a7c031caaf2af70732d54fda1dedba8853c5fb16b680eb99c7b95046c27b3953ced033a1e5d9e365889b7e207efd5eebc311d0848dfcc43a50917d904b78

      • C:\Users\Admin\Desktop\How To Decrypt My Files.html

        Filesize

        630B

        MD5

        255b21f69d58103d0b7ac94db2cc77dd

        SHA1

        171ed83d1a1805da597dfbbdb3563009b092eaff

        SHA256

        f6f9fd8bd3c04ce5ac3d759e34261cf8b839b9c97f1a6830c23555a12da50070

        SHA512

        a957e59777d2c78d9c354e991e52e1bd3e2820058aaf45f2d21ca4c79a216c4d6d114e1eec28624dcff801e7622255b3b507719cfde28b3bfb38f9bd61cad0c0

      • C:\Users\Admin\Desktop\InitializeRead.wmv

        Filesize

        339KB

        MD5

        e5799cb2c5285cc1d5b9ad6fddea866f

        SHA1

        7c1125d75b8ae9fe6a1cf97a6da0d1b5ed6b1568

        SHA256

        20aa3885886587c6c3ea7474151ca4468690add991620fd23cdeecb441d23074

        SHA512

        0909dba398dcaf9bb7b484ca8e8cdb5ed71cf14cc5f27128a383ad692492db0d80a5ec28e15a6d2b0dfe9ed46e0824995197ea2b598c2cffb34e3102421bad6a

      • C:\Users\Admin\Desktop\ReceiveDismount.wvx

        Filesize

        304KB

        MD5

        b3038d5693d5d1dff25dc5b64f5a9067

        SHA1

        bedd908eb01d8796737da8cc4565fbcfb0f40aae

        SHA256

        eb2db5119cbafc2457df09adfe8cf7b4a2ac676d67723bb75e57f2f4d63dcb55

        SHA512

        af3e5205d620e3ce4e8d97a16545674440378363c1b11711352e2f19b92140e238d8f81f94e324c6f4359dddcc314ac9303513259d46399cde2ff56cfacaf3db

      • C:\Users\Admin\Desktop\RegisterConvert.7z

        Filesize

        548KB

        MD5

        5079683d0d6eac8aa955a88cf8c17dae

        SHA1

        c4bb4f7f6a876b677587626c76ae8ff32aa4ed7f

        SHA256

        c7581b6ed58764ba227b6e9e4addb5cd19ccba0c62f67934a73615b12481bfca

        SHA512

        de41292d2b93456e8638d4656b852ec9bef16feccf23b155ca7d1a97d51af2f3a52f3fe69fc7583b676b8450253f9fe131c6fb076bed3d8f8d936829709424a0

      • C:\Users\Admin\Desktop\RegisterTrace.wmf

        Filesize

        531KB

        MD5

        67a281c2526a1c9e3d70cd1230935a04

        SHA1

        82bee6a2165e51c32c7084138c25a96983b8023f

        SHA256

        0c7aba9aa8593194483b5ac7169f3e2f102c802267b1d753b982d754d3777125

        SHA512

        20124ea98a5440198a42a696a3896586926a015bb3d3e7ce6c1563ac36fa2bc2ff6a81624909b15a6bb9a69c77e36ff6ff054ed3f4302ae9e14d3b6dc8a02254

      • C:\Users\Admin\Desktop\RemoveEnter.xlsb

        Filesize

        783KB

        MD5

        a8683a0a76d364d26f660258cbf4f20d

        SHA1

        ac0f7bf1460687100baf8e7c4f8ee5421980860a

        SHA256

        b88203e9960fd6100755e5102844be099ca4535363d77804ab8b85ff73efede0

        SHA512

        1aebe496dc4bbaa63d9131c5dbf13529c79603faee20bf5e8063285f0ee29b5ef93e3a386e8e74839bc236f6e4ccabf6e612850245ed5f1b0504eacb3c7fbd57

