Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    227s
  • max time network
    226s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2024, 06:23

General

  • Target

    https://cdn-staging.livechat-files.com/api/file/lc/att/1520/21450473cf0260d607c47cddf387d4b4/IMG_1086.scr

Score
10/10

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 51 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3420
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn-staging.livechat-files.com/api/file/lc/att/1520/21450473cf0260d607c47cddf387d4b4/IMG_1086.scr
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd8606cc40,0x7ffd8606cc4c,0x7ffd8606cc58
        3⤵
          PID:2300
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1924 /prefetch:2
          3⤵
            PID:3800
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1812,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2168 /prefetch:3
            3⤵
              PID:4656
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2272 /prefetch:8
              3⤵
                PID:4168
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3136 /prefetch:1
                3⤵
                  PID:4812
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3172 /prefetch:1
                  3⤵
                    PID:4228
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4920,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4928 /prefetch:8
                    3⤵
                      PID:1652
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5180,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4856 /prefetch:8
                      3⤵
                        PID:3536
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5088,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4564 /prefetch:8
                        3⤵
                        • Drops file in System32 directory
                        PID:4884
                    • C:\Users\Admin\Downloads\IMG_1086.scr
                      "C:\Users\Admin\Downloads\IMG_1086.scr" /S
                      2⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4348
                      • C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe
                        "C:\Users\Admin\Downloads\IMG_1086.scr" /S
                        3⤵
                          PID:4908
                        • C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe
                          "C:\Users\Admin\Downloads\IMG_1086.scr" /S
                          3⤵
                            PID:4936
                        • C:\Windows\system32\rundll32.exe
                          "rundll32.exe" desk.cpl,InstallScreenSaver C:\Users\Admin\Downloads\IMG_1086.scr
                          2⤵
                          • Modifies Control Panel
                          PID:2672
                          • C:\Users\Admin\Downloads\IMG_1086.scr
                            C:\Users\Admin\Downloads\IMG_1086.scr /p 197344
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3220
                            • C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe
                              C:\Users\Admin\Downloads\IMG_1086.scr /p 197344
                              4⤵
                                PID:4340
                              • C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe
                                C:\Users\Admin\Downloads\IMG_1086.scr /p 197344
                                4⤵
                                  PID:5100
                                • C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe
                                  C:\Users\Admin\Downloads\IMG_1086.scr /p 197344
                                  4⤵
                                    PID:4388
                                • C:\Users\Admin\Downloads\IMG_1086.scr
                                  C:\Users\Admin\Downloads\IMG_1086.scr /s
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:4828
                                  • C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe
                                    C:\Users\Admin\Downloads\IMG_1086.scr /s
                                    4⤵
                                      PID:2960
                                • C:\Users\Admin\Downloads\IMG_1086.scr
                                  "C:\Users\Admin\Downloads\IMG_1086.scr" /S
                                  2⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:5048
                                  • C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe
                                    "C:\Users\Admin\Downloads\IMG_1086.scr" /S
                                    3⤵
                                      PID:3208
                                  • C:\Windows\system32\rundll32.exe
                                    "rundll32.exe" desk.cpl,InstallScreenSaver C:\Users\Admin\Downloads\IMG_1086.scr
                                    2⤵
                                    • Modifies Control Panel
                                    PID:4620
                                    • C:\Users\Admin\Downloads\IMG_1086.scr
                                      C:\Users\Admin\Downloads\IMG_1086.scr /p 458854
                                      3⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:2220
                                    • C:\Users\Admin\Downloads\IMG_1086.scr
                                      C:\Users\Admin\Downloads\IMG_1086.scr /c:393546
                                      3⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:4768
                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                  1⤵
                                    PID:1752
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                    1⤵
                                      PID:2184
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:4680

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                        Filesize

                                        1KB

                                        MD5

                                        209eb3248866bac5eda48e9ec4370368

                                        SHA1

                                        ef9c95e56ffd3ed51a5e7141f77d74d3d1066368

                                        SHA256

                                        eee3e832bc79bb394495b946062acffbb96a156c7fc78c1c77d471ec7cdad162

                                        SHA512

                                        5993592981827f7298853e6c08f20451c48cdc26e59ecd266d5924d427c127f6518239e7456018e7509ceab0f54b01b3720bad9c99e0a5a5b40c1c7e391e0e4e

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                        Filesize

                                        2B

                                        MD5

                                        d751713988987e9331980363e24189ce

                                        SHA1

                                        97d170e1550eee4afc0af065b78cda302a97674c

                                        SHA256

                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                        SHA512

                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        a20e0f81a2ec9c7190644db1b4b3c22b

