Resubmissions

28-10-2024 20:14

241028-y1gdaaweph 10

28-10-2024 20:13

241028-yzczgatpfr 10

Analysis

  • max time kernel
    3s
  • max time network
    10s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 20:13

General

  • Target

    Built.exe

  • Size

    6.0MB

  • MD5

    a64f0e83d25e9ad7487f62496283bf64

  • SHA1

    3cb98856da99a8eda9135536c08e45e6ba8d2bde

  • SHA256

    b09fffef75c3e1b81ddbfe222b9282ec1379ccb6f2045be52dd9d37fc6712528

  • SHA512

    dd9f3b53d722e8b6d505d08c74e4c41c97f8e1aaa8cb45b3d16592c5467a84f753a4c2b46b97310513f4ba1b0eecb69c6d1062b87e553e60e7a94a3b48aae616

  • SSDEEP

    98304:spEtdFBCIqamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RsOLPSKSGby4:soFIIjeN/FJMIDJf0gsAGK4RfLPSpGO4

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 17 IoCs
  • UPX packed file 37 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Built.exe
    "C:\Users\Admin\AppData\Local\Temp\Built.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Users\Admin\AppData\Local\Temp\Built.exe
      "C:\Users\Admin\AppData\Local\Temp\Built.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Built.exe'"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3232
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Built.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4504
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2172
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1640
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI43242\rar.exe a -r -hp"123" "C:\Users\Admin\AppData\Local\Temp\csC4u.zip" *"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3980
        • C:\Users\Admin\AppData\Local\Temp\_MEI43242\rar.exe
          C:\Users\Admin\AppData\Local\Temp\_MEI43242\rar.exe a -r -hp"123" "C:\Users\Admin\AppData\Local\Temp\csC4u.zip" *
          4⤵
          • Executes dropped EXE
          PID:2188
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "wmic os get Caption"
        3⤵
          PID:1076
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic os get Caption
            4⤵
              PID:3532
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
            3⤵
              PID:2908
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic computersystem get totalphysicalmemory
                4⤵
                  PID:592
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                3⤵
                  PID:5016
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic csproduct get uuid
                    4⤵
                      PID:1244
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                    3⤵
                      PID:220
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        PID:840
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                      3⤵
                        PID:1736
                        • C:\Windows\System32\Wbem\WMIC.exe
                          wmic path win32_VideoController get name
                          4⤵
                          • Detects videocard installed
                          PID:3612
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                        3⤵
                          PID:4512
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                            4⤵
                              PID:1096

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        2KB

                        MD5

                        d85ba6ff808d9e5444a4b369f5bc2730

                        SHA1

                        31aa9d96590fff6981b315e0b391b575e4c0804a

                        SHA256

                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                        SHA512

                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        6d3e9c29fe44e90aae6ed30ccf799ca8

                        SHA1

                        c7974ef72264bbdf13a2793ccf1aed11bc565dce

                        SHA256

                        2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

                        SHA512

                        60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\VCRUNTIME140.dll

                        Filesize

                        106KB

                        MD5

                        870fea4e961e2fbd00110d3783e529be

                        SHA1

                        a948e65c6f73d7da4ffde4e8533c098a00cc7311

                        SHA256

                        76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644

                        SHA512

                        0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\_bz2.pyd

                        Filesize

                        46KB

                        MD5

                        93fe6d3a67b46370565db12a9969d776

                        SHA1

                        ff520df8c24ed8aa6567dd0141ef65c4ea00903b

                        SHA256

                        92ec61ca9ac5742e0848a6bbb9b6b4cda8e039e12ab0f17fb9342d082dde471b

                        SHA512

                        5c91b56198a8295086c61b4f4e9f16900a7ec43ca4b84e793bc8a3fc8676048cab576e936515bf2971318c7847f1314674b3336fe83b1734f9f70d09615519ac

