Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27/11/2024, 01:09

Errors

Reason
Machine shutdown

General

  • Target

    WindowsDefender.exe

  • Size

    205KB

  • MD5

    53cb889affead37778d2ef39092d91da

  • SHA1

    91820167c3b4065d07916adb0b56a867da1a68e9

  • SHA256

    946cc4d31bbc501fa25c2b22efc8e07cd0ea326b276333600f98c33689d407df

  • SHA512

    4cc5cbedf7a36a271e405bed1fb4beedde2c9e12e79e3100acd61b0160a9ad5f57c363457601104956f79327d7562944db8c4ae17e416fd27b0b6a39dd77d5c6

  • SSDEEP

    768:BLzayT8ljccym5fCja4sYxE7FWPA9pHOMhna4OE3QjFMtUiLi8PqXhP5++:BLzgAcJ5fzFJ9pHOM1ZOE3cMt/P85U+

Malware Config

Extracted

Family

xworm

Version

5.0

C2

anything-talked.gl.at.ply.gg:7897

Mutex

eSQIhPW4koQzrFdT

Attributes
  • Install_directory

    %AppData%

  • install_file

    Regedit.exe

aes.plain

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

almost-visitor.gl.at.ply.gg:7995

Mutex

e8e985a7-62a2-410d-91ea-7249972738eb

Attributes
  • encryption_key

    578EFB451288E8CFFF8CB67C63A1530F061DDBCD

  • install_name

    WindowsDefender.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows.Defender.exe

  • subdirectory

    SubDir

Signatures

  • Detect Xworm Payload 1 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Modifies system executable filetype association 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 7 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies Control Panel 1 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Modifies registry class 4 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 43 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe
    "C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Users\Admin\AppData\Local\Temp\fujtxz.exe
      "C:\Users\Admin\AppData\Local\Temp\fujtxz.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "Windows.Defender.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsDefender.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:732
      • C:\Users\Admin\AppData\Roaming\SubDir\WindowsDefender.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\WindowsDefender.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks" /create /tn "Windows.Defender.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsDefender.exe" /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1364
    • C:\Users\Admin\AppData\Local\Temp\gocgpr.exe
      "C:\Users\Admin\AppData\Local\Temp\gocgpr.exe"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Checks whether UAC is enabled
      • Modifies WinLogon
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • System policy modification
      PID:240
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\hello.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:748
        • C:\Windows\SysWOW64\attrib.exe
          attrib +s +h C:\hello.png
          4⤵
          • Sets file to hidden
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2596
        • C:\Windows\SysWOW64\attrib.exe
          attrib +s +h C:\hello.bat
          4⤵
          • Sets file to hidden
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2648
        • C:\Windows\SysWOW64\net.exe
          net user Admin death
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3592
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 user Admin death
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4928
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic useraccount where name='Admin' rename 'NO ESCAPE'
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2704
        • C:\Windows\SysWOW64\takeown.exe
          takeown /f "C:\ProgramData\Microsoft\User Account Pictures" /r /d y
          4⤵
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:1796
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy *.png "C:\ProgramData\Microsoft\User Account Pictures\"
          4⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          PID:4588
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy *.bmp "C:\ProgramData\Microsoft\User Account Pictures\"
          4⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          PID:992
        • C:\Windows\SysWOW64\regedit.exe
          regedit /s C:\Windows\System32\hello.reg
          4⤵
          • System Location Discovery: System Language Discovery
          • Runs .reg file with regedit
          PID:4816
        • C:\Windows\SysWOW64\regedit.exe
          regedit -s C:\Windows\System32\hello.reg
          4⤵
          • System Location Discovery: System Language Discovery
          • Runs .reg file with regedit
          PID:3496
        • C:\Windows\SysWOW64\shutdown.exe
          shutdown /t 0 /r
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4536
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8e46cc40,0x7fff8e46cc4c,0x7fff8e46cc58
      2⤵
        PID:2144
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1840,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1832 /prefetch:2
        2⤵
          PID:4608
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2124,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2136 /prefetch:3
          2⤵
            PID:2120
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2208 /prefetch:8
            2⤵
              PID:2412
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:1
              2⤵
                PID:3348
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3168,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:1
                2⤵
                  PID:3424
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3784,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3436 /prefetch:1
                  2⤵
                    PID:1888
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4744,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4756 /prefetch:8
                    2⤵
                      PID:4448
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4788,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4752 /prefetch:8
                      2⤵
                        PID:3420
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level
                        2⤵
                        • Drops file in Windows directory
                        PID:3408
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff6ab344698,0x7ff6ab3446a4,0x7ff6ab3446b0
                          3⤵
                          • Drops file in Windows directory
                          PID:2136
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level
                        2⤵
                        • Drops file in Windows directory
                        PID:3372
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff6ab344698,0x7ff6ab3446a4,0x7ff6ab3446b0
                          3⤵
                          • Drops file in Windows directory
                          PID:1980
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                      1⤵
                        PID:420
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                        1⤵
                          PID:1144
                        • C:\Windows\system32\LogonUI.exe
                          "LogonUI.exe" /flags:0x4 /state0:0xa3a13055 /state1:0x41c64e6d
                          1⤵
                          • Modifies data under HKEY_USERS
                          • Suspicious use of SetWindowsHookEx
                          PID:3256