                                        SHA1

                                        7c7da99e22b08600c95a94b6d01ece0b34f6ba10

                                        SHA256

                                        dde5dfb6020c9d8251dfd9bd53c9f166bd837f926755faba92a04c8e33827632

                                        SHA512

                                        805fb34afbf8e3e7688e235869010dde18295178781959866585e29905d83e38533e7905aa49d21dd4ca1474207fa61078d69e38d826d46c993d0d4fecb02ca9

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        f6a74b837d05c364c77f20fe9a67f618

                                        SHA1

                                        ca2c11e732554d2ef031cee3b6dd42b49456ebc8

                                        SHA256

                                        ef13503e43eba6366d061bf380b004576291fe1788d2f942195c6ee9a21c4dd9

                                        SHA512

                                        cf6679a1b29409e5aa0af2b1f0dde9f1d43cfb4276837d2aad9ebea6171569c2fb6aecc86add1c81993f32ec7c721f0ff1e4a9d7c21be6e1ea4b166f1359953d

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        c09e83b67679d79c673cfb9bc60e780e

                                        SHA1

                                        e13118523386b8e7652121f840c2f94279e8f19a

                                        SHA256

                                        80919ae526ffaa56f0284d47d6831f6690558b4a2c46b42256c2e1c05b86c46a

                                        SHA512

                                        7104607ade5499495802e4bcede7f3ceac73fc70dc5c29f606afe20e96cab5c1f73df88f464362c7c87f57641b070f23cc7519901370690db6b19f936b6be5f4

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        876901661d619188afc19009ed3206ba

                                        SHA1

                                        cda8a14989cd81e7c852e1dcd1acbce000ac2400

                                        SHA256

                                        82861693ae2378f9548498923951af067d925f076902236f03d50ac19bca5c76

                                        SHA512

                                        d45c28b70c43cbf5f1e26ed725963dd041b67a804ecdc624e68d3282c13cbcfdd66e665e8d3b289ab69729afa9ba41da3fb63d9a226bbdeb4c824f883ee5ab16

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        2bff52ee9ebdc91fa909618d8b57d37e

                                        SHA1

                                        44bc0f1e68b50260e8a4f485ac9e1512a1c2060c

                                        SHA256

                                        c68d9f0f213a0284ce7bed5af16999b5e6673742c2b18a989a27c1bf041f4b20

                                        SHA512

                                        0a7b9b6d253ef213aa6bef436ab9cb639281616fd79f339893df6fd089d773919a7a133cc9a307f171af7cfe95fdf1bf023f7600274dc311970fc50e30d18117

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        da6c5a873161f81d0cb619967cca3c6c

                                        SHA1

                                        948fdbb1ce68dca852887499855084808dc713b5

                                        SHA256

                                        30e48fa02a89fb3e7151c2125f2a57a512d5d9350e32f153ac69f76a669a3652

                                        SHA512

                                        3c694d79761eb61913b891fca6fbc619de10f66c86945d9a320a2d7b771699a7509f0d224efaba44503a0f012cfe91519fd5ee8a4a9dcb82f7c8647def8377c0

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        4446fe6c8bd44d62017847fb179ae0cf

                                        SHA1

                                        dc3fa7e752e922d7846f7f56b9ee5b7537ef25b8

                                        SHA256

                                        31cf7e156efdaa6309f6927068332f5f41ec1edf2775c1dea20283a2344d81ae

                                        SHA512

                                        24919084f0a506530c665ae1a334825157679241e7db4c3c9f83ea04327d340e984de8bf506e63ac6551c1941615e9cd7535fc20e6ccf6145ec3d8e9d78ededb

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        1bb2c600b45838b64a28e0fe355d712a

                                        SHA1

                                        e2f84b1c54666f5279aeafd70516ce6b01f393d5

                                        SHA256

                                        4f1c7ac039758ade076677579033055524615d435163aff9b3118a3572766142

                                        SHA512

                                        0e6687e666933ad22cdfeeaea39d6eeda9902adbbd412558278290efd5e14f06b10854c8e8292c411f28b25fae7c7512bfc0d6a56936cdf17a61900de01c030c

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        feffcf67da23b85ae8fc35e0199f7fa5

                                        SHA1

                                        2f0a8989dc10219e2585ba63a087b60028edea31

                                        SHA256

                                        527f35d0f32ede4a1763bdd7e7a3df9beac83d93f395e600173e3e7b99daa260

                                        SHA512

                                        8ba2bbd46bdd234a5f195c329eb0fdbdea439b7ee3d4cc5e499d1239675fff08cce1c66795569991a28e2836d7b70f1147ac7304ded900b57ddbf5fa902456e8