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\_ctypes.pyd

                        Filesize

                        56KB

                        MD5

                        813fc3981cae89a4f93bf7336d3dc5ef

                        SHA1

                        daff28bcd155a84e55d2603be07ca57e3934a0de

                        SHA256

                        4ac7fb7b354069e71ebf7fcc193c0f99af559010a0ad82a03b49a92deb0f4d06

                        SHA512

                        ce93f21b315d96fde96517a7e13f66aa840d4ad1c6e69e68389e235e43581ad543095582ebcb9d2c6dda11c17851b88f5b1ed1d59d354578fe27e7299bbea1cc

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\_decimal.pyd

                        Filesize

                        103KB

                        MD5

                        f65d2fed5417feb5fa8c48f106e6caf7

                        SHA1

                        9260b1535bb811183c9789c23ddd684a9425ffaa

                        SHA256

                        574fe8e01054a5ba07950e41f37e9cf0aea753f20fe1a31f58e19202d1f641d8

                        SHA512

                        030502fa4895e0d82c8cce00e78831fc3b2e6d956c8cc3b9fb5e50cb23ef07cd6942949a9f16d02da6908523d9d4ef5f722fb1336d4a80cd944c9f0cb11239ab

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\_hashlib.pyd

                        Filesize

                        33KB

                        MD5

                        4ae75c47dbdebaa16a596f31b27abd9e

                        SHA1

                        a11f963139c715921dedd24bc957ab6d14788c34

                        SHA256

                        2308ee238cc849b1110018b211b149d607bf447f4e4c1e61449049eab0cf513d

                        SHA512

                        e908fecb52268fac71933e2fdb96e539bdebe4675dfb50065aee26727bac53e07cca862193bcb3ab72d2ae62d660113a47e73e1e16db401480e4d3fd34d54fa8

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\_lzma.pyd

                        Filesize

                        84KB

                        MD5

                        6f810f46f308f7c6ccddca45d8f50039

                        SHA1

                        6ee24ff6d1c95ba67e1275bb82b9d539a7f56cea

                        SHA256

                        39497259b87038e86c53e7a39a0b5bbbfcebe00b2f045a148041300b31f33b76

                        SHA512

                        c692367a26415016e05ebe828309d3ffec290c6d2fd8cc7419d529a51b0beda00ccdc327c9f187ae3ca0cc96336d23d84a8ff95b729c8958b14fb91b6da9e878

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\_queue.pyd

                        Filesize

                        24KB

                        MD5

                        0e7612fc1a1fad5a829d4e25cfa87c4f

                        SHA1

                        3db2d6274ce3dbe3dbb00d799963df8c3046a1d6

                        SHA256

                        9f6965eb89bbf60df0c51ef0750bbd0655675110d6c42eca0274d109bd9f18a8

                        SHA512

                        52c57996385b9a573e3105efa09fd6fd24561589b032ef2b2ee60a717f4b33713c35989f2265669f980646d673e3c387b30b9fc98033bb8ca7c59ece1c17e517

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\_socket.pyd

                        Filesize

                        41KB

                        MD5

                        7a31bc84c0385590e5a01c4cbe3865c3

                        SHA1

                        77c4121abe6e134660575d9015308e4b76c69d7c

                        SHA256

                        5614017765322b81cc57d841b3a63cbdc88678ff605e5d4c8fdbbf8f0ac00f36

                        SHA512

                        b80cd51e395a3ce6f345b69243d8fc6c46e2e3828bd0a7e63673a508d889a9905d562cac29f1ed394ccfcda72f2f2e22f675963dd96261c19683b06dea0a0882

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\_sqlite3.pyd

                        Filesize

                        48KB

                        MD5

                        bb4aa2d11444900c549e201eb1a4cdd6

                        SHA1

                        ca3bb6fc64d66deaddd804038ea98002d254c50e

                        SHA256

                        f44d80ab16c27ca65da23ae5fda17eb842065f3e956f10126322b2ea3ecdf43f

                        SHA512

                        cd3c5704e5d99980109fdc505d39ad5b26a951685e9d8e3fed9e0848cd44e24cc4611669dbdb58acc20f1f4a5c37d5e01d9d965cf6fe74f94da1b29aa2ff6931

