Resubmissions

02-02-2025 07:38

250202-jgnkxs1rh1 10

02-02-2025 07:32

250202-jdb3qa1raw 10

02-02-2025 07:31

250202-jctw5stmej 1

Analysis

  • max time kernel
    317s
  • max time network
    317s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2025 07:38

General

  • Target

    https://goo.su/7cBYZb

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 3 IoCs
  • Checks computer location settings 2 TTPs 23 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 24 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 8 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 26 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 16 IoCs
  • Runs ping.exe 1 TTPs 8 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://goo.su/7cBYZb
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa0496cc40,0x7ffa0496cc4c,0x7ffa0496cc58
      2⤵
        PID:3648
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1876,i,13028200139010056642,14251438618934653078,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=1872 /prefetch:2
        2⤵
          PID:4864
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,13028200139010056642,14251438618934653078,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2152 /prefetch:3
          2⤵
            PID:3536
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,13028200139010056642,14251438618934653078,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2416 /prefetch:8
            2⤵
              PID:3820
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,13028200139010056642,14251438618934653078,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3128 /prefetch:1
              2⤵
                PID:3192
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,13028200139010056642,14251438618934653078,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3184 /prefetch:1
                2⤵
                  PID:220
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4724,i,13028200139010056642,14251438618934653078,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4804 /prefetch:8
                  2⤵
                    PID:1800
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4800,i,13028200139010056642,14251438618934653078,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4876 /prefetch:8
                    2⤵
                      PID:3532
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5164,i,13028200139010056642,14251438618934653078,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=728 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:6640
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:1816
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:5076
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:4000
                        • C:\Windows\system32\rundll32.exe
                          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\themecpl.dll,OpenThemeAction C:\Windows\WinSxS\amd64_microsoft-windows-themefile-aero_31bf3856ad364e35_10.0.19041.1_none_2fe4331ee906f14a\aero.theme
                          1⤵
                          • Modifies Control Panel
                          PID:5072
                        • C:\Program Files\7-Zip\7zG.exe
                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap13777:94:7zEvent2975
                          1⤵
                          • Suspicious use of FindShellTrayWindow
                          PID:824
                        • C:\Users\Admin\Desktop\1111212121211111111.exe
                          "C:\Users\Admin\Desktop\1111212121211111111.exe"
                          1⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          PID:4804
                          • C:\Windows\SysWOW64\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\webdhcpcommonSvc\8oMu5MN3n5JCWNJxMaAIphizfcxgGBRDGUZIcPGuQFLLvR2dRGJqnS3KpD.vbe"
                            2⤵
                            • Checks computer location settings
                            • System Location Discovery: System Language Discovery
                            PID:4904
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\webdhcpcommonSvc\SyspSItsJvcfBWgITeGIfXkr8b6Z5fx5kvFp18noZ5XmxTi8nmFHQ.bat" "
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:368
                              • C:\webdhcpcommonSvc\comcontainerSaves.exe
                                "C:\webdhcpcommonSvc/comcontainerSaves.exe"
                                4⤵
                                • Modifies WinLogon for persistence
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • Modifies registry class
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5168
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\m3ethbq5\m3ethbq5.cmdline"
                                  5⤵
                                  • Drops file in System32 directory
                                  PID:5324
                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3D91.tmp" "c:\Windows\System32\CSCE8734FFE66284ED5BBA5C61717FCBA35.TMP"
                                    6⤵
                                      PID:5424
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\l395QBbsGr.bat"
                                    5⤵
                                      PID:5500
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        6⤵
                                          PID:5556
                                        • C:\Windows\system32\PING.EXE
                                          ping -n 10 localhost
                                          6⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:5572
                                        • C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe
                                          "C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe"
                                          6⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5680
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GogtzRNUlL.bat"
                                            7⤵
                                              PID:6132
                                              • C:\Windows\system32\chcp.com
                                                chcp 65001
                                                8⤵
                                                  PID:6188
                                                • C:\Windows\system32\PING.EXE
                                                  ping -n 10 localhost
                                                  8⤵
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Runs ping.exe
                                                  PID:6204
                                                • C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe
                                                  "C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe"
                                                  8⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:6228
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\m2M6WqyfOt.bat"
                                                    9⤵
                                                      PID:6424
                                                      • C:\Windows\system32\chcp.com
                                                        chcp 65001
                                                        10⤵
                                                          PID:6472
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          10⤵
                                                            PID:6488
                                                          • C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe
                                                            "C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe"
                                                            10⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:6516
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2yB5vkEA4A.bat"
                                                              11⤵
                                                                PID:1616
                                                                • C:\Windows\system32\chcp.com
                                                                  chcp 65001
                                                                  12⤵
                                                                    PID:3088
                                                                  • C:\Windows\system32\PING.EXE
                                                                    ping -n 10 localhost
                                                                    12⤵
                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                    • Runs ping.exe
                                                                    PID:4068
                                                                  • C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe
                                                                    "C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe"
                                                                    12⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:1624
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3D0DQVE0G5.bat"
                                                                      13⤵
                                                                        PID:5024
                                                                        • C:\Windows\system32\chcp.com
                                                                          chcp 65001
                                                                          14⤵
                                                                            PID:4844
                                                                          • C:\Windows\system32\PING.EXE
                                                                            ping -n 10 localhost
                                                                            14⤵
                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                            • Runs ping.exe
                                                                            PID:1456
                                                                          • C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe
                                                                            "C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe"
                                                                            14⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:4908
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4SpLuGErS0.bat"
                                                                              15⤵
                                                                                PID:4884
                                                                                • C:\Windows\system32\chcp.com
                                                                                  chcp 65001
                                                                                  16⤵
                                                                                    PID:1956
                                                                                  • C:\Windows\system32\PING.EXE
                                                                                    ping -n 10 localhost
                                                                                    16⤵
                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                    • Runs ping.exe
                                                                                    PID:464
                                                                                  • C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe
                                                                                    "C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe"
                                                                                    16⤵
                                                                                    • Checks computer location settings
                                                                                    • Executes dropped EXE
                                                                                    • Modifies registry class
                                                                                    PID:3532
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\diBg3fIzhe.bat"
                                                                                      17⤵
                                                                                        PID:5228
                                                                                        • C:\Windows\system32\chcp.com
                                                                                          chcp 65001
                                                                                          18⤵
                                                                                            PID:5340
                                                                                          • C:\Windows\system32\PING.EXE
                                                                                            ping -n 10 localhost
                                                                                            18⤵
                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                            • Runs ping.exe
                                                                                            PID:5296
                                                                                          • C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe
                                                                                            "C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe"
                                                                                            18⤵
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            PID:5432
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ORkDibkCMC.bat"
                                                                                              19⤵
                                                                                                PID:5156
                                                                                                • C:\Windows\system32\chcp.com
                                                                                                  chcp 65001
                                                                                                  20⤵
                                                                                                    PID:5520
                                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                    20⤵
                                                                                                      PID:5288
                                                                                                    • C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe
                                                                                                      "C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe"