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        c45d7672a164e10c8e1af61782e0b2ae

                                        SHA1

                                        61d36402a0c27eedeb1ffb2894bf82afa222a7ae

                                        SHA256

                                        14b0459246ca189f420f67d24e2a380b97d3c8238742c14142a60d531ed7ea5f

                                        SHA512

                                        31b2f109f5b9fc091a8518d2f26b66cfbb76fee12fa626921bc6d4514d8d6576bb0af65cc3383ecc5e44edee816d8a9f95f7a4437b16ec782edf35b387002f02

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        c58ffaf331eb5b0252742ae9cdb5ba59

                                        SHA1

                                        8b5d0b3db1eaace07c13b8d01e13b6701108e424

                                        SHA256

                                        f6b9220d6ea9c9667410fa56cdf8e2f3228c95ca287c5db63ad59ce089135821

                                        SHA512

                                        1800e2b9d093d670250264a2fa410966c3efcfd143a1c7486ca7a0bdf4c06c9406e62a76717b18fb1afd694ace7a154ad8829455445599734db2fe4ea04a5ae7

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GraphiteDawnCache\data_1

                                        Filesize

                                        264KB

                                        MD5

                                        fae269d6ed98f5a5067d2e83c929ffd5

                                        SHA1

                                        3fa84d0ed3b24e47d7b69c073e8e7b2de9ee3184

                                        SHA256

                                        d251bfa513e9bdf66935cfcced6de95d5866fc1693eaffef0d589efc0d25a9d2

                                        SHA512

                                        33ebf8c4fadd5948ac92ed6334023ba50152da9caacd3743620b6b18bb27af0e3de5640a116baf5a373410660128748f218a8bbfd2f96bdfc9a09f3c189be002

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        100KB

                                        MD5

                                        eb475dcbae11202d623963c0ce33279b

                                        SHA1

                                        a26854e85b960a5b799b8b477a391a440e11de7b

                                        SHA256

                                        199f5af20c2e594c2cb09a624ef7c46e0bbd07b0c311f01d2258696d0558f0da

                                        SHA512

                                        27278c296273ca385b0bf50e009a27299035e5f2bacfa2185e3886a3e6ee8d1554b0e085b8b236139070f6babe24921009ff61f4e1be563aa17d0cc84202eb68

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        100KB

                                        MD5

                                        a88530a7593df6faad8e9534cff1eaa3

                                        SHA1

                                        c2a97b90f9c5debd5193c43c171e0132bc98f25e

                                        SHA256

                                        6ed30079d2e681e073a780900d63bde41c3e3ec2a8ddbc7243e4947d35c23197

                                        SHA512

                                        89ec325b30ca2b0eaada3cea4b5f622c503e1ebec1ba29d7fa307200857cdca5ebdf77d62c3442d8a41fe541b22d1a04f35e51ee015e5d99b05fcd040c505998

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        100KB

                                        MD5

                                        545b085770c31ed0d13a7699e5f378a9

                                        SHA1

                                        4f1a936bbc2130598585d62546bb16eb4e7d989d

                                        SHA256

                                        ee6b5be560b0bc414119dd7483d08b44397bcf2f0dcc4e5be5b13f517ce9c974

                                        SHA512

                                        ad8a7a99aab31b4e46ab2f380701ee234d98d1cb56a240cb65e36f2ebee4376f21781b4355f93052982e083436084e3cfd047d853c5fc2de0bdf08f6cb9a0550

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                        Filesize

                                        1KB

                                        MD5

                                        1348e4e8fc451e8021f935f4b1376c95

                                        SHA1

                                        c6fecb47e09a1a255cbe9a9f03d91d2100cd1737

                                        SHA256

                                        cdf0440a375c4d4a180a358ea3c87448482622fbc71833bc797ec1410e54bb01

                                        SHA512

                                        ef23469825048d1fdc7f693a9efce5a1bdb8472743917288fa06244c7172d933347d8403440598a9f4062b3514ee313462655e21bc1c1a8dde78cfb607796703

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                        Filesize

                                        1KB

                                        MD5

                                        a2d5c41311177bf18a795638cc4e2777

                                        SHA1

                                        40625aa169f3bceb6b96060b8a0634bf8cf5eac1

                                        SHA256

                                        63b9d5b599c016878ea7fa9de88fd0a6e89b09210475f4869b0d8e5a71946c23

                                        SHA512

                                        e5c5cacd31a05a67449ea44fd403f4585960ff3a45104bc1044d2cac2acdc1a3e309241092a327df4f186367cde75355c7622d213925efbbd813cdb22fdc7ec0