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\_ssl.pyd

                        Filesize

                        60KB

                        MD5

                        081c878324505d643a70efcc5a80a371

                        SHA1

                        8bef8336476d8b7c5c9ef71d7b7db4100de32348

                        SHA256

                        fcb70b58f94f5b0f9d027999cce25e99ddcc8124e4ddcc521cb5b96a52faaa66

                        SHA512

                        c36293b968a2f83705815ef3a207e444eeb7667ad9af61df75e85151f74f2fe0a299b3b1349de0d410bbbaea9f99cac5228189099a221de5fa1e20c97c648e32

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\base_library.zip

                        Filesize

                        859KB

                        MD5

                        e556d3870457f344c4c7e4d7ece98e0b

                        SHA1

                        7755bd0f578e61ede325f7864dc96a933a4bac26

                        SHA256

                        a8c2a424b810891e7a2be1463cf25e690d7e7e8d2efcbdcdd0bc94e77b78c710

                        SHA512

                        546132f29d7b80ddd5462c56b14ffbf37029b3c17833338d618aa6c88ee1f4667ddc28a83d26fde712ca926530cbfd65966631ba899ec138722bc9f3da70c6d5

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\blank.aes

                        Filesize

                        78KB

                        MD5

                        2b658e64525653d351e9d34ba04556f4

                        SHA1

                        2947b31ea6909c7f693b3d14381364172f1ea1ae

                        SHA256

                        8a550e6f6f025e08ac0f3206e2a234c38a220d1586a41abfffa4f897edb19028

                        SHA512

                        21bb0a60ddb880a02711b213fb3abb56c85492c9e92c68757ac5a4a7e5dc2708eee2818f9a7ddf986bbeaec50775124aabdff54c8988c63b4874a622993c7096

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\libcrypto-1_1.dll

                        Filesize

                        1.1MB

                        MD5

                        daa2eed9dceafaef826557ff8a754204

                        SHA1

                        27d668af7015843104aa5c20ec6bbd30f673e901

                        SHA256

                        4dab915333d42f071fe466df5578fd98f38f9e0efa6d9355e9b4445ffa1ca914

                        SHA512

                        7044715550b7098277a015219688c7e7a481a60e4d29f5f6558b10c7ac29195c6d5377dc234da57d9def0c217bb3d7feca332a64d632ca105503849f15e057ea

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\libffi-7.dll

                        Filesize

                        23KB

                        MD5

                        6f818913fafe8e4df7fedc46131f201f

                        SHA1

                        bbb7ba3edbd4783f7f973d97b0b568cc69cadac5

                        SHA256

                        3f94ee4f23f6c7702ab0cc12995a6457bf22183fa828c30cc12288adf153ae56

                        SHA512

                        5473fe57dc40af44edb4f8a7efd68c512784649d51b2045d570c7e49399990285b59cfa6bcd25ef1316e0a073ea2a89fe46be3bfc33f05e3333037a1fd3a6639

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\libssl-1_1.dll

                        Filesize

                        203KB

                        MD5

                        eac369b3fde5c6e8955bd0b8e31d0830

                        SHA1

                        4bf77158c18fe3a290e44abd2ac1834675de66b4

                        SHA256

                        60771fb23ee37b4414d364e6477490324f142a907308a691f3dd88dc25e38d6c

                        SHA512

                        c51f05d26fda5e995fe6763877d4fcdb89cd92ef2d6ee997e49cc1ee7a77146669d26ec00ad76f940ef55adae82921dede42e55f51bd10d1283ecfe7c5009778

