Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

22/01/2025, 20:53

250122-zpjvpsvncs 10

22/01/2025, 09:50

250122-ltw4ya1lfk 10

Analysis

  • max time kernel
    34s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2025, 09:50

General

  • Target

    Built.exe

  • Size

    7.5MB

  • MD5

    7ce3567dcb7115e1f2cf553e6f3c4ab0

  • SHA1

    242ba3811ddd2c97c4cae5be0604f9a144516942

  • SHA256

    fc44a24eefaec30ccbcc0fbd57217a10b12e2df75ffade81405d166c97899174

  • SHA512

    218e3b7b70150474d293b98a9d95ffdd893ed329e96cd3ed995e0213d5bd6066915cfd5b985eaa03e01602ff42f66c509bff81c74d84e0998904ddd752e30b5f

  • SSDEEP

    196608:l1unqZ8ywfI9jUC2XMvH8zPjweaBpZ0cX9ooccXK7odAxv:qtIH2XgHq+jq+3YoC

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • UPX packed file 57 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Built.exe
    "C:\Users\Admin\AppData\Local\Temp\Built.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\Built.exe
      "C:\Users\Admin\AppData\Local\Temp\Built.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Built.exe'"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5068
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Built.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3720
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2160
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1920
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:4664
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1068
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:676
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
        3⤵
        • System Network Configuration Discovery: Wi-Fi Discovery
        • Suspicious use of WriteProcessMemory
        PID:4228
        • C:\Windows\system32\netsh.exe
          netsh wlan show profile
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:2288
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI26962\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\j4eJx.zip" *"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4048
        • C:\Users\Admin\AppData\Local\Temp\_MEI26962\rar.exe
          C:\Users\Admin\AppData\Local\Temp\_MEI26962\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\j4eJx.zip" *
          4⤵
          • Executes dropped EXE
          PID:4384
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "wmic os get Caption"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3700
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic os get Caption
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4380
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic computersystem get totalphysicalmemory
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3076
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4952
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic csproduct get uuid
          4⤵
            PID:4552
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2988
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:3736
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2548
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic path win32_VideoController get name
            4⤵
            • Detects videocard installed
            PID:3752
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3668
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4428
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1904

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d85ba6ff808d9e5444a4b369f5bc2730

        SHA1

        31aa9d96590fff6981b315e0b391b575e4c0804a

        SHA256

        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

        SHA512

        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        d28a889fd956d5cb3accfbaf1143eb6f

        SHA1

        157ba54b365341f8ff06707d996b3635da8446f7

        SHA256

        21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

        SHA512

        0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\VCRUNTIME140.dll

        Filesize

        117KB

        MD5

        862f820c3251e4ca6fc0ac00e4092239

        SHA1

        ef96d84b253041b090c243594f90938e9a487a9a

        SHA256

        36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

        SHA512

        2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\_bz2.pyd

        Filesize

        48KB

        MD5

        1d9398c54c80c0ef2f00a67fc7c9a401

        SHA1

        858880173905e571c81a4a62a398923483f98e70

        SHA256

        89006952bee2b38d1b5c54cc055d8868d06c43e94cd9d9e0d00a716c5f3856fa

        SHA512

        806300d5820206e8f80639ccb1fba685aafa66a9528416102aeb28421e77784939285a88a67fad01b818f817a91382145322f993d855211f10e7ba3f5563a596

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\_ctypes.pyd

        Filesize

        59KB

        MD5

        2401460a376c597edce907f31ec67fbc

        SHA1

        7f723e755cb9bfeac79e3b49215dd41fdb5c2d90

        SHA256

        4f3f99b69834c43dac5c3f309cb0bd56c07e8c2ac555de4923fa2ddc27801960

        SHA512

        9e77d666c6b74cfb6287775333456cce43feb51ec39ad869c3350b1308e01ad9b9c476c8fa6251fe8ad4ab1175994902a4ad670493b95eb52adb3d4606c0b633