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                          Filesize

                          649B

                          MD5

                          367eedf178d600d9c648d347ed2ffc39

                          SHA1

                          cd34da174885d61f6aeeb3f692a331daf4987b9b

                          SHA256

                          b2623696c098367454a36183e5f9db768bfa99f552af76c0d516653c1d6b28ef

                          SHA512

                          affd39e2d88c080bbb1454f4da98b6ec260bd2976d939f20a6e63ce2f51d0be357c43e24b761c8986953879ad18418a93b41e8307a0e0dfa9ee5e81399babe3c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          356B

                          MD5

                          a126eb8f326a86cfeb8d06565620beae

                          SHA1

                          6b6338740e65af31bada082e57951fe8198451b7

                          SHA256

                          d387eea04005863bafb508522f2f4e35f9fd822c1a3ac4aaa590ecb2ae811e4b

                          SHA512

                          2abf421376d6eb34a1b518a1bb87d9b5783fe6b42e16d66d895934ed416e90db5f20136b065f462b515374ce4d4d9ac176d19a28921f58361944a0c826cc9a1a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          18aec9301fc367c9ef27ca83987f4bd8

                          SHA1

                          ebaa0c1d9a6ac89f94b489aede0aa4071773b2e9

                          SHA256

                          2fe425e455c1b08fd470f948b796cb226516e28299e5259ccbb66dc957d6674c

                          SHA512

                          5760e1b57c8cb2e1cbac95e6417471ed07ea1f97e54ce58c9d4373b97c52deceb69bd5a21e3a8b507eb00d6d432928dd2f4ac8d48bcdd8cc5ac65282c9cdb4e8

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          49d766f5d8c9f992b44de46b054e55b4

                          SHA1

                          7aee5ed302554aa1c4e1a194c2f99680ad7a2e6b

                          SHA256

                          072c544eece4b4503bae17ca760e83b4e20e59029ea91ae56470ffa278015c82

                          SHA512

                          8217ca2cb263e7c4c642bca0162df57aa72ef050c2b143395a20e3115d3904bab5f79723598ac9bd05ab386acf42817a0cd257c9c6a3a524b8492d7d78e4128d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                          Filesize

                          15KB

                          MD5

                          c9420ebe8890134ba0fd079140386e2d

                          SHA1

                          375caea9b4f9ff7b92d3b1d7d9c6345ab1b7db2e

                          SHA256

                          f0e1c63a7f1b390c1566a8d1af0dab78940dd398c17e58b43fab2ef7b9558337

                          SHA512

                          e294d614dbb1cd36cb11f260b09a6ec602508a77da2cf3ca8d92b1c0d74da9a71dcbd526db84db5bde311de8aed34ff7cec63daa18f33fd07dc81c07db36d184

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          234KB

                          MD5

                          747b9e9a08690fdd7eebc688f36d38bc

                          SHA1

                          89b341d15a05d45b27a5447699df0764c5a6f5fb

                          SHA256

                          13e631af6975ca49a360769a817aaeecd6a77151dfbba6fc32ea5df1907fc3d4

                          SHA512

                          7420877beea2eec2237b785a8843b77ecd03fb02ef6ced7f911cee1cfd963d34d545eedca72effbc437b86e4f15f25b703b489964e1cbad6c113f06ad44f82dd

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          234KB

                          MD5

                          e0d94f288c2c79b1ffccd5ac0c84c51e

                          SHA1

                          c883fe36d489767c434585a6659dd757e2c216d3

                          SHA256

                          8cdc21e2b6dc532e45a02e087c62abe0599f71035e30209eb9e7c0e5d29ae97b

                          SHA512

                          7f8047a43b0fb1c2cb7630d5c402a330bd990e466eddf9f42257d0f977f02ecaff4d7c129612a56b102f986d83d06b8e1f64e9503e3ecf807eabc2e21505586e