      • C:\Users\Admin\Desktop\RenameApprove.odp

        Filesize

        513KB

        MD5

        611a5511d66be3885dfd55b1360dcb90

        SHA1

        ab1a823f6ca810a45ed907a65fb0de86a38a9302

        SHA256

        60f90086ebcbccda4882010b7e1e42b952fd74c55e4305d607eb4f46b819d610

        SHA512

        ebfa6ef67f832ec2fea86e5aaec193fd589e95795d03572938d1da2a326fb873971cb81cb8dcbfd9e8ebf322b51d662072206d837bdb40f319b747ccea200309

      • C:\Users\Admin\Desktop\RepairConvert.scf

        Filesize

        200KB

        MD5

        c3476c97d8a4eb36d9a4a245c23ca949

        SHA1

        9548e6b73dd72e8af9b21c1adfe7652f06c1540a

        SHA256

        f0b751befa9647ad0461f9002d00c52924377877fb1c429fface79b599f992c3

        SHA512

        b1707f5f63b74b725d740f455d6876ac5bc9c6a000defdba8445d849f09e365f010163b2a990344d528ba99b622b8fdcd733d6b730b1900e3ededdeb8d575e01

      • C:\Users\Admin\Desktop\RepairUnprotect.vssx

        Filesize

        409KB

        MD5

        cf932fe2b5b5bd09220661938e6d8585

        SHA1

        13bdbce0cf2af10b3dd8655be4c6e65807357cfb

        SHA256

        95df6b139da2258d47e92a8fa30645420c9c8b3a2bd25e2e873d1c78fac06f57

        SHA512

        f7c6bb3b9eb918463360a4277c26058d162ad71a833efa3d71e426d6d890f6cbe684239f322204be0031ab5c49cb9d7bc276d603c25c4d4778710dd1cd843611

      • C:\Users\Admin\Desktop\RestartAdd.mht

        Filesize

        461KB

        MD5

        b88a095609ce5f1ee9496f710424b377

        SHA1

        7f599cffb78d7bb4277310845a959b2c4afcd25c

        SHA256

        1f83c5db66fb5ff78e3560355213ed2092fc6b8c9bf7c413600a6938af0eceb5

        SHA512

        943d895fb13244f66a8c00374a14fe6fe4cb357fd2c5bfe8560eb6bf54e702ba77cf28cb695642e7d9a4168b58383541f773f57d378bf8646882a100e19c501f

      • C:\Users\Admin\Desktop\ResumeDisconnect.potm

        Filesize

        252KB

        MD5

        fdfc2f17f4d74884496af36e77b2e17e

        SHA1

        e7c73bac59f8ab74869667410060b55db3e659c9

        SHA256

        ae24d68988353d638c1c22f5e6befe7f4b01d6d10990d1ba4bb9c6e06ab29d6a

        SHA512

        6d4d49ed6f46de15863447d5625fea6a0cbb480cc36407f8a5226d8498511418243614436635a447172f294a4bfffec39ecde4151e0527568c62080c19b285e3

      • C:\Users\Admin\Desktop\SaveAdd.ini

        Filesize

        426KB

        MD5

        80e39cb61ede3d03c06e9190267f977c

        SHA1

        72385578b7f76e63e52db020670b09d91df4cbaa

        SHA256

        2f6bf2e5a23d50f2fbf01c9582f1f4af23cdf74172070f6b0eaece375d3d79ea

        SHA512

        516365b0479328613b4018a0bef6b54dbacee150a3c5a6df632da3a8876b179a7a6b2a03590a424300a7533f05842faec10bcc4c127244e66e9a4501f73055eb

      • C:\Users\Admin\Desktop\StartDisable.m4v

        Filesize

        217KB

        MD5

        04f238df6d7be2c01db84f8ccac1de7e

        SHA1

        df4670dc2e546e5416ca2711aa03b91e05530f3e

        SHA256

        55de22d0c92e236388ca35be7e2abe36d9d9958ca155ffec534ed6e36e830851

        SHA512

        23ec1ae6e7b9df9c33075d4fda486735f73ea735c7d082a66659b8313a4ad019f2e138884e64a111dbe7165084896ce317965e11bb356ee095a55207a1e5f422