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\_decimal.pyd

        Filesize

        107KB

        MD5

        df361ea0c714b1a9d8cf9fcf6a907065

        SHA1

        102115ec2e550a8a8cad5949530cca9993250c76

        SHA256

        f78ee4524eb6e9885b9cbdb125b2f335864f51e9c36dc18fdccb5050926adffe

        SHA512

        b1259df9167f89f8df82bda1a21a26ee7eb4824b97791e7bbaa3e57b50ae60676762fd598c8576d4e6330ffaf12972a31db2f17b244c5301dcf29fe4abfba43f

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\_hashlib.pyd

        Filesize

        35KB

        MD5

        d4c05f1c17ac3eb482b3d86399c9baae

        SHA1

        81b9a3dd8a5078c7696c90fbd4cf7e3762f479a5

        SHA256

        86bd72b13a47693e605a0de1112c9998d12e737644e7a101ac396d402e25cf2f

        SHA512

        f81379d81361365c63d45d56534c042d32ee52cad2c25607794fe90057dcdeeb2b3c1ff1d2162f9c1bdf72871f4da56e7c942b1c1ad829c89bf532fb3b04242e

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\_lzma.pyd

        Filesize

        86KB

        MD5

        e0fa126b354b796f9735e07e306573e1

        SHA1

        18901ce5f9a1f6b158f27c4a3e31e183aa83251b

        SHA256

        e0dc01233b16318cd21ca13570b8fdf4808657ec7d0cc3e7656b09ccf563dc3e

        SHA512

        dd38100889c55bffc6c4b882658ecd68a79257bc1ffd10f0f46e13e79bff3fc0f908ae885cc4a5fed035bd399860b923c90ef75e203b076b14069bf87610f138

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\_queue.pyd

        Filesize

        26KB

        MD5

        84aa87c6dd11a474be70149614976b89

        SHA1

        c31f98ec19fc36713d1d7d077ad4176db351f370

        SHA256

        6066df940d183cf218a5053100e474d1f96be0a4e4ee7c09b31ea303ff56e21b

        SHA512

        11b9f8e39c14c17788cc8f1fddd458d70b5f9ef50a3bdb0966548ddcb077ff1bf8ca338b02e45ec0b2e97a5edbe39481dd0e734119bc1708def559a0508adc42

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\_socket.pyd

        Filesize

        44KB

        MD5

        1d982f4d97ee5e5d4d89fe94b7841a43

        SHA1

        7f92fe214183a5c2a8979154ece86aad3c8120c6

        SHA256

        368cf569adc4b8d2c981274f22181fea6e7ce4fa09b3a5d883b0ff0ba825049d

        SHA512

        9ecdcf9b3e8dc7999d2fa8b3e3189f4b59ae3a088c4b92eaa79385ed412f3379ebe2f30245a95d158051dbd708a5c9941c150b9c3b480be7e1c2bba6dea5cb24

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\_sqlite3.pyd

        Filesize

        57KB

        MD5

        3911ae916c6e4bf99fe3296c3e5828ca

        SHA1

        87165cbf8ea18b94216ac2d1ffe46f22eddb0434

        SHA256

        3ec855c00585db0246b56f04d11615304931e03066cb9fc760ed598c34d85a1f

        SHA512

        5c30ed540fdfa199cdf56e73c9a13e9ac098f47244b076c70056fd4bf46f5b059cb4b9cdb0e03568ca9c93721622c793d6c659704af400bd3e20767d1893827e

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\_ssl.pyd

        Filesize

        66KB

        MD5

        68e9eb3026fa037ee702016b7eb29e1b

        SHA1

        60c39dec3f9fb84b5255887a1d7610a245e8562e

        SHA256

        2ae5c1bdd1e691675bb028efd5185a4fa517ac46c9ef76af23c96344455ecc79

        SHA512

        50a919a9e728350005e83d5dd51ebca537afe5eb4739fee1f6a44a9309b137bb1f48581bafa490b2139cf6f035d80379bf6ffcdff7f4f1a1de930ba3f508c1af

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\base_library.zip

        Filesize

        1.3MB

        MD5

        bed03063e08a571088685625544ce144

        SHA1

        56519a1b60314ec43f3af0c5268ecc4647239ba3

        SHA256

        0d960743dbf746817b61ff7dd1c8c99b4f8c915de26946be56118cd6bedaebdc

        SHA512

        c136e16db86f94b007db42a9bf485a7c255dcc2843b40337e8f22a67028117f5bd5d48f7c1034d7446bb45ea16e530f1216d22740ddb7fab5b39cc33d4c6d995