                        • C:\Users\Admin\AppData\Local\Temp\fujtxz.exe

                          Filesize

                          3.3MB

                          MD5

                          294933bde06bb391ab58b1348963a1ce

                          SHA1

                          9cd13906dfe58080bdb81fca7807a8319c25d297

                          SHA256

                          cd93b524f9463609246992479e72e71cf0ca803330b9f4d3dfabcf57b9c2c604

                          SHA512

                          2256285a6da8549cc728908f1a7722b98554a5878a553153e7944ce945855481711eec182524d0bf36ed15ebbfd7c5764c82dbfe865c637f36d9c2a71dead2ae

                        • C:\Users\Admin\AppData\Local\Temp\gocgpr.exe

                          Filesize

                          1.0MB

                          MD5

                          cdbb54a3ec888c3eac84deaa408f7b8a

                          SHA1

                          4478842748db03e2e3879ac6a3854a82e30c845d

                          SHA256

                          cccc326adf56026fa3e5efba505a6f51c091d7362b8cd68b322d301300aa6615

                          SHA512

                          2abc533172ae2024fcde9fa8b407256e5341593c70912e42020ea7fe2b1d195b586039703c0b7e24964061bfbfb3a352fa8e7e158a53e50fa142397a594739d4

                        • C:\Users\Public\Desktop\5.txt

                          Filesize

                          67B

                          MD5

                          c0d310f6a15d755a8fb4f3f4f6183d58

                          SHA1

                          758926be23dc768f494f7dd229b9d9f152926f9e

                          SHA256

                          b0e0514242246a453eae64811bdb6dd50c69e056d0e9c1b9c674168befc51048

                          SHA512

                          85bca4d2c02985efc8530a446baff8f9a5dcf15352c87a5ce71f91de7877fb54f1a1e079b70928e718a77f3f3457057d46c8d03cc4316ae774f07d2a00d29d6d

                        • C:\Windows\SystemTemp\Crashpad\settings.dat

                          Filesize

                          40B

                          MD5

                          5ac7c6582d5ebcb1c1941d252d1952cd

                          SHA1

                          5ffa9403bbff25965421cdca1c3f6ccb7cf7f7ca

                          SHA256

                          6d7e3ddf29ae13df46e4f982683e2a6780cf84495571e748cb3e38fd8a8bc3bf

                          SHA512

                          dbe1bf21c2a26aef78935a6b8a81a345925717f8ebc77c0f7c3d587099e8fa430cb8374f6583caba567854e39fb9ad6c40499b3b498cba5d8a8bd3ab6116a662

                        • C:\hello.bat

                          Filesize

                          640B

                          MD5

                          3cc5890bb9c873dce0cfc8c30ec44a06

                          SHA1

                          a0417aaa590fb8efd984056a585e09b1e397c1eb

                          SHA256

                          49d4a3a85f7eac86d5388ef0fd858875c8ad4f24a8e649e0bfc802f06584d5b6

                          SHA512

                          07c0467d70dabe3d287a34c381e8a12e59ad905c995ccede55ca0da57fcda77bc37892996d2fd948e1b695529ba39fec84c807fa5b2482ea880bd2c182b2dbe4

                        • C:\hello.png

                          Filesize

                          391KB

                          MD5

                          9e655cfd3d501f1ed01d6a2e0db0e744

                          SHA1

                          481cda76b89cb4785672f598d7b59c994f7d143b

                          SHA256

                          cf7b5334e06a13501821834cd1aedb7c3306a543f7d8ec03d1f20bfaf9bed613

                          SHA512

                          5c55676d0b76429ca6408cd197a7dcad895753f3e68a73b75f141c4f193f0526476937704a32e7e051119a9cc14ce8b48baae5a8e10d3eb5e9250186cc9c5e32

                        • C:\user-192.png

                          Filesize

                          1KB

                          MD5

                          6bf949c62c5e9d07593ba5b604e36773

                          SHA1

                          1eabcd6bfd16216c7b4c0d557f072ae2f88987ca

                          SHA256

                          e54ea8405024f1fa72e470417059bdd186b0a3836f7d5e1c2c95c6003383912f

                          SHA512

                          29a53f39949994b462eb0ce68d382abcb72284573d75475ef38ad8d442d389442e60dd99e705be29ac61ffbdc3969e692482953da992bd65948b0995cb57bb07