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\python310.dll

                        Filesize

                        1.4MB

                        MD5

                        178a0f45fde7db40c238f1340a0c0ec0

                        SHA1

                        dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe

                        SHA256

                        9fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed

                        SHA512

                        4b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\rar.exe

                        Filesize

                        615KB

                        MD5

                        9c223575ae5b9544bc3d69ac6364f75e

                        SHA1

                        8a1cb5ee02c742e937febc57609ac312247ba386

                        SHA256

                        90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

                        SHA512

                        57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\rarreg.key

                        Filesize

                        456B

                        MD5

                        4531984cad7dacf24c086830068c4abe

                        SHA1

                        fa7c8c46677af01a83cf652ef30ba39b2aae14c3

                        SHA256

                        58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

                        SHA512

                        00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\select.pyd

                        Filesize

                        24KB

                        MD5

                        666358e0d7752530fc4e074ed7e10e62

                        SHA1

                        b9c6215821f5122c5176ce3cf6658c28c22d46ba

                        SHA256

                        6615c62fa010bfba5527f5da8af97313a1af986f8564277222a72a1731248841

                        SHA512

                        1d3d35c095892562ddd2868fbd08473e48b3bb0cb64ef9ccc5550a06c88dda0d82383a1316b6c5584a49ca28ed1ef1e5ca94ec699a423a001ccd952bd6bd553d

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\sqlite3.dll

                        Filesize

                        608KB

                        MD5

                        bd2819965b59f015ec4233be2c06f0c1

                        SHA1

                        cff965068f1659d77be6f4942ca1ada3575ca6e2

                        SHA256

                        ab072d20cee82ae925dae78fd41cae7cd6257d14fd867996382a69592091d8ec

                        SHA512

                        f7758bd71d2ad236bf3220db0ad26f3866d9977eab311a5912f6e079b59fa918735c852de6dbf7b5fee9e04124bc0cd438c4c71edc0c04309330108ba0085d59

                      • C:\Users\Admin\AppData\Local\Temp\_MEI43242\unicodedata.pyd

                        Filesize

                        287KB

                        MD5

                        7a462a10aa1495cef8bfca406fb3637e

                        SHA1

                        6dcbd46198b89ef3007c76deb42ab10ba4c4cf40

                        SHA256

                        459bca991fcb88082d49d22cc6ebffe37381a5bd3efcc77c5a52f7a4bb3184c0

                        SHA512

                        d2b7c6997b4bd390257880a6f3336e88d1dd7159049811f8d7c54e3623e9b033e18e8922422869c81de72fc8c10890c173d8a958d192dd03bfc57cffaea1ac7b

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0tifesqr.mqb.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\csC4u.zip

                        Filesize

                        9.0MB

                        MD5

                        0e85f5e39ad538dce7c58284bd55c2ba

                        SHA1

                        3d783553be896c7d7b9fb9b050a971ab993f7e7d

                        SHA256

                        0cbe902918411b5f5410ab3118146ca7a70a1b86616d0e579c319d720f9f589d

                        SHA512

                        cae86bbc00995725287f608af85032616e19cd59e004e071a4d5d227f74490073f3f613ddf982f32bf9cd30fc97f5182167e670eaf3aec2cbcabf48f9ec4f1d9

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Desktop\CopyReset.xlsx

                        Filesize

                        11KB

                        MD5

                        ea1e653865d21b29858da00f4299a192

                        SHA1

                        a37b308fe09e9d39800c5f89a4694f76b8105e98

                        SHA256

                        efdbe7bf4597bdf1c527ce1e645ee25ceb299605cfaa51dcdd579b6737e696ec

                        SHA512

                        88836bc3172f5fd5ea029eccb88aaadbe1a9297cf2725d45d54ee360ee987af9e1cced180a5fef57d861cc8ce256fe426dd1395031d49182ea9d49314d3de61a

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Desktop\DisconnectRedo.docx

                        Filesize

                        266KB

                        MD5

                        99c63f34188b219e4d21cd0dd6768b10

                        SHA1

                        60d2e34b14817f385abf34c3421fd7a3e4811440

                        SHA256

                        1596227a61be1838c5b4ccc1cff382385ff44c17b7499a4d8d8adfa5c8d611c4

                        SHA512

                        77544cb93e0f3e64ecc56d432afe42457cc767699641ca367ab1ffd1c4993c256db693c51c7a23b68feb1e1b813b3b88149dcf91f8bb1f0a7e45655c614be824