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\blank.aes

        Filesize

        108KB

        MD5

        1ed093dcae397369e5cef8cd5c6c468e

        SHA1

        149df20c2d6360e4dee6661c0d3d977387bcce80

        SHA256

        755c67b014c7012f736c35f978fe92db2ecb3c7bf1ec08d6492e8898bb15f954

        SHA512

        6b473735614ee2457bf1a7e9eee78dd956b977923068efcecef4aa2f386e8c2c8e230ba522e803be74bb5ad5d269b3ccb095a877f1d650f2862201ba8b726959

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\libcrypto-3.dll

        Filesize

        1.6MB

        MD5

        8377fe5949527dd7be7b827cb1ffd324

        SHA1

        aa483a875cb06a86a371829372980d772fda2bf9

        SHA256

        88e8aa1c816e9f03a3b589c7028319ef456f72adb86c9ddca346258b6b30402d

        SHA512

        c59d0cbe8a1c64f2c18b5e2b1f49705d079a2259378a1f95f7a368415a2dc3116e0c3c731e9abfa626d12c02b9e0d72c98c1f91a359f5486133478144fa7f5f7

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\libffi-8.dll

        Filesize

        29KB

        MD5

        08b000c3d990bc018fcb91a1e175e06e

        SHA1

        bd0ce09bb3414d11c91316113c2becfff0862d0d

        SHA256

        135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

        SHA512

        8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\libssl-3.dll

        Filesize

        221KB

        MD5

        b2e766f5cf6f9d4dcbe8537bc5bded2f

        SHA1

        331269521ce1ab76799e69e9ae1c3b565a838574

        SHA256

        3cc6828e7047c6a7eff517aa434403ea42128c8595bf44126765b38200b87ce4

        SHA512

        5233c8230497aadb9393c3ee5049e4ab99766a68f82091fe32393ee980887ebd4503bf88847c462c40c3fc786f8d179dac5cb343b980944ade43bc6646f5ad5a

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\python312.dll

        Filesize

        1.7MB

        MD5

        2996cbf9598eb07a64d66d4c3aba4b10

        SHA1

        ac176ab53cdef472770d27a38db5bd6eb71a5627

        SHA256

        feba57a74856dedb9d9734d12c640ca7f808ead2db1e76a0f2bcf1e4561cd03f

        SHA512

        667e117683d94ae13e15168c477800f1cd8d840e316890ec6f41a6e4cefd608536655f3f6d7065c51c6b1b8e60dd19aa44da3f9e8a70b94161fd7dc3abf5726c

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\rar.exe

        Filesize

        615KB

        MD5

        9c223575ae5b9544bc3d69ac6364f75e

        SHA1

        8a1cb5ee02c742e937febc57609ac312247ba386

        SHA256

        90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

        SHA512

        57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\rarreg.key

        Filesize

        456B

        MD5

        4531984cad7dacf24c086830068c4abe

        SHA1

        fa7c8c46677af01a83cf652ef30ba39b2aae14c3

        SHA256

        58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

        SHA512

        00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\select.pyd

        Filesize

        25KB

        MD5

        0433850f6f3ddd30a85efc839fbdb124

        SHA1

        07f092ae1b1efd378424ba1b9f639e37d1dc8cb9

        SHA256

        290c0a19cd41e8b8570b8b19e09c0e5b1050f75f06450729726193cf645e406c

        SHA512

        8e785085640db504496064a3c3d1b72feab6b3f0bc33676795601a67fcf410baa9a6cd79f6404829b47fd6afcd9a75494d0228d7109c73d291093cd6a42447ff