                        • C:\user-32.png

                          Filesize

                          237B

                          MD5

                          5d572d54e293acd90d5b8ad6036333da

                          SHA1

                          cefa5e89c74f8efc602002b4f6030d8a79ca6deb

                          SHA256

                          4810dc6c101937dde12d4581de81e608ea144761d1307779dc6a256872330ede

                          SHA512

                          9ff8a451447b69e1b7596b1fd64e15fdd3e74c4a69ae7ab81eed4e21ed758f210ec18d36f87919b6c8c5e42ea291d083073a9fbfbe24fc4dfb9269803d4bb04a

                        • C:\user-40.png

                          Filesize

                          307B

                          MD5

                          d8e22ef10bd7ab65f56220d2845d6a94

                          SHA1

                          75a58eab37c76efc8d10ad77e9da17046da4707a

                          SHA256

                          b115a4548ad8e9c7cadb707a0ff79fcd55d9d900eefa7a922ca50c85c4d3ca1d

                          SHA512

                          1e72cf4e17b720e919e91af5b3ec9ea28fe693a1e1966ce4bfccf4883c3ae5228d6140010b58a684cef19fa99c9a936f9ab24be200faba48f42089d748a22378

                        • C:\user-48.png

                          Filesize

                          353B

                          MD5

                          c7572c5706ca8d652d6b87787ae7f5b2

                          SHA1

                          cda3a3b9117e6be6cb8e41a48aed58124eabfdd5

                          SHA256

                          37c63ee5d26fb77f8e697faec3891673e40c449bf8411cff806d852ae7506ada

                          SHA512

                          8cb13c1296a914a525fae134c31f75d5469af1250160b73b9f6e1fda4d16652efbc68c1a55b116f1aa877ca198155609530fa4e2683990aa57d391d125544808

                        • C:\user.bmp

                          Filesize

                          588KB

                          MD5

                          2ab3698b005b421349512142ed6b965e

                          SHA1

                          b07684e4ad4145c9be7e070a4b2826bcaf165400

                          SHA256

                          150e95da6c1e09511241130da0e376878f5e24e21c2a9dfe7fbcc1022660e29f

                          SHA512

                          40086959198afe931d8309a2526c6e4de1872ac7d55b68179450c950da67d01c0f57a8a07b782316e888165c1694f558699bbcbc5457743f2c1d3bcc3a3beece

                        • C:\user.png

                          Filesize

                          1KB

                          MD5

                          96f17c361a25164e71716d5bb56cb3d8

                          SHA1

                          0e0792716a58e38f87de25929122339c6ce9f1f8

                          SHA256

                          1025314ef977b5d07041b8b73e4adbea779e5e06096c3c66bd1f06fbbba7fd1c

                          SHA512

                          95691ffbb5ee0b2e86489aa4abd58059fc4c46bd267995ef2df1611e7ac256ab2ccc67bbd2255359bf6ec9c0d7af7177ec39f36fc9478901d68947028af5b66a

                        • memory/2020-38-0x000000001DA00000-0x000000001DF28000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/2020-34-0x000000001C800000-0x000000001C812000-memory.dmp

                          Filesize

                          72KB

                        • memory/2020-31-0x000000001C840000-0x000000001C8F2000-memory.dmp

                          Filesize

                          712KB

                        • memory/2020-30-0x000000001C730000-0x000000001C780000-memory.dmp

                          Filesize

                          320KB

                        • memory/2020-35-0x000000001D090000-0x000000001D0CC000-memory.dmp

                          Filesize

                          240KB

                        • memory/2312-8-0x00007FFF95450000-0x00007FFF95F12000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2312-0-0x00007FFF95453000-0x00007FFF95455000-memory.dmp

                          Filesize

                          8KB

                        • memory/2312-7-0x00007FFF95453000-0x00007FFF95455000-memory.dmp

                          Filesize

                          8KB

                        • memory/2312-10-0x00000000010B0000-0x00000000010BC000-memory.dmp

                          Filesize

                          48KB

                        • memory/2312-6-0x00007FFF95450000-0x00007FFF95F12000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2312-1-0x00000000006B0000-0x00000000006E8000-memory.dmp

                          Filesize

                          224KB

                        • memory/2312-324-0x00007FFF95450000-0x00007FFF95F12000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2588-22-0x00000000009B0000-0x0000000000CFE000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/2588-21-0x00007FFF95450000-0x00007FFF95F12000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2588-23-0x00007FFF95450000-0x00007FFF95F12000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2588-29-0x00007FFF95450000-0x00007FFF95F12000-memory.dmp

                          Filesize

                          10.8MB