Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
26/11/2023, 23:59
Behavioral task
behavioral1
Sample
a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe
Resource
win7-20231023-en
General
-
Target
a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe
-
Size
223KB
-
MD5
8d3f2f53848fd102286d88695f8a223a
-
SHA1
6c1990c0d2a15bdd6d259122f4341f5f9c23281b
-
SHA256
a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f
-
SHA512
f5ce8c099b0e50ed1cf217281ab7d0e3900415ad43fb4d9dac8a06aad9700585394f0d29d4c4c747e398f00d7de50e79b2730560bdd9015c792f7e3e6cefd80e
-
SSDEEP
3072:QZ7wXfSRZ0ON/EwW66wN94xu4CkAZJM2k5D66L+NfGbVON2Nqi/6gS5UoWXHz72n:YwPSUONLNsuWA7koN+boRi9S6oiz72D
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1284 created 424 1284 Explorer.EXE 2 -
Drops file in Drivers directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\uKapLnoHbs2GK.sys dvdplay.exe File opened for modification C:\Windows\system32\drivers\n9mDqxbwDcVXBE.sys dvdplay.exe File opened for modification C:\Windows\system32\drivers\X6Qj56HxDo.sys dvdplay.exe File opened for modification C:\Windows\system32\drivers\sI59BiWDHBz.dku dvdplay.exe File opened for modification C:\Windows\system32\drivers\0wgZZx8Ggd.sys dvdplay.exe File opened for modification C:\Windows\system32\drivers\PfwcNTQNjgT57.bvi dvdplay.exe File opened for modification C:\Windows\system32\drivers\JKMtmBxBtF3o.awf dvdplay.exe File created C:\Windows\System32\drivers\XoFJO9YJM.sys dvdplay.exe File opened for modification C:\Windows\system32\drivers\Mh8O7okzfl.iac dvdplay.exe -
Deletes itself 1 IoCs
pid Process 528 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 dvdplay.exe -
Loads dropped DLL 9 IoCs
pid Process 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1248 Dwm.exe 1248 Dwm.exe 1248 Dwm.exe 1248 Dwm.exe -
resource yara_rule behavioral1/memory/536-0-0x00000000001B0000-0x000000000021E000-memory.dmp upx behavioral1/memory/536-46-0x00000000001B0000-0x000000000021E000-memory.dmp upx behavioral1/memory/536-79-0x00000000001B0000-0x000000000021E000-memory.dmp upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
resource yara_rule behavioral1/files/0x0010000000015c2f-162.dat vmprotect behavioral1/files/0x001e000000015c2f-266.dat vmprotect behavioral1/files/0x002c000000015c2f-373.dat vmprotect behavioral1/files/0x003a000000015c2f-478.dat vmprotect -
Drops file in System32 directory 23 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173 dvdplay.exe File created C:\Windows\system32\ \Windows\System32\FVEzJrP.sys dvdplay.exe File opened for modification C:\Windows\system32\Xi24A2eBRAVX5g.glg dvdplay.exe File opened for modification C:\Windows\system32\xxszGjTN2PUWH6.cvq dvdplay.exe File opened for modification C:\Windows\system32\oyKkt4JhvpxU5.aju dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_ADB601E2C381343DA1163E5F08582475 dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_ADB601E2C381343DA1163E5F08582475 dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173 dvdplay.exe File opened for modification C:\Windows\system32\SXFPrGXZpnaG.sys dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 dvdplay.exe File opened for modification C:\Windows\system32\x9NmB5sopkb.wvl dvdplay.exe File opened for modification C:\Windows\system32\Hdj7O8V14yo.sys dvdplay.exe File opened for modification C:\Windows\system32\piJ1kairIVk.sys dvdplay.exe File opened for modification C:\Windows\system32\Re50nvI6OpYLPW.sys dvdplay.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 dvdplay.exe -