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\sqlite3.dll

        Filesize

        643KB

        MD5

        19efdd227ee57e5181fa7ceb08a42aa1

        SHA1

        5737adf3a6b5d2b54cc1bace4fc65c4a5aafde50

        SHA256

        8a77b2c76440365ee3e6e2f589a78ad53f2086b1451b5baa0c4bfe3b6ee1c49d

        SHA512

        77db2fe6433e6a80042a091f86689186b877e28039a6aeaa8b2b7d67c8056372d04a1a8afdb9fe92cfaea30680e8afeb6b597d2ecf2d97e5d3b693605b392997

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\unicodedata.pyd

        Filesize

        295KB

        MD5

        382cd9ff41cc49ddc867b5ff23ef4947

        SHA1

        7e8ef1e8eaae696aea56e53b2fb073d329ccd9d6

        SHA256

        8915462bc034088db6fdb32a9b3e3fcfe5343d64649499f66ffb8ada4d0ad5f2

        SHA512

        4e911b5fb8d460bfe5cb09eab74f67c0f4b5f23a693d1ff442379f49a97da8fed65067eb80a8dbeedb6feebc45f0e3b03958bd920d582ffb18c13c1f8c7b4fc4

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1s4pc3df.fcd.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Desktop\BlockCheckpoint.doc

        Filesize

        371KB

        MD5

        1f1570fffa9dbeacbb3d5d339ab302ad

        SHA1

        4d3de6b702cfc2be95600670b5f374b651c2dbe4

        SHA256

        9730bd6e13352dd7b4682f136227994717c06e1f662a96d9d27edb0bcb4cdb69

        SHA512

        816c35b6886db271cc11a74964d4f4af541fbd00391f380674b65420984aab7077aa7f419137f0f40b475f1ec42cebf138a3cc79285c71d9c99cc282b7bc222e

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Desktop\InitializeFormat.mp3

        Filesize

        444KB

        MD5

        fe4a01942e62ec89ddbe54bcbfe744ea

        SHA1

        c07a020dd5321c553aab794ff86653a5935293c4

        SHA256

        536c071bcfc6a29031650e5768b19cb616c8fb3c47876485f5e7132fa6733f3a

        SHA512

        b1eca760d9032400368a393b4628376e5f7fb0a7457afc475d16ecbdda18d26541104d181ca47ba2a57f8b1cf75e1cfcaf44359abaac44baa0df99fc0806339c

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Desktop\SplitRestart.docx

        Filesize

        20KB

        MD5

        fa84c3e2e675ba4ffc5122fec3355fae

        SHA1

        292037cf8a45245085b80b7aacee98a3ed0e3268

        SHA256

        0711eec401078d5397e2f3a99df0354bf991e6dcb5d14e1c0e23f584ef8392c0

        SHA512

        9d5344c5d7bce0469f3dc0e99341de34ded1f968a546f68f2458104e36f1418422c536117c712f3ffa93fedd3643cc3c8130e12d907fe0275d21f9996d15c486

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Desktop\SuspendPop.xlsx

        Filesize

        694KB

        MD5

        b7ac127978bb8540aebabe7840639c50

        SHA1

        3b44ff05d14e1d50f275181b0ae37ff868df688c

        SHA256

        2e5def3c08dfd9b5fbf6602ea03a94406108254c788674e01b968a84aa7a0deb

        SHA512

        cef4eb02cf99d143b994ebf13981e3a63516d00c68d6cef6650dc1f8caee0d3935d25dff6b5e8f67a530a9385b9b23a9b5fe21f9293025e33a059e8ad43c49e0

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Desktop\WaitSave.docx

        Filesize

        16KB

        MD5

        d459861646ec8ff4f8e6a8e36d852c6f

        SHA1

        9118e73662f727b1163652063d9de8dd41f47cef

        SHA256

        3e32105c2ae1b7b9eb9037fc4708ad3314bb0df3c7e7ef02133fd0b461cb29dc

        SHA512

        fd163da63387b219cd1738ce3e98372ec7ecaf5cd4b4efb90f4033270697f46f351242086b990494d76204315e21d0939d037ebc2b210d55523476554bbcb184