                                                                                                      20⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      PID:5336
                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\utpnwKYKap.bat"
                                                                                                        21⤵
                                                                                                          PID:5880
                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                            chcp 65001
                                                                                                            22⤵
                                                                                                              PID:1568
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping -n 10 localhost
                                                                                                              22⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:5996
                                                                                                            • C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe
                                                                                                              "C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe"
                                                                                                              22⤵
                                                                                                              • Checks computer location settings
                                                                                                              • Executes dropped EXE
                                                                                                              PID:6688
                                                                                                              • C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe.exe
                                                                                                                "C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe.exe"
                                                                                                                23⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:2580
                                                                                                              • C:\Users\Admin\AppData\Local\System.exe
                                                                                                                "C:\Users\Admin\AppData\Local\System.exe"
                                                                                                                23⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:3988
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "ApplicationFrameHostA" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe'" /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:5244
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "ApplicationFrameHost" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:5260
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "ApplicationFrameHostA" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Local\ApplicationFrameHost.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:5296
                                                                  • C:\Users\Admin\Desktop\1111212121211111111.exe
                                                                    "C:\Users\Admin\Desktop\1111212121211111111.exe"
                                                                    1⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Modifies registry class
                                                                    PID:5748
                                                                    • C:\Windows\SysWOW64\WScript.exe
                                                                      "C:\Windows\System32\WScript.exe" "C:\webdhcpcommonSvc\8oMu5MN3n5JCWNJxMaAIphizfcxgGBRDGUZIcPGuQFLLvR2dRGJqnS3KpD.vbe"
                                                                      2⤵
                                                                      • Checks computer location settings
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5796
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c ""C:\webdhcpcommonSvc\SyspSItsJvcfBWgITeGIfXkr8b6Z5fx5kvFp18noZ5XmxTi8nmFHQ.bat" "
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:5848
                                                                        • C:\webdhcpcommonSvc\comcontainerSaves.exe
                                                                          "C:\webdhcpcommonSvc/comcontainerSaves.exe"
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          PID:5896
                                                                  • C:\Windows\system32\taskmgr.exe
                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                    1⤵
                                                                    • Checks SCSI registry key(s)
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    • Suspicious use of SendNotifyMessage
                                                                    PID:5692
                                                                  • C:\Users\Admin\Desktop\1111212121211111111.exe
                                                                    "C:\Users\Admin\Desktop\1111212121211111111.exe"
                                                                    1⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Modifies registry class
                                                                    PID:4196
                                                                    • C:\Windows\SysWOW64\WScript.exe
                                                                      "C:\Windows\System32\WScript.exe" "C:\webdhcpcommonSvc\8oMu5MN3n5JCWNJxMaAIphizfcxgGBRDGUZIcPGuQFLLvR2dRGJqnS3KpD.vbe"
                                                                      2⤵
                                                                      • Checks computer location settings
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:4856
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c ""C:\webdhcpcommonSvc\SyspSItsJvcfBWgITeGIfXkr8b6Z5fx5kvFp18noZ5XmxTi8nmFHQ.bat" "
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3064
                                                                        • C:\webdhcpcommonSvc\comcontainerSaves.exe
                                                                          "C:\webdhcpcommonSvc/comcontainerSaves.exe"
                                                                          4⤵
                                                                          • Modifies WinLogon for persistence
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Adds Run key to start application
                                                                          • Modifies registry class
                                                                          PID:6092
                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\34n1b20w\34n1b20w.cmdline"
                                                                            5⤵
                                                                              PID:2488
                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESED5A.tmp" "c:\Users\Admin\AppData\Local\CSCD78E57F2DE264CAC952B4A5F16294EB.TMP"
                                                                                6⤵
                                                                                  PID:6264
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ql58nW6vc5.bat"
                                                                                5⤵
                                                                                  PID:6616
                                                                                  • C:\Windows\system32\chcp.com
                                                                                    chcp 65001
                                                                                    6⤵
                                                                                      PID:5012
                                                                                    • C:\Windows\system32\PING.EXE
                                                                                      ping -n 10 localhost
                                                                                      6⤵
                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                      • Runs ping.exe
                                                                                      PID:6700
                                                                                    • C:\Users\Admin\AppData\Local\System.exe
                                                                                      "C:\Users\Admin\AppData\Local\System.exe"
                                                                                      6⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:2760
                                                                          • C:\Users\Admin\Desktop\1111212121211111111.exe
                                                                            "C:\Users\Admin\Desktop\1111212121211111111.exe"
                                                                            1⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies registry class
                                                                            PID:4160
                                                                            • C:\Windows\SysWOW64\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\webdhcpcommonSvc\8oMu5MN3n5JCWNJxMaAIphizfcxgGBRDGUZIcPGuQFLLvR2dRGJqnS3KpD.vbe"
                                                                              2⤵
                                                                              • Checks computer location settings
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:5612
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c ""C:\webdhcpcommonSvc\SyspSItsJvcfBWgITeGIfXkr8b6Z5fx5kvFp18noZ5XmxTi8nmFHQ.bat" "
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:6148
                                                                                • C:\webdhcpcommonSvc\comcontainerSaves.exe
                                                                                  "C:\webdhcpcommonSvc/comcontainerSaves.exe"
                                                                                  4⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:6136
                                                                          • C:\Users\Admin\Desktop\1111212121211111111.exe
                                                                            "C:\Users\Admin\Desktop\1111212121211111111.exe"
                                                                            1⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies registry class
                                                                            PID:5724
                                                                            • C:\Windows\SysWOW64\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\webdhcpcommonSvc\8oMu5MN3n5JCWNJxMaAIphizfcxgGBRDGUZIcPGuQFLLvR2dRGJqnS3KpD.vbe"
                                                                              2⤵
                                                                              • Checks computer location settings
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3348
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c ""C:\webdhcpcommonSvc\SyspSItsJvcfBWgITeGIfXkr8b6Z5fx5kvFp18noZ5XmxTi8nmFHQ.bat" "
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:6852
                                                                                • C:\webdhcpcommonSvc\comcontainerSaves.exe
                                                                                  "C:\webdhcpcommonSvc/comcontainerSaves.exe"
                                                                                  4⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:6272
                                                                          • C:\Windows\system32\schtasks.exe
                                                                            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\System.exe'" /f
                                                                            1⤵
                                                                            • Process spawned unexpected child process
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:6300
                                                                          • C:\Windows\system32\schtasks.exe
                                                                            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\System.exe'" /rl HIGHEST /f
                                                                            1⤵
                                                                            • Process spawned unexpected child process
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:1716
                                                                          • C:\Users\Admin\Desktop\1111212121211111111.exe
                                                                            "C:\Users\Admin\Desktop\1111212121211111111.exe"
                                                                            1⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies registry class
                                                                            PID:4132
                                                                            • C:\Windows\SysWOW64\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\webdhcpcommonSvc\8oMu5MN3n5JCWNJxMaAIphizfcxgGBRDGUZIcPGuQFLLvR2dRGJqnS3KpD.vbe"
                                                                              2⤵
                                                                              • Checks computer location settings
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:6412
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c ""C:\webdhcpcommonSvc\SyspSItsJvcfBWgITeGIfXkr8b6Z5fx5kvFp18noZ5XmxTi8nmFHQ.bat" "
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:6600
                                                                                • C:\webdhcpcommonSvc\comcontainerSaves.exe
                                                                                  "C:\webdhcpcommonSvc/comcontainerSaves.exe"
                                                                                  4⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:6636
                                                                          • C:\Windows\system32\schtasks.exe
                                                                            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\System.exe'" /rl HIGHEST /f
                                                                            1⤵
                                                                            • Process spawned unexpected child process
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:6352