Drops file in Program Files directory 31 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\OzY2HPskBcnwL.tds dvdplay.exe File opened for modification C:\Program Files (x86)\9Mkq41MAZdzE.dgv dvdplay.exe File opened for modification C:\Program Files\DVD Maker\manifest.json dvdplay.exe File opened for modification C:\Program Files\VideoLAN\lib\6c4015d4.js Explorer.EXE File opened for modification C:\Program Files\VideoLAN\manifest.json Explorer.EXE File opened for modification C:\Program Files\Microsoft Office\lib\6c40178d.js Dwm.exe File opened for modification C:\Program Files (x86)\7wrD7BWeXXFQCf.ghv dvdplay.exe File opened for modification C:\Program Files\Microsoft Office\manifest.json Dwm.exe File opened for modification C:\Program Files (x86)\W0yT4QZEOMD9.sys dvdplay.exe File opened for modification C:\Program Files (x86)\LFjUb2vvssX.sys dvdplay.exe File opened for modification C:\Program Files\VideoLAN\4d5258bc.html Explorer.EXE File opened for modification C:\Program Files\Microsoft Office\3ddb7b2c.js Dwm.exe File opened for modification C:\Program Files\Microsoft Office\5cc938c2.js Dwm.exe File opened for modification C:\Program Files\U3AZKGAlQcc.fud dvdplay.exe File opened for modification C:\Program Files\VUq9SDnkiLtF.sys dvdplay.exe File opened for modification C:\Program Files\DVD Maker\lib\6c400fde.js dvdplay.exe File opened for modification C:\Program Files\VideoLAN\3ddb7a30.js Explorer.EXE File opened for modification C:\Program Files\CUj8GNkhTexmhZ.jtk dvdplay.exe File opened for modification C:\Program Files\DVD Maker\3ddb76c8.js dvdplay.exe File opened for modification C:\Program Files\DVD Maker\4d52547a.html dvdplay.exe File opened for modification C:\Program Files\DVD Maker\5cc9322c.js dvdplay.exe File opened for modification C:\Program Files\VideoLAN\5cc93748.js Explorer.EXE File opened for modification C:\Program Files\qxmPat3XGyhPNP.sys dvdplay.exe File opened for modification C:\Program Files\1QuIzvK4mDE09.fpf dvdplay.exe File opened for modification C:\Program Files\ecLvyGEAy7.sys dvdplay.exe File opened for modification C:\Program Files\Microsoft Office\4d5259f7.html Dwm.exe File opened for modification C:\Program Files\hK8FJdWoCj.sys dvdplay.exe File opened for modification C:\Program Files\hJNbTQ1wZAhT.jpl dvdplay.exe File opened for modification C:\Program Files (x86)\nW4qy5gO8jysDf.sys dvdplay.exe File opened for modification C:\Program Files (x86)\GhN2yktkiTE0Pq.dnb dvdplay.exe File opened for modification C:\Program Files (x86)\4neyTZeEzMs7.sys dvdplay.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\DFJLDEa5s.sys dvdplay.exe File opened for modification C:\Windows\2OuDWbmricvxO5.sys dvdplay.exe File opened for modification C:\Windows\ao8237S2354.vhi dvdplay.exe File opened for modification C:\Windows\w5WnC3Z2tXUy.sys dvdplay.exe File opened for modification C:\Windows\QcXvppFvJE.ifz dvdplay.exe File opened for modification C:\Windows\1NUkHaI3appUSn.sys dvdplay.exe File opened for modification C:\Windows\aOe7PW7f350tYH.hir dvdplay.exe File created C:\Windows\Help\dvdplay.exe Explorer.EXE File opened for modification C:\Windows\Help\dvdplay.exe Explorer.EXE File opened for modification C:\Windows\2Qt9AzGmbmrv2W.jhs dvdplay.exe File opened for modification C:\Windows\8Z81Pimrt6YWy.sys dvdplay.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 476 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs dvdplay.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad dvdplay.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" dvdplay.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dvdplay.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs dvdplay.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs dvdplay.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" perfmon.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dvdplay.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3a-67-4d-fa-d0\WpadDecisionTime = a0e96aaec420da01 dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dvdplay.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3a-67-4d-fa-d0\WpadDecision = "0" dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E81218D-F66A-4F21-AB78-A232F63F8617} dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings dvdplay.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" dvdplay.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix perfmon.