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Documents\CompareDeny.xlsx

        Filesize

        14KB

        MD5

        cf115dbd526099c598968d96f7aa912f

        SHA1

        1d12c664257149e8db78efa42fa9721254151bf9

        SHA256

        7a79d4ef15dbe693f99154d549823a96aaab05de1e753cffde0a77a0b3321235

        SHA512

        156268e30bfe5d50aaf46dadcc3190402706506ec6339e9885bd86b391f3999e4311c6dd9343a4362967f800f48ac2b696a650d0036fe49e005f1ae6a82c48b9

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Documents\DebugDisable.docx

        Filesize

        17KB

        MD5

        6bf98aa09ee3168136bea85e25297036

        SHA1

        319209c176d78607f7b69c9fa4ee542fe64d0ba9

        SHA256

        ad9508cbe5cb010202b7a9d350608bd305534a3778befe3babcd4c85e85c7527

        SHA512

        5d37e5af1dd5c1c31fee308d8bbe12eb25d462a3e747dd91f914f5f560d45bd05dc2c31d1a3a2153bab2b905a40068df2dd6b375cf4ea0e065bf2d7caabb188b

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Documents\DisconnectLock.docx

        Filesize

        12KB

        MD5

        085ad78c447ad4939a01563455dc062a

        SHA1

        5d3ba32480845ad6d46c5d3b3c6eb67ad50d799b

        SHA256

        93102ec43ff86b67379765853542b936edd6ab07ca5e362f6e7e85c4d4951220

        SHA512

        0fa95e43d1d0328a22e08d84bde9156cc286cbd2eabb7c66bdc81ef804b02beccafe02a50b8dcf5f38366de472b94790b10dfc6efc213b96707e24b6c10286f6

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Documents\DismountDeny.csv

        Filesize

        799KB

        MD5

        44f05d3681c0b556cbbfa75f478b9f3c

        SHA1

        c991c4f5fd93cb2100edbdd9c64c743a0e62d9f5

        SHA256

        27c870a291ea4caa32588b8b5e7ef30a12b06c3848b9dc620b890aa590160be3

        SHA512

        6da5b02ec79f176825fcabdf700c7514923d32e0bb3863a0dc4203bc1fdf6da6b1cf363686391222c5e4d70b34021328a7aae6e2ad6a59bc3eb6794dfe8da5b4

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Documents\EditCompare.xlsx

        Filesize

        9KB

        MD5

        95ef7ad7e13e3dd751644f6c9dbc7b0d

        SHA1

        fba9531a28a57dbef78adc1fcf109c43d31ea760

        SHA256

        6230ce2dce853b623f6dcf4bf68c757e0188c0c9a87d76c797318bc0a44e4712

        SHA512

        fc0221981b1ac204f711a5ed973a010def09da8cb23218164c6da1657b20fc09c663e60703ab8acedfadacdaea35d78a8cfbebf4f2a9f487c017fd39cf97609f

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Documents\EnableUnlock.xlsx

        Filesize

        13KB

        MD5

        4d3a904a7999db36b2a6228380ff6c7f

        SHA1

        e1335a848d9bc5fc6b0b11b28fc0f654ff02a63f

        SHA256

        16de2f5632ddb57189fbdd2ca7c89f8612587ba646724eccbaea3ce9e84d7ccb

        SHA512

        48618cb6de1be174136a751a7ee88ad93d8f06e28ba98c35d7e3c2e38b5c1a53c115381f58dd5092a540eefbec4431271c2fdd4effb55ff709f153b10e2a9af2

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Documents\OpenStep.txt

        Filesize

        622KB

        MD5

        ba29cfce53988eff24c48ba5bc22a5e5

        SHA1

        24244d368619e9dc3414860afaccbff9bf46e3ff

        SHA256

        55ebda6ce692607ea8bf5b8d1d4131875e2ff97d3f65f0a8f20f81ccc58c4ed0

        SHA512

        e82569626575cdc68b24e97cec48d8b177faeb71c054210a2d1990286420c1f480a9f144f4d1d6db6b5234921106feeb3083e76445cecb0bf277f4b1d2df417a