      • C:\Users\Admin\Desktop\UndoUnregister.xsl

        Filesize

        479KB

        MD5

        0e610d1314cdb5b9be190d04ed5498e7

        SHA1

        b06656f353e4e1cafbe6e3612e4c869cda37fbfd

        SHA256

        57a6451b6bf415c1e12e6e06612c5549952945d969070f2f59c106db552735e4

        SHA512

        25fd3d5a019d6b4374ba273a223ac55467a7927b02a311829e0ad3141aeb815b48cc19942b3924861b05260a62365e5953fb9cf139ac2a30e7cecb0da7000f55

      • C:\Users\Admin\Desktop\UnlockSuspend.ttc

        Filesize

        391KB

        MD5

        e59c108966c02ce9e0c2b87b688b5493

        SHA1

        d589f38e2f8dd1c22dc4634ba112a86c91cf176c

        SHA256

        37ac24c0a5d2644e12be5f4aaebdf7a30d1036fe62a7ccc3f83b5a76af0fa0e3

        SHA512

        62eb62b6e30ba3df57bc16512cf0585dee30c5e3b55d97ec941e2db0d6ac42009ff4e3cd379db1477048bf5b49eacd6e55307cef8da017edba58fc52aef5cde0

      • C:\Users\Admin\Desktop\UnprotectUnpublish.xla

        Filesize

        322KB

        MD5

        380fa0dbd2c0ce836c94aa32534de2b7

        SHA1

        7ecea73786ad4f361033732dc860f9fc73e4e5d1

        SHA256

        de6c7eadd816a1e1da58170ae3261f38d6775f65984a2d66c6d50642c1e9b155

        SHA512

        bbebc7c82ae0bcb27f2caa7be8df458efb060bc63a7b25a8ab909126169c476e4f8f8f7f4c052e8923632694fd26b820dfb002acf891344220e1ca9f4e290223

      • C:\Users\Admin\Desktop\UnregisterRename.wav

        Filesize

        270KB

        MD5

        da1891e5b43f2280a7f3ed075f9d9ddc

        SHA1

        6e1f12dec9b788658d1d50bfb0d03fa609e31ca1

        SHA256

        bfc51046b385de456c119d19cee9562b56fd6472cd150811323146124b4fa813

        SHA512

        f1c55d9b1b733d1b409e4f10adc2a71f401c735d8624d7a70cf13e7ea7b033fcdd7679d13842d9edd9dfdc5fb58487a2c3dae93ba4d81a78a25805bc60a5e4f1

      • C:\Users\Admin\Desktop\UseInitialize.tif

        Filesize

        374KB

        MD5

        6a45556fb58186b9cf6beaa82628b0f9

        SHA1

        edbf2df6d443f00b0358166b4b8d66534f0b3fd6

        SHA256

        0a4b2c38dc4d3954da78965f3180ff324ad999c1d8fd3c5063da4d2f0509b3f6

        SHA512

        69c29bbde4386af7660819adb486600f72390bbc155b2b2dbc4395eaf2f401ce5ae0d49df4a33e8a3842e8de63f0f193916f18c11492598521cde22b38b368dd

      • C:\Users\Admin\Desktop\desktop.ini

        Filesize

        282B

        MD5

        9e36cc3537ee9ee1e3b10fa4e761045b

        SHA1

        7726f55012e1e26cc762c9982e7c6c54ca7bb303

        SHA256

        4b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026

        SHA512

        5f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790

      • C:\Users\Admin\Documents\desktop.ini

        Filesize

        402B

        MD5

        ecf88f261853fe08d58e2e903220da14

        SHA1

        f72807a9e081906654ae196605e681d5938a2e6c

        SHA256

        cafec240d998e4b6e92ad1329cd417e8e9cbd73157488889fd93a542de4a4844

        SHA512

        82c1c3dd163fbf7111c7ef5043b009dafc320c0c5e088dec16c835352c5ffb7d03c5829f65a9ff1dc357bae97e8d2f9c3fc1e531fe193e84811fb8c62888a36b