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Desktop\ImportBackup.rmi

                        Filesize

                        590KB

                        MD5

                        a8e2c794b0317c66c2277535f07461be

                        SHA1

                        357c2b375ca4c86a21d6eaee16259c780424acc5

                        SHA256

                        e650ea1c9271f10b7b8cb4f777ecd199bdbbfbc7a106e7e4d05cfe6a8c5fadfb

                        SHA512

                        aca3a57bf9295b1d0599531fc4abec029e63707b795d12a01635d51a8cd49ebd4621078d1b059295eb5c62a06bb0da75f7dfa736398b2588415daecceebfcf9f

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Desktop\TestEdit.xlsx

                        Filesize

                        12KB

                        MD5

                        b08da27453454a1308e451660e86a5b6

                        SHA1

                        b991c0159b160420301b652d236c69dcae6aab34

                        SHA256

                        09076a17d72e72383f1e94e6844465976d44d68db926a4128e9df95c9e81a91d

                        SHA512

                        526f78c4bb627b77f82851e45d2713d9744ebca9596bf8d54c2c63f645ae50dd7c2912d0a9af8a1ab34d35e4c639bdb1f1fccd7b79c4ad13bac5cebf55decbc2

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Documents\DisconnectProtect.txt

                        Filesize

                        427KB

                        MD5

                        74bafcc7ddeacc58c8ccc78ff9a09d84

                        SHA1

                        398dfdf2a808edfdb02be8903c9c4f6924545a64

                        SHA256

                        b8a21c3b7c90b1b2f8b8dbeac023ea3b37dc05408a3eddd5e906c33a810bad57

                        SHA512

                        069e42edf3b4d001392f4a44bd9cf0562a63783c3de90e939f4fbd24404448a7ec7a202bb04a1a37305ac94a3d288d2e652dfee0ceba5c8ed14a2e8639d4fa4c

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Documents\EnterAssert.xlsx

                        Filesize

                        12KB

                        MD5

                        788f515dcd99276d423112e6e5971e70

                        SHA1

                        4bd0bfc15aa89f821f88e8319c2b5a265625bda3

                        SHA256

                        2bb014100f3caa50ce5013e4f093b078e2e6adc27eb39662944d38fe53af3add

                        SHA512

                        03cd468f42218572b69811b5d42059b645c4e4e7728b5112e2bbfc804fb403dfea865ade9ef1d91afe1e2f84aaa9f6157c2a39c9a0d0b00f830e1a6de7e36ad1

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Documents\ExpandClose.docx

                        Filesize

                        13KB

                        MD5

                        f74554c23a0b7b870156e14472b40435

                        SHA1

                        a36cd8e10b4b890102d2fbc534c5decc4fd0241a

                        SHA256

                        05ba1717f5c0e40f87ba6c6499d22eb249a2ddb4dfd052c724be96af80acaa63

                        SHA512

                        922e1df4f09ea3f70dbce8aa4267f2665a254ba00dea35592cddc9816746d6122b16f5de8bd6c04e5b59dee7c469238921a214c048542d37c4261e81765eac9e

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Documents\MountShow.csv

                        Filesize

                        474KB

                        MD5

                        363e816da7a4e7e52a5a8bfa9a35bc03

                        SHA1

                        3ee768bd19ef2558715158a85fe16e647b49bf40

                        SHA256

                        bcb3cb2b57c8447bd8e5c0a61cba27c5d314bb5dabac2e4bbfd40faad536b7ff

                        SHA512

                        9240813bfef3ade6aaaeca000f5de8a8128698d9524c8dd97388b68f25cc115c350c5f1380400563481ab89c6498170191c41a471dc4723f2a68700ff4bc820f