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            57b5fa64cb392a643806eb7da5901ef0

                                                                            SHA1

                                                                            d851bd00ad4eaf371fd04a5dcb6a3d916964a183

                                                                            SHA256

                                                                            1447656056947c69c21b54b3abb5cfbfd1788ca03c5bae0336d8fe39e7caa221

                                                                            SHA512

                                                                            6ca1ee684133c12afc7baaa2639fc627967e118a051b9117d281b0ccb5f76bc95729287fef15205c76ff829efe2946ceb152f93ad28a97a564f255fa362e0836

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                            Filesize

                                                                            2B

                                                                            MD5

                                                                            d751713988987e9331980363e24189ce

                                                                            SHA1

                                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                                            SHA256

                                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                            SHA512

                                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            0d4c226146ec36d0e69e717a73ce95c1

                                                                            SHA1

                                                                            12fb3d2cf46adc243256b33a713318fc4206023f

                                                                            SHA256

                                                                            a929a6b0a1fc2338bd40df0346f6f305045d110e674f2ab86728c8f0a73f2810

                                                                            SHA512

                                                                            c28b1565a97fc2d3267a87d5ed6bfc8815a0966878a8ecbda9dd290697876ccef3f7ae619efae8fc6bceb51aee67c71d7213fde0113501a695384f73c27bdf7d

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            d4b04d6bd4b259db67c76dc36c5c7ebc

                                                                            SHA1

                                                                            024298861062c847fc5b610be907f0a65cb83c24

                                                                            SHA256

                                                                            0f563de85802961e593e5e7bcae7d4fa38dda19bf4692f8afebcf400d3a835ba

                                                                            SHA512

                                                                            b76ff0243eca286cc2c225cb3ceec7e66af91caeb72f063dc3cbf5c50e5a6e2d0ec354eb50ee6401871a9568c603cea2378f29e86e9321d4d80ff67f1919b958

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            c88fb2150e50fdf93f52e63302aca028

                                                                            SHA1

                                                                            69e64d6c47729d18f470c005b93319c44ac53d61

                                                                            SHA256

                                                                            81b78af72bf6e6e8788673579636a106b48687164271f0d822c72b478cbdbdee

                                                                            SHA512

                                                                            0483ff761acfaf3ada9e6edf2c6e201ff997ba47d2c85b159488a16228d90118511065cd572b4ea0b2257c84da29cf72108c913aeecc2b22c86834aad01673a4

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            69609811cfa54f4287a3f9fbbecfe8a5

                                                                            SHA1

                                                                            d778e217f736d6dc52560781ddf0bb73c2e17cfe

                                                                            SHA256

                                                                            37f0ed6d7895f240e7e6120e5aadee1a40b9ae72fa18087125e8e0b22ed2e55d

                                                                            SHA512

                                                                            3b821565150467b3134aa3dc958bc63345bcd5fa06f02a0545d9488af0bf93f2dace6d5759a45eaa9dd4f3e02a4d2c4affb81382305f5bee4dd38bcee60b9a04

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            acbd555a94d5e1944bf1b5605ee4a2da

                                                                            SHA1

                                                                            56b5eb6f10ac3e13ed57dec909c875f0a54c887a

                                                                            SHA256

                                                                            165b3bc3f4cec851309edfeaac3b942ac6d6e0f5a95f5d18134330a8ef5b0f78

                                                                            SHA512

                                                                            113b2db4586180d2ab999847fa6e0fc87759400a28baab4edbf91a97f0e86a25c9264a32b4d765480b8c46492c9e6f19fc104e357b7d6e2b8144521a38f94837

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            6f39424ab458842c1d602bf9d7f5930a

                                                                            SHA1

                                                                            8220ed7989e85b51d86558899e4d61b4eb421234

                                                                            SHA256

                                                                            249f43dd66b3425803c1e22b87a1ccbbc10dd1ea17d6fa395752eab80a39feaf

                                                                            SHA512

                                                                            8703b016867229211379c0a5822200850607ee48eb1b2a42bb7c60d23fa92cb4316eb46682952ebfb00649e246aaf43efea98ce1583221c68e719c438d5ff786

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            2e6037174209a63337e731c7c3235765

                                                                            SHA1

                                                                            bc239b0ece37604dce4aa82bdb5ed19221807817

                                                                            SHA256

                                                                            44d6a532a5d7c291cea777be7354713607bee9536175e7bc93549e9008310f09

                                                                            SHA512

                                                                            8e343fc8853bc3eafa2766a881f135c1384e3d44a4f8ba40ef62acec5ee320608b1693b3ab22f995613f13ad1a3db396c6f6667bf8ab9daabb066877c502f4ac

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            3708a28b9cd03f59103778c0304fe7fa

                                                                            SHA1

                                                                            853aac8665770625b3455c2a48e5f8f81137fce2

                                                                            SHA256

                                                                            c3345cead906bc42d2b49d850448928addfe80d6c1e1d7e7ce1d2a51b7d8f906

                                                                            SHA512

                                                                            06c267500a0472403602d21b32ee33a027900a7db2563867ac93af88be59406b1b5a703059af75f77b7c98ba6f5f40bab3ea563ebb3e4ee0a5cbb3b5f270eaf2

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            cafdf772b5deedb8962c3fd5aabc19ad

                                                                            SHA1

                                                                            3da36e625a7fc319a7ea15ac2e607196b3e2a439

                                                                            SHA256

                                                                            8d2a28c47b5f53fb8b464cee7db6bb1cbeeb1b81bffbf7f72340706aa08f105e

                                                                            SHA512

                                                                            7dac5c8c9d60a368c555dc500166cd48246f8026f1e739135661d94298a73e46b7e6b443f8ee2477c86a6b235b82d06f89b29d08c76c7e1646c5fcefffbbc416

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            17789ec351438845f1258287a7be5113

                                                                            SHA1

                                                                            793aab9ba76267598848874a400b09fe294b9ff4

                                                                            SHA256

                                                                            201247c0f2317652029ea04a53895eba133fa27d2f8abc0855cd113dd8fc9078

                                                                            SHA512

                                                                            c211f1241801e44a55bff85ae0b4b2d74eb0316e9b78abca86b6fb347d2f235b70ce75a34a5c10617831f390f6e43e9ce819e05135956a0ef012dd3f87c8779e

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            1062f5eb53095e4307a4e8d50a78d3ed

                                                                            SHA1

                                                                            af15cae490454dcf0be248a3afcf94763d9d6ff3

                                                                            SHA256

                                                                            c400aab8c758d53aad05e80308f27dba492bcc217f014c3d89e511e06efbe142

                                                                            SHA512

                                                                            a440cf7c5985beec6aa5e59419564d34a4eb18c4242756927cb5c3a83d9323ad156242b5a2406daa95ecae714254ddd36834c3b1f8e5325728c2ba3168a2478d

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            8b599e873606ac1cae3d7acf4bc220e6

                                                                            SHA1

                                                                            36f10cca953b44a8fc02a5154aa4531e6484c67c

                                                                            SHA256

                                                                            a689d58ebf87da9507a553f82d5a7ad903e2b977ae007c353b43d1d41c2b59ed

                                                                            SHA512

                                                                            68270b008b63cfe939fd5b6b9ac7518366fe7595027dc60d14d8f194b514f20e7666d41df5b4b377913b05d1eab439d4dc94cf66845931c02e53da899ed23add

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            dbe88a44119c9b93989a5db66b6ec981

                                                                            SHA1

                                                                            af83e19a69aa337ba609d17df279d7db166c4a69

                                                                            SHA256

                                                                            5aff61d3f023d03b3c6e4d57df9dea661463eaf0a1cfcc5def2040c1c8e5ea01

                                                                            SHA512

                                                                            9a542cace64f0a6deb86b1c4441d9eb333a336307f96ef0f2a62994c77ce0a54abe467b9c2d2f108f51b2dafc9589ad45e42cbbd16f294fbd2981509b029560b

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            b34bd1c7cfb752d09672ef65f8d4bdf4

                                                                            SHA1

                                                                            700f28564dff2b3b4f22e7602310a83f348a1913

                                                                            SHA256

                                                                            35000e2b8be8d0e14e60017e4b27d81902e3241fbd6ce3ccfe88acb0c2225951

                                                                            SHA512

                                                                            bbf7edfe39aa877b0871b7503b2aef80a682b835c6cdad812a264712ef5163dd90ff3d4898d1d3404ae9151edc752948a6b0455b7e51091571de9e9025629453

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            763a557fe0684efa6aafcb5463850cd4

                                                                            SHA1

                                                                            7bcdb44eaacd0e17ec6ecdfb1049dd1992fb4681

                                                                            SHA256

                                                                            d28e2841ba8e9e8587d0b74ba8133385e2f6cf7a23545aba1e42d0763e186c1f

                                                                            SHA512

                                                                            9be549e058c1c9b646b564e05e86f0bcf051911ac20fddfa12145c7a5e5e1ff2378b54bdcae09d2217669c645d2b47778547835c8fff8b8ac0197c7625c3420f