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Documents\PingDeny.docx

        Filesize

        379KB

        MD5

        ae8f50e62c4322651aa11281e82a25b9

        SHA1

        870400a648b76e225ac99d4a7961391b4dfa5d87

        SHA256

        0d90ea6711e04f5bb31eb2deb1f043b3c63575226639b990b730dff049ae67a7

        SHA512

        a875e24982c21ee428959c20e19b2933614390e34fee3a2d584f314ea6fcb2b6bb6e12b192f66e9db4efac8139cbaae5a091bb41771686caefccfb2815f621df

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Documents\ResumeHide.csv

        Filesize

        670KB

        MD5

        4b0b30b46956e3e09e458440f0b2bc5a

        SHA1

        c87dd1132d27d511730ed749285e68ddff525da4

        SHA256

        8627e33ad454b19c4fcf98f5225429c2f155c44ee7ee181c11a9ad96e3bc519d

        SHA512

        0c1e0bc11b90c59661eb81b3ac6370e30a81312163230d02f10f60825b90688c310a04fcab3c73f533898d03354ab991045e0066700c7e4903a3a85da3040110

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Documents\SuspendApprove.docx

        Filesize

        15KB

        MD5

        10368c8e096fa1513f7015854d05d291

        SHA1

        e7183e46a480963ea7cfd9d91d13a58f13d1cbf3

        SHA256

        963701acd518db2c097c0988aa4ab62ab7bdd18ed2118f0ee75665ffb250d5c1

        SHA512

        f0d15c7d6e2fd1ab31dad58aa68ca4612f123ba458ae1b156775fff8a72157f1c0c16c925b65e18011f284de3615efc1ae35c5d0722aaa92335c00e24d810812

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Documents\TestMerge.csv

        Filesize

        896KB

        MD5

        cf0bed8f1f5d34ecbcaea87c650490a7

        SHA1

        a9535db37729baf756d618114cbf02e80edc8aad

        SHA256

        9d506266cfd8827bdc1cdfd94f254ef21cd69c3e217f1295b48f2e170e9a6466

        SHA512

        e883bc54e464ff412648478b6ceaa53949a12dfb2ed9dbf05a15555fb74ecff23299ed2a0604a1e5c287bcb5812767063541029aeee4e13a162bea6996774c62

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Documents\UninstallMount.csv

        Filesize

        751KB

        MD5

        37b9783a80b258bd955657565b36d2b4

        SHA1

        404e35c91b1e8b9c26a89afd59155035054bdf38

        SHA256

        db44917404d74deb2840459eeae72159c299f4700908c54369bf97c20558ecb4

        SHA512

        21bf1f36e14528dc49312106807200cf37d181b13e46761ab6721a731fda406251c688ec724c2ef111622d80c47cf536b9d413fba7b45303d52d85c2a0f6a3df

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Downloads\ExitSwitch.jpg

        Filesize

        832KB

        MD5

        5216ad8134ba5712e6dcd583dce00e25

        SHA1

        288fc40ea7c300dc887b4ae21f7033f067935dab

        SHA256

        91fac4049fa5eb457114de8a6ce05cd4019d55d4c32bafef0d979e2f954079ed

        SHA512

        aa4148859cfc91b2fa977684ed366eb28717612f8e1e5c555bd3a5000cdedf50edc49fec3b3c86b515cebc2fd548cc94ae10e947e9ec83886a2dc0ba659e925d

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Downloads\HideCopy.txt

        Filesize

        363KB

        MD5

        13243751a6f7acb324d74b031daf0657

        SHA1

        ce849093ee9f2c19540a9ef75c0109101c1f1a3b

        SHA256

        b0512a010d38fec4f6b5ebca64226f81f3b6db5e44fbef21c0578e807d5c17d2

        SHA512

        388e15c148b8cfbfa07982fedd7a480f96d359ce806df4d7d15836685d460652f0fa9c4383a0223f5b2bcbfa6d2ccb7569ca88ad0cb2e6a64cbd7fb9a1117726

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Music\PushUndo.jpg

        Filesize

        339KB

        MD5

        1cd4106b0984ca5b24e2f884b68c0df1

        SHA1

        b44de23427804a9a217a6a4f3f42a19e5fac5eef

        SHA256

        c7089c391df6dbbbee362be49f672b9557322bdd49ac2f028c878de59af2458c

        SHA512

        e3317faf31ecaee7f37e7afbf509d81c997602c2e873ca56c57f6d50e1edebd90574cb4184853797c4b8eafc2d7c576be7bb874e848d739f74a72e8589e9db2f