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E81218D-F66A-4F21-AB78-A232F63F8617}\WpadDecision = "0" dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E81218D-F66A-4F21-AB78-A232F63F8617}\0e-3a-67-4d-fa-d0 dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings perfmon.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections dvdplay.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 dvdplay.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E81218D-F66A-4F21-AB78-A232F63F8617}\WpadNetworkName = "Network 2" dvdplay.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" perfmon.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings perfmon.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 perfmon.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs dvdplay.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs dvdplay.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 dvdplay.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 dvdplay.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\9DA39F48F27F59A2921CCC13F084DA4999B1B91D\Blob = 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 dvdplay.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\9DA39F48F27F59A2921CCC13F084DA4999B1B91D\Blob = 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 dvdplay.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d0030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\9DA39F48F27F59A2921CCC13F084DA4999B1B91D dvdplay.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\9DA39F48F27F59A2921CCC13F084DA4999B1B91D\Blob = 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 dvdplay.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 2736 dvdplay.exe 1952 perfmon.exe 2736 dvdplay.exe 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 2736 dvdplay.exe 2736 dvdplay.exe 1284 Explorer.EXE 1284 Explorer.EXE 2736 dvdplay.exe 2736 dvdplay.exe 1284 Explorer.EXE 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 1284 Explorer.EXE 2736 dvdplay.exe 2736 dvdplay.exe 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 2736 dvdplay.exe 2736 dvdplay.exe 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 2736 dvdplay.exe 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1284 Explorer.EXE -
Suspicious behavior: LoadsDriver 59 IoCs
pid Process 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe Token: SeTcbPrivilege 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe Token: SeDebugPrivilege 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe Token: SeDebugPrivilege 1284 Explorer.EXE Token: SeDebugPrivilege 1284 Explorer.EXE Token: SeDebugPrivilege 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe Token: SeIncBasePriorityPrivilege 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe Token: SeDebugPrivilege 2736 dvdplay.exe Token: SeDebugPrivilege 2736 dvdplay.exe Token: SeDebugPrivilege 2736 dvdplay.exe Token: SeDebugPrivilege 2736 dvdplay.exe Token: SeDebugPrivilege 2736 dvdplay.exe Token: SeBackupPrivilege 2736 dvdplay.exe Token: SeDebugPrivilege 2736 dvdplay.exe Token: SeDebugPrivilege 2736 dvdplay.exe Token: SeDebugPrivilege 2736 dvdplay.exe Token: SeDebugPrivilege 1284 Explorer.EXE Token: SeBackupPrivilege 1284 Explorer.EXE Token: SeDebugPrivilege 1248 Dwm.exe Token: SeBackupPrivilege 1248 Dwm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1284 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 536 wrote to memory of 1284 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 20 PID 536 wrote to memory of 1284 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 20 PID 536 wrote to memory of 1284 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 20 PID 536 wrote to memory of 1284 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 20 PID 536 wrote to memory of 1284 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 20 PID 1284 wrote to memory of 2736 1284 Explorer.EXE 28 PID 1284 wrote to memory of 2736 1284 Explorer.EXE 28 PID 1284 