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            78fd589e3d4c2fe16564932e1839c4cb

                                                                            SHA1

                                                                            e0aad5e5e458a30c5a92c0a980938e7da9095346

                                                                            SHA256

                                                                            9769ea3fb59aabc7458ae9cd5118ceb6e85ef7524cbb3e770670bd45047957d7

                                                                            SHA512

                                                                            5e7482588e80aff43b73c77779212ac6a744f55ee8d96cbe040f34126c331c62de851f706c5ab5d00ac09bf0e07be92b5a74f189cb90e7bfda69ba3551e7d50e

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            32821ce2c1b399b8fb95f135602d10a4

                                                                            SHA1

                                                                            55f683598ac7eef36dcf0276a92f7e5477270959

                                                                            SHA256

                                                                            a509b887f5f05ab1494e20fce58e9cb2e8c24055214c99b0b0d883219a8810ff

                                                                            SHA512

                                                                            a66495b7a5633fd8089a6f4be338081be045f869c4d4f3787006105077a3f82e6a2b410a9cad5673a1fbe14b00495ae0a628070beef2a66aab76bb446eb917a8

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                            Filesize

                                                                            122KB

                                                                            MD5

                                                                            97c46166e035c36a6f89c66716b9b879

                                                                            SHA1

                                                                            93e49c9d7ce09b892d42e73fc2d3c08fead6bbf5

                                                                            SHA256

                                                                            f78eb7731b232676b744e02ce6efcdb879f899ef8f06116d171c6fc27b8511b9

                                                                            SHA512

                                                                            80f549cbf1bdf3c44482a475e3693576b95392271d5001f72008ebbd556cd5f47675f68a2f035df1d7b664aa48acc054e93a329f424126cedf17a6c72cdb95a7

                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                            Filesize

                                                                            122KB

                                                                            MD5

                                                                            f5f904c88b6ac8b16defc60ed753fd6c

                                                                            SHA1

                                                                            3e577e39fb13e5c418fb30419301b864f1d11454

                                                                            SHA256

                                                                            d96be362160373c1e8a4f82f66d0ddf99fcd7a1c6d0e590f1fcafeaba052cd68

                                                                            SHA512

                                                                            28bdaccadf4bd73e05ef4cb3be0f34208a536d7cfd08666a9ff63444fb31999ebc288683f55090ea36a38e3fcf6f3746d10639663dc241901ec37f9ae0357d5a

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ApplicationFrameHost.exe.log

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            0f31e501ab247a1b471e8e69930fda3d

                                                                            SHA1

                                                                            cc4a26314aad742126f6df0e92b777a786eade0b

                                                                            SHA256

                                                                            f6562e9acf0bb58a78a8ad59d5bc88bdf7a2508b84745605dfc28a19f60e4742

                                                                            SHA512

                                                                            65c14701fa94622aca52146b0f2d501ac2acdd4acd2a4c666903a800f26310832404a66478f861dd9b10a0a74d99e2b683fb73aef5d153b7ac26aabb96cfea24

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\comcontainerSaves.exe.log

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            850494ce34f0d54da82d83bbb2ef2e20

                                                                            SHA1

                                                                            878825bbad76191a994913ef1f53536e91038546

                                                                            SHA256

                                                                            6495bbbabb7f978b6399c82dfa99f9dd76972a9d8af7099cd67862b5a327ebaa

                                                                            SHA512

                                                                            fb85a9f3102f358d2b995db5361b3b89a7306fd07ac7701db5890d3385eb1ca7fade2959e0d1c65be23da9d06995b314bb833e7130d239b367b709917177255e

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            23454f35ad7ab55829ab1acb66cbf045

                                                                            SHA1

                                                                            732f9ca3bec3d99945af73ccc254ada4741f7f49

                                                                            SHA256

                                                                            55ed7471195d163846e2f25f1c51d4d4e909780e9042eb146074630eaeae019d

                                                                            SHA512

                                                                            e591b7272294f83ae1856211111c03a654efc79e25b95e4cbcb5ca70299f3d4e323f9eddeb38acd9344abadc3ad79268b3fd9013b4586fc9bfa3c2f667d75c87

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            c32013d6d79659b4132f3f2e54a89a2b

                                                                            SHA1

                                                                            64a585ec267c0a3a22f528c1b041a9b7b9261aa4

                                                                            SHA256

                                                                            de48d2861d7ea44c29504369e7009c663dfb15cee52189b0d3374fae5e3c5403

                                                                            SHA512

                                                                            11ee9f5b17eeb6e0fbdd5e5baab32a6b886672e3131be84024b0b4300f88e434de44ff7d8468e1761a53b705e345769c73025e0b3b86b604370b6da81f871d69

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            ec98c879f5bc3819627037904339e249

                                                                            SHA1

                                                                            8a9937360d05dc056b1bcd46f3b92268f112ad74

                                                                            SHA256

                                                                            12cd4b000a1fbcbdf16c5c7a64cecb1ccc26afc5fa26255105aaf7333a9804d9

                                                                            SHA512

                                                                            0988b1ca1265d01cc389a010b79e9444dee315bee701714a80186ffc752644d7e4a587ab64db338a6baae5eca385449d33e8b0b4f13c9e57f2a342e6da563a8b

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\aero.theme

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            1348e4e8fc451e8021f935f4b1376c95

                                                                            SHA1

                                                                            c6fecb47e09a1a255cbe9a9f03d91d2100cd1737

                                                                            SHA256

                                                                            cdf0440a375c4d4a180a358ea3c87448482622fbc71833bc797ec1410e54bb01

                                                                            SHA512

                                                                            ef23469825048d1fdc7f693a9efce5a1bdb8472743917288fa06244c7172d933347d8403440598a9f4062b3514ee313462655e21bc1c1a8dde78cfb607796703

                                                                          • C:\Users\Admin\AppData\Local\Temp\2yB5vkEA4A.bat

                                                                            Filesize

                                                                            181B

                                                                            MD5

                                                                            647f2c290dff90dc8e7b7ce3ce03f18c

                                                                            SHA1

                                                                            e1678733a5096934687166cbd8507c124b6c4e34

                                                                            SHA256

                                                                            51e54ecb8b81dc54c42ee1d90b63ee5f72f878c37bae6e6f1eeccd1191dcd798

                                                                            SHA512

                                                                            bbb3c895810c58d62d948003d952399389135897e86ea99d085b78fecc9021a6471138601c6c12697ad36c5e1054345e13c39bac099905abb809a3effc5587e4

                                                                          • C:\Users\Admin\AppData\Local\Temp\3D0DQVE0G5.bat

                                                                            Filesize

                                                                            181B

                                                                            MD5

                                                                            74a7499128449b85818b80e59c983b2d

                                                                            SHA1

                                                                            84327156cea9a257c5d5a2351565ee52b1cecfe6

                                                                            SHA256

                                                                            c1b69e2cdb059f3d11657565a0f5d1d6a2d6a9c0e523db45d42ca50fde4d97ff

                                                                            SHA512

                                                                            ebe80b383d930347e74c70e951bbbc5e3b31acebaf483268e00781f45d4cd402462e623e190658430f16412a403178c0196ae714b4f945748b491abc9e4abb7d

                                                                          • C:\Users\Admin\AppData\Local\Temp\GogtzRNUlL.bat

                                                                            Filesize

                                                                            181B

                                                                            MD5

                                                                            de29995a4c7a229a0cccc6b60d6882a2

                                                                            SHA1

                                                                            94689f16dc76ca1ec9cd1bb4335712376645ec8f

                                                                            SHA256

                                                                            8a9ca39afaa2e96faee7d9e7dd8ae6f334451a2dcf448da20b66f07c0b2fddba

                                                                            SHA512

                                                                            01c5870e9ea48c2eed8ee05f2e2312df174788272e0be45b9b6572e915b78075cd61fec4f724ff921876493a83a4ed4d6f55b3e9abe449295f44f6de24ba8add