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Music\SkipMerge.doc

        Filesize

        415KB

        MD5

        db79395181f0e4a3d7e0b7021c09fe05

        SHA1

        4ef932ddb1790f497acefdd5873dd24e164eb054

        SHA256

        91659c67633ced41ed67e6d6738bbe7ce6c98dd9cb895cf4d7173d0dcd16652b

        SHA512

        942cf0e6eb2b04be7df72991679a1d86f34fea103c9e57da81fbbfc05cccff3560c3f0f5a5a5b39a5fe1f7eb4f77f734d8ba0991a3cb20345175ee84c5164e41

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Music\StopGet.txt

        Filesize

        465KB

        MD5

        65c2dee161a99186402a303add368b73

        SHA1

        a41d55387f0db2a84cec0c442f38b7e0da3eea68

        SHA256

        506d3a1a89f87b52478c8afeb1c0c9d312c7a3e4f82c5e3f7d5a0358b3c01a34

        SHA512

        90fc111fd8a2d8090044595398d70fc2765149069e43a9b25e036c6212ddba5a95885a0a9964722544c1e667482087d0c9ca9949e85ff4224834fdfe6b30d2c1

      • C:\Users\Admin\AppData\Local\Temp\‌       ​ \Common Files\Pictures\ApproveRename.png

        Filesize

        329KB

        MD5

        491612916ffcf4655ce6899ccabdaee4

        SHA1

        81b562236b5ed58264c57cf0880ba5660f96ac16

        SHA256

        3679efd055542943645118f324a04078cd52f5c5fd30211fe4c72c5be2de54d8

        SHA512

        8ef5123ab0213ba54b5198170bba10a8a1b36226f6d7f9afccfd4bdd673de6a18466414b9eef2b79b3890c599da353d0cd6417f01269fbfddddae04f5f77e37e