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Documents\RestoreHide.xls

                        Filesize

                        775KB

                        MD5

                        c525f8deee804d3941822a757da3b65d

                        SHA1

                        f35845736d4fe5dbddc96566d448aaeefed9debe

                        SHA256

                        7663688aa7a0f336c19334466e52fc6cad67cd7d7f838b0b239b771857495d07

                        SHA512

                        f2fcf84231cd83e72d04441ad70d55f9184ca6a538c15eeff4d862893c37f62ab48b12ac920bfd5ad01d1aaeba31278776e69f7038a39b64a393849953a298da

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Documents\ShowProtect.csv

                        Filesize

                        566KB

                        MD5

                        b2b4bc9279962aff7c5532f4ae80d897

                        SHA1

                        4dac206128dbcaea22f4b7db4d01db6389dd692c

                        SHA256

                        12ce211d62527387d48a929bea844a4b349029258ab41a1f60b13e344887a8ff

                        SHA512

                        ceab9ab0ecc1cdc5d350609bf5c0cb1d4ce7fe2129c5c62f22703d3944cbd3bbda6263f03f332eddef4325d0fa88b7a249c583d70f5d5670f8bb13e6902172b8

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Documents\SplitMerge.docx

                        Filesize

                        705KB

                        MD5

                        fe45e16811ed5a486fe51848e90dca6c

                        SHA1

                        88ad6598f6e31af5f538da126b33fc1ee15cea98

                        SHA256

                        08f7fd6eff126493b3a1e7542a35734b35125a0ae50747dc02cb8c2984d1fa46

                        SHA512

                        c6c9bae66093f7d8d215aafab483fe9fd86917fdd0e80da38167b4fd9bc59c75aa3138fd257a266bdfce496f24612789878ac48cbb6047064f0f5f7f7b13cd77

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Documents\SwitchTrace.docx

                        Filesize

                        682KB

                        MD5

                        b645da1b7ff6702330ac9a981e15c91d

                        SHA1

                        925672f6206c0cb7831e30275beadad244e55cdc

                        SHA256

                        1a07632795a56b2bd440b30d19782cc29863bb182c2a2230c4f9a51c9f57e256

                        SHA512

                        b7d979cef97941524a99ae9377849ef36c4a35f1c70ca8c0963f6ea744f4b03a17db50120f1d1a6124404fb2da27c68f8a1acabe002a1ca0a0902b8117b0dab1

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Downloads\BackupDebug.xlsx

                        Filesize

                        579KB

                        MD5

                        923be8de1e5262d4603f8ca587af6977

                        SHA1

                        eaa0ad1f2d861191250a1bd6ef140d1ac5c49c8b

                        SHA256

                        9e67df3fd74b650861701c52608e1039e918e58b9c31800b847f89eeb3affd58

                        SHA512

                        537dc6789a6e2302dc9507c334b62e736f1e8dd8b59751f3dde1aa8f2cc2317541f6494279d0a19edddd3f833f8be4f1c25f31062867be92d4421a3d6ea09fa3

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Downloads\BackupUndo.DVR

                        Filesize

                        611KB

                        MD5

                        575b80059d5048bb2288a0c5573e8219

                        SHA1

                        03b21500b4edcdcb0fd8d2bd0fb61e4188c40d5b

                        SHA256

                        1eef67bc44b50f869f3972c98096342b9fbed8305eaba7ef54ec0fc0bdaca26a

                        SHA512

                        1a2733f4a617d7bf241a0bd1d90f9b99af66438c68a254c8eacdc6a2407b721d5a62a5b6c969ffc4883d8c3e264037aca110d0dc882875540065298ea5307f81