                                                                          • C:\Users\Admin\AppData\Local\Temp\RES3D91.tmp

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            4b998ab7439ebd25510a37e88de39714

                                                                            SHA1

                                                                            5d6c03db276e569512f095b2c733fd7baaf30b4b

                                                                            SHA256

                                                                            24aa543b6ee6d7e7bc6ccdf347b9718b82679f228c19959de4d5a625ef3c8247

                                                                            SHA512

                                                                            b0839e8cfb8cdfe9d2f3d87f3a5eff9c7cdc1b5a8268732d7aca2963fa522aa3723480e0ab3cc56526f268ab17c683b677f59f86a7838365def55b773f6646f3

                                                                          • C:\Users\Admin\AppData\Local\Temp\l395QBbsGr.bat

                                                                            Filesize

                                                                            181B

                                                                            MD5

                                                                            bf4706b1bca9f42304e37d571de68a32

                                                                            SHA1

                                                                            8a821a3c6920397e979cc9c5b5057a75779af6bf

                                                                            SHA256

                                                                            e79f0717e782c4966ccf136274657f2326c1ef2a6d7d46037fa1804cb0c9b2f4

                                                                            SHA512

                                                                            1e6bb97df9e3ce76515d0bc193ea632098c43235be5e225b6be0f1c7512d26ac06e3406a0c946d4fb8d8382b9adf3f2442e15729288cfea1bc684a5a55031a3c

                                                                          • C:\Users\Admin\AppData\Local\Temp\m2M6WqyfOt.bat

                                                                            Filesize

                                                                            229B

                                                                            MD5

                                                                            1666829721cb3ba8f4defcd406bd55d5

                                                                            SHA1

                                                                            7cbba4e70769a0bf7d85c7010421aefee496addd

                                                                            SHA256

                                                                            1500ba01a956d8840e983a0a5384a0264cde0177bb77f7346f066ed52a62a555

                                                                            SHA512

                                                                            9c2bac1b772b3923171a62b7d2f75fd3201497b92bf704281cba3b66a5ae7fd08a4504eb068d628ea3983c51bf633a279dcd62ca3ae7a6e6ecc5fc24ea2fd116

                                                                          • C:\Users\Admin\Desktop\1111212121211111111.exe

                                                                            Filesize

                                                                            841KB

                                                                            MD5

                                                                            88dd6c56b6ee2a781287f516263980e2

                                                                            SHA1

                                                                            182e4f950229ff3120416e375de7d5983f390c83

                                                                            SHA256

                                                                            3e6e61d3f9982a7d72b5ee0942e219898a318143a9561ec3674a599ee0b405ba

                                                                            SHA512

                                                                            5842ef718d3957a7a19329d5684cef5094ecc15df16ea2fd28dd0dfce8f568fcfdd4afb337b7cb342ae8ce1f43a1fc7f48aa6ab7fb2bec50952b266120648f8a

                                                                          • C:\Users\Admin\Desktop\ApproveResolve.dll

                                                                            Filesize

                                                                            975KB

                                                                            MD5

                                                                            2eccef3ba35241c1ff12eb4120629969

                                                                            SHA1

                                                                            29ca9c4d2c8de4168d78d8647db0719f819c9cf7

                                                                            SHA256

                                                                            d0e6d13caf9a6040c48345cd4b154f97e3c8e400b6b346674ae7f61baf2ad6cc

                                                                            SHA512

                                                                            e42d26c454412356a17ba7e8f3f9e73c1a3defa92bb437802c2456c344ebd1a909095d2c497c7610b64c8a5d6b0f274fe5e06e3f55b66dd02dff9e870816b06e

                                                                          • C:\Users\Admin\Desktop\AssertMeasure.potx

                                                                            Filesize

                                                                            789KB

                                                                            MD5

                                                                            746340159ac9658ddb5635b20ae23118

                                                                            SHA1

                                                                            53e0761010846f7d0bab184bb251a365ce87d2cb

                                                                            SHA256

                                                                            f3141fad2d93584539f64ebeb729985d8c48ea93b658d18a60ec6720e20c82d9

                                                                            SHA512

                                                                            0d51e8520e0282ad2887283377f79fa7bd338499aad43d3784d82d9c01eab68582458e95181172960c078acca0859c913b5b37b60ccd690afba0095cfb88842e

                                                                          • C:\Users\Admin\Desktop\AssertSend.vsd

                                                                            Filesize

                                                                            603KB

                                                                            MD5

                                                                            75489efea27ae4dcfce4cf4e0cff2d44

                                                                            SHA1

                                                                            3c5fc9dd4425c7634f5b7cd14b465ff9fa976e15

                                                                            SHA256

                                                                            0c47e335679e06cb65c9f85975f20e8788fe74529d6e9b58975e7c35ef338483

                                                                            SHA512

                                                                            8f92f7b4239c1d389f9e14ced5c71f5dbd8e7c8b962e298874b79077c5b3f3b10fd8e2867dc7a02a45e865e119f5e867bcf66554b5c303beb8aff0b3929fe026

                                                                          • C:\Users\Admin\Desktop\BlockPush.tiff

                                                                            Filesize

                                                                            665KB

                                                                            MD5

                                                                            25437458506f892c0063758afce35f5f

                                                                            SHA1

                                                                            ede5912d05ed3fdef75bac129a1b9e9d4d397762

                                                                            SHA256

                                                                            4e2eabf921680f78e94f92aa151d04be611dfb6d09c2db0b0092379c2e066f51

                                                                            SHA512

                                                                            e3af6550c449ea6f997e6752b90d1958c87e8b368ac0e8405e2e5f6e10695cdc221f51a281dac4cb9a4afe6676c097d394446e12d76894b98a0836bc4616b2d9

                                                                          • C:\Users\Admin\Desktop\CheckpointSplit.vsx

                                                                            Filesize

                                                                            696KB

                                                                            MD5

                                                                            5f844884c5d66fc56bdb683e559d57c0

                                                                            SHA1

                                                                            10166638cb78f37729ce28cc275fb69df0874b28

                                                                            SHA256

                                                                            ed1d77db83e58e3cb90d9d1e06d285e26ec60a1cce9c990379d559e6ca8def3b

                                                                            SHA512

                                                                            48b4bfd26d9de0b96b7216da1a98fdcb61ff1654555be81c4df6d2585fc126aad65c0001489e5475f6fe32e66037e6473c70c869bce1a3e01c5373ea5b244b0d

                                                                          • C:\Users\Admin\Desktop\ClearGet.emf

                                                                            Filesize

                                                                            727KB

                                                                            MD5

                                                                            d51220c1fc84d0ba9c4652ce4d7c6cb2

                                                                            SHA1

                                                                            d352d037415650175eaecf60126d39680a4f274d

                                                                            SHA256

                                                                            833e2a994ab22b5e172a746aa5b630819fd2350dcd95abf3f8561e8aeda07a84

                                                                            SHA512

                                                                            9c70e4386fab43ad2f7e3936a6972ee4211b01359f384a3a9577a96f1f1d694a3447172702e5bf48cdd0cea6e14c48e4e07a3997b0e7652c514eda5d6c7dc0ed

                                                                          • C:\Users\Admin\Desktop\ConvertFromLimit.emf

                                                                            Filesize

                                                                            511KB

                                                                            MD5

                                                                            49a5adc158dedbf392304489a50fb010

                                                                            SHA1

                                                                            6e67a6ac805e26bde5c40117e0118fffd8bb1567

                                                                            SHA256

                                                                            e4351441a3c9f51825d3ac65c737a84f8367b6aa90789aa66efa6acc54bfb0ee

                                                                            SHA512

                                                                            e0e9595247eaff86f363bd5306177213ea4ea36f41d2520f7fcf4a14cf58834b4dcc646ab773717e2361006a66c6e9ffc1f379f9a3b33be98ccec6744b77a120