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                        Filesize

                                        1KB

                                        MD5

                                        ad3fccf15709cf647bf96fac34496b31

                                        SHA1

                                        6a6de954c54bd23c89dd74af31e6b61d8b1d0646

                                        SHA256

                                        ecfd2cd5c912cc216758c94a380dfd15a07f7fc36c1014f77a1d08944d50b532

                                        SHA512

                                        94308f637e71fb9a5b6d66eeaaffe87bc011a1810f8a8877145fa2818db2f7c02d8c2715064e8f94bfe78984930b611537638ac3b283b9111431f40cfa49fa53

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                        Filesize

                                        1KB

                                        MD5

                                        05f6f9b3a33cdc2873de2388df2f026f

                                        SHA1

                                        15805569331f272e574f8a6bdb72b10d08c1a786

                                        SHA256

                                        b803f457902bca0381f33c815c8cc579b479f48ef28a32359ebcaaa8ddd6822e

                                        SHA512

                                        b5aa24b0f612199c57a273506f01fae7494fa473cc2384e4d26f843c320dff4d40fe1240d7bae8a2426f7e80b7d55df7b8dbeb412253203e440f9e3e30742a76

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                        Filesize

                                        1KB

                                        MD5

                                        2abb9a0e3324e080e8ee304e396762b7

                                        SHA1

                                        de6de21153249c696afe180c6370d49bcc9e5e61

                                        SHA256

                                        557c07c79dacc7729cf91d83251cf14446ebbe149b1b0fc1ef3ce756277df696

                                        SHA512

                                        bfc5eb79cd0a254ebefb0ec937bc6953bc8454605e0b0ac57d3b3ae7894e108ad498c6e3b102e2c68883e82cca78c01aa1606c1e723b9fc38e9b25eb3cf1b194

                                      • C:\Users\Admin\Downloads\IMG_1086.scr

                                        Filesize

                                        2.6MB

                                        MD5

                                        04c219134cffc77c39841c30704b2f6b

                                        SHA1

                                        1ac5a5b9a18575b0449745dd2d069f7a8b561d46

                                        SHA256

                                        6c59c6cfadff62b8d3b301d97e91b6a65b3da0415641fbabf95e3404c8e4fcbd

                                        SHA512

                                        58854e09a781150255d662a2a7968159b81a516dc05aa99a787da387b2baaba2c18e7187274e48b8cddb58aa920d7cdc4bdcab98a955f0a3bfd56fbc980b8361

                                      • memory/2960-898-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-894-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-883-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-884-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-895-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-885-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-886-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-887-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-888-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-889-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-890-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-891-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-892-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-897-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-896-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2960-893-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/3208-913-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/3208-914-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/3220-880-0x0000000002CD0000-0x0000000002D8E000-memory.dmp

                                        Filesize

                                        760KB

                                      • memory/3220-881-0x0000000002D90000-0x0000000003059000-memory.dmp

                                        Filesize

                                        2.8MB

                                      • memory/3420-899-0x0000000002B70000-0x0000000002B71000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3420-818-0x0000000003030000-0x0000000003031000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3420-878-0x0000000002B60000-0x0000000002B61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4348-820-0x0000000002C20000-0x0000000002CDE000-memory.dmp

                                        Filesize

                                        760KB

                                      • memory/4348-52-0x00000000024E0000-0x0000000002560000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/4348-821-0x0000000002D20000-0x0000000002FE9000-memory.dmp

                                        Filesize

                                        2.8MB

                                      • memory/4348-822-0x00000000024E0000-0x0000000002560000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/4348-53-0x0000000077942000-0x0000000077943000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4348-72-0x00000000024E0000-0x0000000002560000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/4348-819-0x00000000028E0000-0x00000000029D0000-memory.dmp

                                        Filesize

                                        960KB

                                      • memory/4388-853-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-861-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-855-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-854-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-866-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-856-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-858-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-859-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-860-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-857-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-862-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-863-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-865-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-867-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-868-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4388-864-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4828-902-0x0000000002D00000-0x0000000002FC9000-memory.dmp

                                        Filesize

                                        2.8MB

                                      • memory/4828-901-0x0000000002C00000-0x0000000002CBE000-memory.dmp

                                        Filesize

                                        760KB

                                      • memory/4936-803-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-805-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-804-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-807-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-808-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-809-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-810-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-811-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-812-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-817-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-806-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-813-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-814-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-815-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-816-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-802-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/4936-801-0x0000000000400000-0x0000000000433000-memory.dmp

                                        Filesize

                                        204KB