      • memory/996-54-0x00007FF869AC0000-0x00007FF869AEC000-memory.dmp

        Filesize

        176KB

      • memory/996-48-0x00007FF86E5F0000-0x00007FF86E5FF000-memory.dmp

        Filesize

        60KB

      • memory/996-226-0x00007FF865700000-0x00007FF865733000-memory.dmp

        Filesize

        204KB

      • memory/996-227-0x000001FB3F3E0000-0x000001FB3F913000-memory.dmp

        Filesize

        5.2MB

      • memory/996-317-0x000001FB3F3E0000-0x000001FB3F913000-memory.dmp

        Filesize

        5.2MB

      • memory/996-303-0x00007FF8557E0000-0x00007FF8558FA000-memory.dmp

        Filesize

        1.1MB

      • memory/996-304-0x00007FF855EC0000-0x00007FF8563F3000-memory.dmp

        Filesize

        5.2MB

      • memory/996-305-0x00007FF86A3E0000-0x00007FF86A405000-memory.dmp

        Filesize

        148KB

      • memory/996-82-0x00007FF864F80000-0x00007FF8650FF000-memory.dmp

        Filesize

        1.5MB

      • memory/996-80-0x00007FF865900000-0x00007FF865924000-memory.dmp

        Filesize

        144KB

      • memory/996-81-0x00007FF8557E0000-0x00007FF8558FA000-memory.dmp

        Filesize

        1.1MB

      • memory/996-77-0x00007FF86AD70000-0x00007FF86AD84000-memory.dmp

        Filesize

        80KB

      • memory/996-78-0x00007FF8659C0000-0x00007FF8659CD000-memory.dmp

        Filesize

        52KB

      • memory/996-73-0x00007FF855EC0000-0x00007FF8563F3000-memory.dmp

        Filesize

        5.2MB

      • memory/996-74-0x00007FF86A3E0000-0x00007FF86A405000-memory.dmp

        Filesize

        148KB

      • memory/996-72-0x000001FB3F3E0000-0x000001FB3F913000-memory.dmp

        Filesize

        5.2MB

      • memory/996-71-0x00007FF860B60000-0x00007FF860C2E000-memory.dmp

        Filesize

        824KB

      • memory/996-70-0x00007FF8567B0000-0x00007FF856E72000-memory.dmp

        Filesize

        6.8MB

      • memory/996-63-0x00007FF865740000-0x00007FF865759000-memory.dmp

        Filesize

        100KB

      • memory/996-66-0x00007FF865700000-0x00007FF865733000-memory.dmp

        Filesize

        204KB

      • memory/996-64-0x00007FF8660D0000-0x00007FF8660DD000-memory.dmp

        Filesize

        52KB

      • memory/996-60-0x00007FF864F80000-0x00007FF8650FF000-memory.dmp

        Filesize

        1.5MB

      • memory/996-246-0x00007FF860B60000-0x00007FF860C2E000-memory.dmp

        Filesize

        824KB

      • memory/996-58-0x00007FF865900000-0x00007FF865924000-memory.dmp

        Filesize

        144KB

      • memory/996-56-0x00007FF865930000-0x00007FF865949000-memory.dmp

        Filesize

        100KB

      • memory/996-306-0x00007FF86E5F0000-0x00007FF86E5FF000-memory.dmp

        Filesize

        60KB

      • memory/996-29-0x00007FF86A3E0000-0x00007FF86A405000-memory.dmp

        Filesize

        148KB

      • memory/996-25-0x00007FF8567B0000-0x00007FF856E72000-memory.dmp

        Filesize

        6.8MB

      • memory/996-253-0x00007FF855EC0000-0x00007FF8563F3000-memory.dmp

        Filesize

        5.2MB

      • memory/996-275-0x00007FF86A3E0000-0x00007FF86A405000-memory.dmp

        Filesize

        148KB

      • memory/996-288-0x00007FF8557E0000-0x00007FF8558FA000-memory.dmp

        Filesize

        1.1MB

      • memory/996-274-0x00007FF8567B0000-0x00007FF856E72000-memory.dmp

        Filesize

        6.8MB

      • memory/996-280-0x00007FF864F80000-0x00007FF8650FF000-memory.dmp

        Filesize

        1.5MB

      • memory/996-289-0x00007FF8567B0000-0x00007FF856E72000-memory.dmp

        Filesize

        6.8MB

      • memory/996-315-0x00007FF8659C0000-0x00007FF8659CD000-memory.dmp

        Filesize

        52KB

      • memory/996-316-0x00007FF86AD70000-0x00007FF86AD84000-memory.dmp

        Filesize

        80KB

      • memory/996-314-0x00007FF860B60000-0x00007FF860C2E000-memory.dmp

        Filesize

        824KB

      • memory/996-313-0x00007FF865700000-0x00007FF865733000-memory.dmp

        Filesize

        204KB

      • memory/996-312-0x00007FF8660D0000-0x00007FF8660DD000-memory.dmp

        Filesize

        52KB

      • memory/996-311-0x00007FF865740000-0x00007FF865759000-memory.dmp

        Filesize

        100KB

      • memory/996-310-0x00007FF864F80000-0x00007FF8650FF000-memory.dmp

        Filesize

        1.5MB

      • memory/996-309-0x00007FF865900000-0x00007FF865924000-memory.dmp

        Filesize

        144KB

      • memory/996-308-0x00007FF865930000-0x00007FF865949000-memory.dmp

        Filesize

        100KB

      • memory/996-307-0x00007FF869AC0000-0x00007FF869AEC000-memory.dmp

        Filesize

        176KB

      • memory/2160-188-0x00007FF854D10000-0x00007FF8557D1000-memory.dmp

        Filesize

        10.8MB

      • memory/2160-83-0x00007FF854D13000-0x00007FF854D15000-memory.dmp

        Filesize

        8KB

      • memory/2160-93-0x0000023B8BCE0000-0x0000023B8BD02000-memory.dmp

        Filesize

        136KB

      • memory/2160-94-0x00007FF854D10000-0x00007FF8557D1000-memory.dmp

        Filesize

        10.8MB

      • memory/2160-95-0x00007FF854D10000-0x00007FF8557D1000-memory.dmp

        Filesize

        10.8MB