                                                                          • C:\Users\Admin\Desktop\ConvertToRename.pot

                                                                            Filesize

                                                                            820KB

                                                                            MD5

                                                                            2be14958db95d801f2f0946f0c9d15aa

                                                                            SHA1

                                                                            4c9144361eda5a9e62ac930a146762599754adce

                                                                            SHA256

                                                                            4dfd5303ecdf636e7bf1960f607bd4082294d31ec129abe6fa9a511c2c4314ed

                                                                            SHA512

                                                                            8ac387d811eaca1a8e754e9270ece7c6eb76cf9e3fc7a823ac60e04b79db22f17b142d28cfa5175d72212227f1f4edf79662df4854326795a1a88ed4e81d1e2e

                                                                          • C:\Users\Admin\Desktop\DisconnectRequest.xlsx

                                                                            Filesize

                                                                            14KB

                                                                            MD5

                                                                            4e3c538addbcc4325fcdae476bbdddf5

                                                                            SHA1

                                                                            9ec0811077bdece449f0db34ce7568ce61783e9d

                                                                            SHA256

                                                                            b361e6f9e4b3b8293abb3ecb2d7c63cdae59a4a68c2b3c305f8b5e09b357b141

                                                                            SHA512

                                                                            4e56eb77f285ba32e7cee60beaa85b9ad95fd4aa4e64ca7016c7a77214c73e57855002c39f79da9f0e7323412113b5bab0ecd275e34efb3bfb1dc2bb5c6747b2

                                                                          • C:\Users\Admin\Desktop\EnterOut.DVR-MS

                                                                            Filesize

                                                                            634KB

                                                                            MD5

                                                                            75dcb8bf4ccbe5d6148031e2efabd7c5

                                                                            SHA1

                                                                            bb66c22226ff3ff416fcb7da2fedae8578441377

                                                                            SHA256

                                                                            45a89bf2a8428d39b796402fa0021040aa9599ccaa6abe9e1bd68110ea950645

                                                                            SHA512

                                                                            fea142feb16a6c5798727b900de46594d5c6da80487c75345a2bfad40409421ef9c732090b53302990c1db774337d62a9b7d2b07078fb4027c549f428a4f5875

                                                                          • C:\Users\Admin\Desktop\FindConvert.xlsx

                                                                            Filesize

                                                                            13KB

                                                                            MD5

                                                                            6cec3842e3a0e50801aa0a09e1acf97f

                                                                            SHA1

                                                                            25c7b4e447bbaed429fe284bf1552e5cc43dda65

                                                                            SHA256

                                                                            a07724a3e3175890be2ca0f8a162117be3f377388c9c275f5afd396e4cf3f549

                                                                            SHA512

                                                                            07d0651e5d9e63888fb1492b054e6f43a57bcefe7ddc23f0a637d5b34c54ad9dcdc2473a8e30724a9ab3389dc7c4fef88041a0b12eef6d3f12edf5ec38382d56

                                                                          • C:\Users\Admin\Desktop\FormatNew.sys

                                                                            Filesize

                                                                            418KB

                                                                            MD5

                                                                            597e80a5706447ad55f3039d906c0a8b

                                                                            SHA1

                                                                            239041631194b7c3ad9f81956a2fcfbc1788ca5b

                                                                            SHA256

                                                                            4662f5f4ec4640bd6819b8c21e6dcaf6c247ac25aa93cdcf96a0a44b53a9cb31

                                                                            SHA512

                                                                            4fe74063a526fdc696fb7aa00227a3d3efe83efbe593339bf419da8b874a927026973b2b8ae568ce516648bf27baaa5feab80c4d63585f439d281b8a41bb4e62

                                                                          • C:\Users\Admin\Desktop\InvokeAdd.vstm

                                                                            Filesize

                                                                            851KB

                                                                            MD5

                                                                            5d41b5ca29d8bf10b71d324365b9d444

                                                                            SHA1

                                                                            d93059a6ea23cdba67a55af22892dee9bd9dddb8

                                                                            SHA256

                                                                            2c34b089efef92ca8a9d6b7b65753dcb5ba925a3f639795df02c57c4a9182cda

                                                                            SHA512

                                                                            abfe3566319875f7b002b1a7c3eb13e1fd099655c79ddba9e1c88442cb2acaf656d51df01fcae638c0920c3585c94f5a24bd064d1ef0b9108758f1289239b789

                                                                          • C:\Users\Admin\Desktop\JoinFormat.MOD

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            f1c70754b2fc810e74d5c6f506f8d69b

                                                                            SHA1

                                                                            a1f97077143122e2d5e473b1066898f5a0e38979

                                                                            SHA256

                                                                            e5d869514d14656ee48faee5b19de7c5b425ba4201bbc9494d3eeea536a57a43

                                                                            SHA512

                                                                            ad94fd1be394067f67745fd6d6a68af6c70e80b8c4c690d030d71b11046f1e87526094e65e03c367f57081d380981d8d1b19fd57d083cc78c4db3d069a02525c

                                                                          • C:\Users\Admin\Desktop\MergeGrant.css

                                                                            Filesize

                                                                            572KB

                                                                            MD5

                                                                            c3d1149fe5cc96b3b06fdd3975600c36

                                                                            SHA1

                                                                            77349f741a6f55a902126fe6c11fdd9846317658

                                                                            SHA256

                                                                            3d8717c2f57e332ee196fcc92e4f4e06cda5e7bf3117a07265f5084f73baa959

                                                                            SHA512

                                                                            031fc00cfe09251fc8f482907d5bf83b89343740bf9c143d0da2183b318df79c0b343ba81c90f93f1324bb0c11a51fb5e2d8048e2affb66eade2dbbfccd4938f

                                                                          • C:\Users\Admin\Desktop\NewDisable.xlsx

                                                                            Filesize

                                                                            480KB

                                                                            MD5

                                                                            f2b4c33aee7ac3f947729e521438fa2a

                                                                            SHA1

                                                                            7693ed7cff10c3425e2feac21291dde4e7a59eec

                                                                            SHA256

                                                                            af894d154cab031f417976496a15555a0ccefe3012444d84fa70c8d4d1547b6d

                                                                            SHA512

                                                                            f912ea7b4e78822f9b962f803cbeb44faf2972f90f438ca5b8c255306c5323ec159e579193fb1222245f72183927bea9f1d92bfffba31032d0629145e72c7796

                                                                          • C:\Users\Admin\Desktop\OpenTrace.eps

                                                                            Filesize

                                                                            542KB

                                                                            MD5

                                                                            72a0c8ded5c62a9be542c4a8cd5d386a

                                                                            SHA1

                                                                            991b1b5c2f132df3eba554eaffc4d32531cb0e7f

                                                                            SHA256

                                                                            20a262e8dee1bf78bbf84f80f207ef7a4e045438d821da9fd68301c1ae64a044

                                                                            SHA512

                                                                            81abbef38e3ed045d07c7236acf5e83ba4f8c69332665ee7c207a02f6059b1b78ecb34190ccef44afa518ec0fde77ce8b6a1a9133bf25c1064d1cbe474be565f

                                                                          • C:\Users\Admin\Desktop\PopUndo.ogg

                                                                            Filesize

                                                                            356KB

                                                                            MD5

                                                                            afd8a8716810c97a96713df3dea2387f

                                                                            SHA1

                                                                            84dd96a24d04e24ed98c7596c8153e35dbbc8e87

                                                                            SHA256

                                                                            6d8396b59e69a387cba2213ad54d1f62acddb29613b1b3cc6d92c634ec144b26

                                                                            SHA512

                                                                            4ee38bb34fd5d2ba1910ab8816b852cf4ed33c0b2379bc61f4e245a02397968281259cd927d209d411ebaba4f5649f9d821a2329842133c3286e2073ae94d64e