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Downloads\HideBackup.pps

                        Filesize

                        436KB

                        MD5

                        14e28128918b01bf9034400cd7bf7c9c

                        SHA1

                        9c8ad888a0da3c2b50335fc92fddfc5e73f6e32f

                        SHA256

                        ef1d1f282069ba181ebf3d96a889fc48a7ef48f6f9a19f2bb7d784fb93bc3691

                        SHA512

                        2d4bf24beb8cd69405445ffe30786101abb4b65d5ba0e035842595674d6c9cd2ecbab9358c69421652a1389278af9319a7dc25c9caf4b650af0a02fea583cd43

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Downloads\MoveSuspend.jpg

                        Filesize

                        325KB

                        MD5

                        060f8e49bcadc78475aebe351e6cee6b

                        SHA1

                        bad77ec4416209d25ddfd4716d498e87077d1629

                        SHA256

                        4f3559bb6e1fe308352520b2e39d8c91f5a06c1ea9431463dbfac3eedecf3dbd

                        SHA512

                        1176e65c2c76a7c022c0d39d70ad7279b5a536578d1e929b78281691a6c14d99597cf88d5d1018a385cc86c7a005030a89b00bdd889d4234373b85c68136c7bf

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Downloads\RemoveAdd.xls

                        Filesize

                        373KB

                        MD5

                        489820e145c7d44946b74431f2297feb

                        SHA1

                        e0506d3005d8f34d1410d15d00228086325425a1

                        SHA256

                        f5bf6e9a5dbf44fba09a8e366c3a3cc709b663ce182a93090b0b67186110db55

                        SHA512

                        f4ce8a8e0a8262059cfe9cb05a9c08a86df7fd45a20dec05493db1e7f0e76b7d6ca483146140c4d1a2a65e68bcf3eb1e38e57203860f5a515ff75b3aa34a78bc

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Downloads\RequestRestart.csv

                        Filesize

                        405KB

                        MD5

                        b5e2653cfb0ebe2769b001d228133480

                        SHA1

                        19d3e9398637275ef09becbb38d530ae49578607

                        SHA256

                        b838ed10a94b3beb7c696593b37b20ebb4ebde781db0fc6e97523e70c31723c7

                        SHA512

                        d5c7cc37217933e6dd6dedb0e9712da4c2b0b47544edec01b4f8e1e14aaa0860d7716ae33fc7577d9f975e2f49b9b4953ccaa1be51cb1c81656a97f41c052e24

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Downloads\SetResume.png

                        Filesize

                        484KB

                        MD5

                        f71d6ebf7931c780c738d1823a3ad34d

                        SHA1

                        88b698cabfeafac9a7ec0bc8a807797d4550fcef

                        SHA256

                        adb180f7b874b1fee1c7d5c9bc6a2d068778e19a06f2aab8a8effa3f0ef315b2

                        SHA512

                        e2e90951d344d02d66d4746b8386d066e342d9eff93056079de04950c0f3dd0a8872a3df965eb10551d9ffd0dd1f0f2f31c4780c97eb1e534f3168b6f2e2d20c

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Music\UnpublishNew.txt

                        Filesize

                        333KB

                        MD5

                        b8bf2a447d02f8b16568daf60ae49f0f

                        SHA1

                        5b7034f48e90fba39a0e67b2e9172909304a498b

                        SHA256

                        0309950f92b72eb78ec7869b9c9516ae77567c5d835588d97fe331f82eb2c1f1

                        SHA512

                        ccf5a0f6eef35a04e9a476cfbf55f9f0b9e3093ab316bce01ce1f95c48777846f01da8e36b050a4dcda1af5716afe008300f133cd94ed0512dbf9361bf9d2414

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Pictures\My Wallpaper.jpg

                        Filesize

                        24KB

                        MD5

                        a51464e41d75b2aa2b00ca31ea2ce7eb

                        SHA1

                        5b94362ac6a23c5aba706e8bfd11a5d8bab6097d

                        SHA256

                        16d5506b6663085b1acd80644ffa5363c158e390da67ed31298b85ddf0ad353f

                        SHA512

                        b2a09d52c211e7100e3e68d88c13394c64f23bf2ec3ca25b109ffb1e1a96a054f0e0d25d2f2a0c2145616eabc88c51d63023cef5faa7b49129d020f67ab0b1ff