      • C:\Users\Admin\Music\desktop.ini

        Filesize

        504B

        MD5

        06e8f7e6ddd666dbd323f7d9210f91ae

        SHA1

        883ae527ee83ed9346cd82c33dfc0eb97298dc14

        SHA256

        8301e344371b0753d547b429c5fe513908b1c9813144f08549563ac7f4d7da68

        SHA512

        f7646f8dcd37019623d5540ad8e41cb285bcc04666391258dbf4c42873c4de46977a4939b091404d8d86f367cc31e36338757a776a632c7b5bf1c6f28e59ad98

      • C:\Users\Admin\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000001.regtrans-ms.ENC

        Filesize

        16B

        MD5

        17869dbc67df2e3d232de9dbdc40767d

        SHA1

        9228b64f9436c833428e83fd1952448eb4800d93

        SHA256

        72826958043a1252c135dc654334cc89d0dbb1944fbf096b9c2134cc38ebee60

        SHA512

        d2a68df030aab44ce9ce57ce2702a47fde40464b880b833c408cbbd31d6363d36dab960011f7a0a0b626f0fefb9b82a82cda264105557e2506d75dd9b7c0884f

      • C:\Users\Admin\Pictures\desktop.ini

        Filesize

        504B

        MD5

        29eae335b77f438e05594d86a6ca22ff

        SHA1

        d62ccc830c249de6b6532381b4c16a5f17f95d89

        SHA256

        88856962cef670c087eda4e07d8f78465beeabb6143b96bd90f884a80af925b4

        SHA512

        5d2d05403b39675b9a751c8eed4f86be58cb12431afec56946581cb116b9ae1014ab9334082740be5b4de4a25e190fe76de071ef1b9074186781477919eb3c17

      • F:\$RECYCLE.BIN\S-1-5-21-2039016743-699959520-214465309-1000\desktop.ini

        Filesize

        129B

        MD5

        a526b9e7c716b3489d8cc062fbce4005

        SHA1

        2df502a944ff721241be20a9e449d2acd07e0312

        SHA256

        e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

        SHA512

        d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

      • memory/332-9-0x0000000000B30000-0x0000000000B60000-memory.dmp

        Filesize

        192KB

      • memory/2124-596-0x00000000011D0000-0x0000000001200000-memory.dmp

        Filesize

        192KB

      • memory/2200-1519-0x0000000000330000-0x0000000000360000-memory.dmp

        Filesize

        192KB

      • memory/2700-5-0x000007FEF55A0000-0x000007FEF5F8C000-memory.dmp

        Filesize

        9.9MB

      • memory/2700-4-0x000007FEF55A3000-0x000007FEF55A4000-memory.dmp

        Filesize

        4KB

      • memory/2700-3-0x000007FEF55A0000-0x000007FEF5F8C000-memory.dmp

        Filesize

        9.9MB

      • memory/2700-1-0x0000000001250000-0x0000000001280000-memory.dmp

        Filesize

        192KB

      • memory/2700-10-0x0000000000CE0000-0x0000000000CEC000-memory.dmp

        Filesize

        48KB

      • memory/2700-1025-0x000000001B060000-0x000000001B06E000-memory.dmp

        Filesize

        56KB

      • memory/2700-1459-0x000000001B210000-0x000000001B330000-memory.dmp

        Filesize

        1.1MB

      • memory/2700-0-0x000007FEF55A3000-0x000007FEF55A4000-memory.dmp

        Filesize

        4KB

      • memory/2700-1485-0x000000001ABF0000-0x000000001ABFA000-memory.dmp

        Filesize

        40KB

      • memory/2700-1523-0x000007FEF55A0000-0x000007FEF5F8C000-memory.dmp

        Filesize

        9.9MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.