                                                                          • C:\Users\Admin\Desktop\RedoMeasure.mpa

                                                                            Filesize

                                                                            944KB

                                                                            MD5

                                                                            e4ac6bb4575e90fda9ba39ec0fd91c7f

                                                                            SHA1

                                                                            fa5ff024a74b12d200f4c9c190e612f07670ce47

                                                                            SHA256

                                                                            17b6f0b62dcd56561c2c3a993258bb733ef8bddbf87cfb503307aef90ab9a537

                                                                            SHA512

                                                                            aa584f847ae38b01feeaf00abd8238f473eefe8164c02715e161bda1215e823f26e96c1c861ddbe329a5967af76f79b80cb72b05ff54df865be47564b5b0d594

                                                                          • C:\Users\Admin\Desktop\RegisterCopy.asp

                                                                            Filesize

                                                                            1006KB

                                                                            MD5

                                                                            3b61c4cf03e3c954db844850170990c2

                                                                            SHA1

                                                                            1cb7e9b0a7f4ceeab5394ce6ae58282cbd8b6dba

                                                                            SHA256

                                                                            743bf88ef3b44c1683604c0bb1f551686c1324ebb1227ef356c9ebf1a729b1ce

                                                                            SHA512

                                                                            90e313914efc68d0badb34475b28a2f64b3659f55ab2e4e25c97282adbafa70d3e5cff1cfb0e27e934df4eae9922e0ac490757a5e82e25b5e7a98a0125e5aae8

                                                                          • C:\Users\Admin\Desktop\RemoveJoin.odt

                                                                            Filesize

                                                                            913KB

                                                                            MD5

                                                                            e792da1c334cbdb33e5489fad1b9e0c7

                                                                            SHA1

                                                                            433cc77e66edb4e8ada3c918bd90f4648fd56266

                                                                            SHA256

                                                                            8cc82038a7104298a8e5fc6b6d746b02488a19f765404cee80a251b38c52b309

                                                                            SHA512

                                                                            41b460a179dee71e3b2a5a4dd837cbb12fe4b617eb4e8922cb83ac1028d96e56a3b8833f45600f4647eb6ce0a671f621839490e1f4c12abda7405adb484e1416

                                                                          • C:\Users\Admin\Desktop\RestartOpen.bin

                                                                            Filesize

                                                                            882KB

                                                                            MD5

                                                                            7c90f7c9b7dbc3f364b24ba7c1fbc3b2

                                                                            SHA1

                                                                            2d5fac0353f21fe6943db430a3f48c08bf51e31e

                                                                            SHA256

                                                                            6ff788b7db965d98d29309b3c281549431c232271a4cac7f6e0ad9964e723728

                                                                            SHA512

                                                                            2b9f7d8c8c3c581eb29bd84d8f0af7daa0057849dd0f9ee89aa68d71b38fd2e601b97d5acd91a65446b0d41a0ed79cde5ae360a2ef169def8735e0ea552d8aa2

                                                                          • C:\Users\Admin\Desktop\SelectPush.xlsx

                                                                            Filesize

                                                                            9KB

                                                                            MD5

                                                                            cd60798fa0a955a6c9ef46e868c9edfa

                                                                            SHA1

                                                                            61b3928cbba91445bcbcdd19afbdd6b2480f2b15

                                                                            SHA256

                                                                            3581741076aa94f15d1c1e4e58d77ca7dcea3e5e099eff8973223b6dff6f83bd

                                                                            SHA512

                                                                            d65bbe43585dc72631d37a34fb703dd1ca89564ede8017ab9510ef1f1c65b5193550c74bfa5fe63352074113be1be5b499d38d75e970b4a4f6aacf52cae41c3e

                                                                          • C:\Users\Admin\Desktop\TraceNew.mhtml

                                                                            Filesize

                                                                            758KB

                                                                            MD5

                                                                            479af16599a0119c370c85ab0a94054a

                                                                            SHA1

                                                                            b9126f48f6e4d78e5247b0bc5df91f4c893fb46c

                                                                            SHA256

                                                                            b3282beb91c9f447bceed95057fbf393b65afdb475390d30ca7ee6a9f10213bf

                                                                            SHA512

                                                                            c9890ffae46875e4893f09c1d4afbed14a33e03683969535665e136a9b81a30603005e37f625e9f0238cc3826c34cd25a3af41731bc70940dfcc79d14acd0e65

                                                                          • C:\Users\Admin\Desktop\UnblockCompress.css

                                                                            Filesize

                                                                            449KB

                                                                            MD5

                                                                            61d97c7f5815ac09dca8db7499482d46

                                                                            SHA1

                                                                            026fa353d1a6a91c72700cc70e66756fa8228fad

                                                                            SHA256

                                                                            90e739e69050811dde96c49d528bc814bf39af53228277df82708632864042dc

                                                                            SHA512

                                                                            f3fdd4e66b6fee7355a576cf02a2c1384bee79bc00335cd69ed6fc5635dff02aef75df017dc989cb58ebd25305345416666083de7a0641c0847e77a71fc8544d

                                                                          • C:\Users\Admin\Desktop\UseEdit.docx

                                                                            Filesize

                                                                            14KB

                                                                            MD5

                                                                            ab37112351bfc70aded3442a90292d7c

                                                                            SHA1

                                                                            eabb5c601776993495d928889794ab6c25512d65

                                                                            SHA256

                                                                            1905ecb7011c987c711e538b2d2b353c911a220d2789cccaf6853ab2af7fbfb6

                                                                            SHA512

                                                                            dfe4cbaaa47428237234cc20a7b717d64012fd5cd68e7b6c2b5cad9f0a7938b1fb3e5ef19dabbd0746d43e859a86dcba55e495b21d205751e9f79c59f0dd6530

                                                                          • C:\Users\Admin\Desktop\WatchUnpublish.mpg

                                                                            Filesize

                                                                            387KB

                                                                            MD5

                                                                            0b0ab9a070232ffa162b265ed637bdc7

                                                                            SHA1

                                                                            52c5e7b69f651fea7c4f6c204c08f07f16cfe373

                                                                            SHA256

                                                                            bc91d7fc1282e9c43b91d482cd4e616f926ea199cb56a6ba3d904451216a582c

                                                                            SHA512

                                                                            5835e3c287a49ad0e41c4d43530a728c19653bf28e660ad2b41b032d1468d88b89b59dfff4d4580274d8700d17edfb20c96967614f8cbbfdd6d10004dae44882

                                                                          • C:\Users\Admin\Downloads\1111212121211111111.7z.crdownload

                                                                            Filesize

                                                                            318KB

                                                                            MD5

                                                                            99d8eda10a37f1aed8f9590f5a2a9486

                                                                            SHA1

                                                                            f17ea1aa0064a9a0c6f6f693de258371004d56b2

                                                                            SHA256

                                                                            7bc5f4171d06fc317be73292cf1f01d82d007fc534e481ea3bf2a7a32634eff9

                                                                            SHA512

                                                                            dce0c2ed54be26521679cfd84343c93e758a62d93b975656cceb83b6047d0170191fb92066a5e93e63f189102f0e224a6e9f429d89034bc0c5ade7b3553ad76b

                                                                          • C:\Users\Public\Desktop\Acrobat Reader DC.lnk

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            77019299439733436cf9077f9d4f1ce8

                                                                            SHA1

                                                                            c4e6488d40c891c55db1abcb519c0daa066d4034

                                                                            SHA256

                                                                            7e043ee1ebec4f627796ed4fcf4ac6073c520685d266f92059b0bcba13c82520

                                                                            SHA512

                                                                            fcec47f199807ce6369e0ebf9b42ad8485f9c676bbc774a2108ecab605489cae1067709ed8d72eba31a30aa7016bb4125a329682492e0a74d811975c9aaa4d58