                      • C:\Users\Admin\AppData\Local\Temp\​  ‏​    ‎\Common Files\Pictures\RepairShow.jpeg

                        Filesize

                        1.0MB

                        MD5

                        5859e010b15d6739b5aba061c6a50475

                        SHA1

                        d450f1d2001d28aba8fc31236a7d1b89f2d1ea17

                        SHA256

                        3344669ccd4f999678d9925637f5f7f081cc71c1b8dfdab1cbccc39c493b7453

                        SHA512

                        eedd32d98321cd0e1bf3abc887446a311ff4aab385ac9073919949c7e0d505757c7b77475a0b0624d31555d3042232047e34027dc74fbf890975c58e3a13caff

                      • memory/1388-64-0x00007FF8D04D0000-0x00007FF8D04DD000-memory.dmp

                        Filesize

                        52KB

                      • memory/1388-62-0x00007FF8CC6D0000-0x00007FF8CC6E9000-memory.dmp

                        Filesize

                        100KB

                      • memory/1388-56-0x00007FF8D04F0000-0x00007FF8D0509000-memory.dmp

                        Filesize

                        100KB

                      • memory/1388-48-0x00007FF8D2450000-0x00007FF8D245F000-memory.dmp

                        Filesize

                        60KB

                      • memory/1388-29-0x00007FF8D0230000-0x00007FF8D0254000-memory.dmp

                        Filesize

                        144KB

                      • memory/1388-160-0x00007FF8CFFE0000-0x00007FF8CFFFF000-memory.dmp

                        Filesize

                        124KB

                      • memory/1388-58-0x00007FF8CFFE0000-0x00007FF8CFFFF000-memory.dmp

                        Filesize

                        124KB

                      • memory/1388-60-0x00007FF8BCE00000-0x00007FF8BCF71000-memory.dmp

                        Filesize

                        1.4MB

                      • memory/1388-71-0x00007FF8BCD40000-0x00007FF8BCDF8000-memory.dmp

                        Filesize

                        736KB

                      • memory/1388-70-0x00007FF8BD390000-0x00007FF8BD7FE000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/1388-66-0x00007FF8CC6A0000-0x00007FF8CC6CE000-memory.dmp

                        Filesize

                        184KB

                      • memory/1388-54-0x00007FF8CC890000-0x00007FF8CC8BD000-memory.dmp

                        Filesize

                        180KB

                      • memory/1388-177-0x00007FF8CC6D0000-0x00007FF8CC6E9000-memory.dmp

                        Filesize

                        100KB

                      • memory/1388-81-0x00007FF8D04F0000-0x00007FF8D0509000-memory.dmp

                        Filesize

                        100KB

                      • memory/1388-78-0x00007FF8CC680000-0x00007FF8CC694000-memory.dmp

                        Filesize

                        80KB

                      • memory/1388-79-0x00007FF8BC8A0000-0x00007FF8BC9B8000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/1388-80-0x00007FF8CE510000-0x00007FF8CE51D000-memory.dmp

                        Filesize

                        52KB

                      • memory/1388-73-0x00007FF8BC9C0000-0x00007FF8BCD35000-memory.dmp

                        Filesize

                        3.5MB

                      • memory/1388-74-0x00007FF8D0230000-0x00007FF8D0254000-memory.dmp

                        Filesize

                        144KB

                      • memory/1388-72-0x0000019239830000-0x0000019239BA5000-memory.dmp

                        Filesize

                        3.5MB

                      • memory/1388-25-0x00007FF8BD390000-0x00007FF8BD7FE000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/1388-176-0x00007FF8BCE00000-0x00007FF8BCF71000-memory.dmp

                        Filesize

                        1.4MB

                      • memory/1640-82-0x00000205DAB50000-0x00000205DAB72000-memory.dmp

                        Filesize

                        136KB