                                                                          • C:\Users\Public\Desktop\Firefox.lnk

                                                                            Filesize

                                                                            1000B

                                                                            MD5

                                                                            d8b519cb88a519390d865dc033b78792

                                                                            SHA1

                                                                            b662db0c07999199ac0ecc47d2001f7462dd49f0

                                                                            SHA256

                                                                            fc2aa756e59d586d9d3392d317816aff574fb032c17bdfb277e651d92d46230c

                                                                            SHA512

                                                                            d43166259cd7a0e9332ba2764fd46bc8b87c28c122654926103f3dec5034a15b3d3f76a98d6c5d3d873286c8efc23603201b0eae339b0813847941bc2b1dccb5

                                                                          • C:\Users\Public\Desktop\Microsoft Edge.lnk

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            2791a9eeea22bb5f17c166e3f2efd6c6

                                                                            SHA1

                                                                            3cd50dd492faad9a72c7b2e8eec7edca91257066

                                                                            SHA256

                                                                            bf7c5bdbcd11fadd36d1448120a3b8f9eb2b25568f5843766165e08b4501b2b5

                                                                            SHA512

                                                                            c5dd0f803cc594930714247a035882e75b3f74622b6c998a877e0533aa29e53a49e59f6774c85117e6b12b492e2a7bbbf569145a40a0462d0f11b386b657403f

                                                                          • C:\Users\Public\Desktop\VLC media player.lnk

                                                                            Filesize

                                                                            923B

                                                                            MD5

                                                                            fd206e926049796e28bfe4bc7534c33f

                                                                            SHA1

                                                                            fa13845544b550ae6e4bab914da765b3aab97628

                                                                            SHA256

                                                                            d8e7a36527b5ebc3fd0e043e26c5981ae97220473e970db4cd3b6873534c1b88

                                                                            SHA512

                                                                            c7269201e0603338e4643d524415e3172540e31e9755938afb37e9f983f6d19c65244964f30327443672e28b7613ad1ddf716cddb66b15a18d07d6dc160724c2

                                                                          • C:\webdhcpcommonSvc\8oMu5MN3n5JCWNJxMaAIphizfcxgGBRDGUZIcPGuQFLLvR2dRGJqnS3KpD.vbe

                                                                            Filesize

                                                                            244B

                                                                            MD5

                                                                            5f11880060018f695bb523296529b1df

                                                                            SHA1

                                                                            1dfa58c84423fd79427f1b7fcc1d4727dd34b819

                                                                            SHA256

                                                                            8beedcd0d01db2d7ef859f165ba23bf88a9e5211f28a3986fcd7a6b2611e82a9

                                                                            SHA512

                                                                            42c7b393a46d6e57f0861eec7953ebf3a90797a0b6617ca766e10f0ae5439c8098b46201981ada1350f473ffa4a47e1c088768ec4128de812a87a3b6d9fd0135

                                                                          • C:\webdhcpcommonSvc\SyspSItsJvcfBWgITeGIfXkr8b6Z5fx5kvFp18noZ5XmxTi8nmFHQ.bat

                                                                            Filesize

                                                                            89B

                                                                            MD5

                                                                            2edbb8d24439a86aab15b232a7e4b295

                                                                            SHA1

                                                                            7a9ad09a446c54d68e3bf8c53f46e98fd45cdbbe

                                                                            SHA256

                                                                            3a7627a03deb5c5bc2c6773f07a6f83100c696d2dd39b05cd81a2e8588d05abc

                                                                            SHA512

                                                                            eaae6f9378d68bcd7427921f9ad7a458c8cd48379acde62eaa4ab8ecb742d144edfb1128adbb94a419ed8e0fcb724cb07ba72bafe226f81eb9038de24d1454c9

                                                                          • C:\webdhcpcommonSvc\comcontainerSaves.exe

                                                                            Filesize

                                                                            527KB

                                                                            MD5

                                                                            4be7f248538eef667fc068d712fb5696

                                                                            SHA1

                                                                            1a674bf38fe2f64630d2b9c0c12253e51724b077

                                                                            SHA256

                                                                            9ac4dbb3883bf1a6823c29b84c841c87adb432210d8aebe8c284cde292960432

                                                                            SHA512

                                                                            12879f752d1b9a24a3185016d57c5a78c4c7eecd9279eacaf4eac37a30ad6285f5ac7285a913fba145a39b6c044252302ca74b54da6178ca9930efe0cbeec57d

                                                                          • \??\c:\Users\Admin\AppData\Local\Temp\m3ethbq5\m3ethbq5.0.cs

                                                                            Filesize

                                                                            385B

                                                                            MD5

                                                                            1ba52446796f7f5c733c3453999ba373

                                                                            SHA1

                                                                            41852da439dbf309d32b8ec6efc5335d028390fa

                                                                            SHA256

                                                                            fbab6cfc0f4da610a4a883cf2149dea9c9a7c24ebeccb501877e388cda055add

                                                                            SHA512

                                                                            e781945103205d5c7abde6675f3e52ab3911f4adf072e36700392d1eb4c33af95cc35253f51cdf3d4697f641a84efc12d8ae3dfc086e89d495d70b8b63eba696

                                                                          • \??\c:\Users\Admin\AppData\Local\Temp\m3ethbq5\m3ethbq5.cmdline

                                                                            Filesize

                                                                            235B

                                                                            MD5

                                                                            3724a5c554009ce50c33514d1e65dfe5

                                                                            SHA1

                                                                            c76c741a8d9ad6142b508f13abe58673b1886b3a

                                                                            SHA256

                                                                            f02070f97c161c03b67392acc32144441915aff6349325ba01d6ea0f69951d1d

                                                                            SHA512

                                                                            c2ffd2cf907e3c4c2b7b777cefc0ec708e308c804284d1c70333f11331e1c9a749ffb6f97d6c1f4e03272d592b2abcdeb16f66c0e6502ebe413d9bd7a862ccaa

                                                                          • \??\c:\Windows\System32\CSCE8734FFE66284ED5BBA5C61717FCBA35.TMP

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            72f89171a1931b941e3fcc281bfc549e

                                                                            SHA1

                                                                            9648145810bb8b9ecef682a8215a08065723852e

                                                                            SHA256

                                                                            b1858806d65859b1f0607bdb45b33cbc0745c496a45414b6833c94a5a792a938

                                                                            SHA512

                                                                            04e9a596bc2354251ef44848eb1662658b053fd6065369c8ca46f6c597516738d57efafe9669fb9d20dbe4b957d6afa379fc48a06c252260419a82de72e4cf8a

                                                                          • memory/5168-825-0x0000000000460000-0x00000000004EA000-memory.dmp

                                                                            Filesize

                                                                            552KB

                                                                          • memory/5168-827-0x0000000000B80000-0x0000000000B8E000-memory.dmp

                                                                            Filesize

                                                                            56KB

                                                                          • memory/5692-1018-0x000001314EAF0000-0x000001314EAF1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5692-1028-0x000001314EAF0000-0x000001314EAF1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5692-1027-0x000001314EAF0000-0x000001314EAF1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5692-1026-0x000001314EAF0000-0x000001314EAF1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5692-1025-0x000001314EAF0000-0x000001314EAF1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5692-1022-0x000001314EAF0000-0x000001314EAF1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5692-1023-0x000001314EAF0000-0x000001314EAF1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5692-1024-0x000001314EAF0000-0x000001314EAF1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5692-1016-0x000001314EAF0000-0x000001314EAF1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5692-1017-0x000001314EAF0000-0x000001314EAF1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/6688-1058-0x0000000000550000-0x0000000000558000-memory.dmp

                                                                            Filesize

                                                                            32KB