wrote to memory of 2736 1284 Explorer.EXE 28 PID 1284 wrote to memory of 2736 1284 Explorer.EXE 28 PID 1284 wrote to memory of 2736 1284 Explorer.EXE 28 PID 1284 wrote to memory of 2736 1284 Explorer.EXE 28 PID 1284 wrote to memory of 2736 1284 Explorer.EXE 28 PID 1284 wrote to memory of 2736 1284 Explorer.EXE 28 PID 536 wrote to memory of 424 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 2 PID 536 wrote to memory of 424 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 2 PID 536 wrote to memory of 424 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 2 PID 536 wrote to memory of 424 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 2 PID 536 wrote to memory of 424 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 2 PID 536 wrote to memory of 528 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 29 PID 536 wrote to memory of 528 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 29 PID 536 wrote to memory of 528 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 29 PID 536 wrote to memory of 528 536 a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe 29 PID 528 wrote to memory of 476 528 cmd.exe 31 PID 528 wrote to memory of 476 528 cmd.exe 31 PID 528 wrote to memory of 476 528 cmd.exe 31 PID 528 wrote to memory of 476 528 cmd.exe 31 PID 2736 wrote to memory of 1952 2736 dvdplay.exe 33 PID 2736 wrote to memory of 1952 2736 dvdplay.exe 33 PID 2736 wrote to memory of 1952 2736 dvdplay.exe 33 PID 2736 wrote to memory of 1952 2736 dvdplay.exe 33 PID 2736 wrote to memory of 1952 2736 dvdplay.exe 33 PID 2736 wrote to memory of 1952 2736 dvdplay.exe 33 PID 2736 wrote to memory of 1952 2736 dvdplay.exe 33 PID 2736 wrote to memory of 1952 2736 dvdplay.exe 33 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20 PID 2736 wrote to memory of 1284 2736 dvdplay.exe 20
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:424
-
C:\Windows\Help\dvdplay.exe"C:\Windows\Help\dvdplay.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\perfmon.exe"C:\Windows\system32\perfmon.exe"3⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe"C:\Users\Admin\AppData\Local\Temp\a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe"2⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:476
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
Filesize
415KB
MD564bc1983743c584a9ad09dacf12792e5
SHA10f14098f523d21f11129c4df09451413ddff6d61
SHA256057ec356f1577fe86b706e5aeb74e3bdd6fe04d22586fecf69b866f8f72db7f5
SHA5129ab4ddb64bd97dd1a7ee15613a258edf1d2eba880a0896a91487c47a32c9bd1118cde18211053a5b081216d123d5f901b454a525cbba01d8067c31babd8c8c3c
-
Filesize
447KB
MD5d15f5f23df8036bd5089ce8d151b0e0d
SHA14066ff4d92ae189d92fcdfb8c11a82cc9db56bb2
SHA256f2c40dde6f40beaa3c283b66791ff27e6f06d66c8dd6eff5262f51e02ee26520
SHA512feaec8a00346b0a74c530859785e1b280da5833bf3113083bf4664ebee85b14ceca648499f36d266d329d602349f9ad0fc21a10e605377b3a2c24b456f3a9bd9
-
Filesize
415KB
MD52ab2cc083d6c7a14d0c2e76e9a110342
SHA1b113699238f7b8e46786a8e114168333fbb32b80
SHA256fd859ffcf859a029b960768c2e7825b51782422dbf678dee9b887e2863d3abba
SHA5122ab0bbcb840508561d503bece9176b845c78d285c11a41d91acb8517b3bab1803d41b483c094a3dafafb43a2674ff8344bb1b5799177e95cdf82c6a998836a28
-
Filesize
11KB
MD52c97f495cac9ec9d86bfb2c8a264133a
SHA1976daabd0a2bc133380035aa7676362e05034109
SHA25696a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2
SHA5122d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76
-
Filesize
11KB
MD52c97f495cac9ec9d86bfb2c8a264133a
SHA1976daabd0a2bc133380035aa7676362e05034109
SHA25696a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2
SHA5122d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57713cf4d6ee5a0b897467e27fc581def
SHA19869b3de46a23fa07244cf08cb55d5b0d9592a75
SHA2561d76cff93e76286855cd637b649e2e9481917ffb6dc0a17a9894d6f25c03b746
SHA5123273afab124448dd9d5478f74ed49b38fec5d8e24673973b703491d920c0e0ff8e84659d0ec279ac70ce0967269c0caebb69d3a0e275d80e952b2ae7ad9ae63e
-
Filesize
447KB
MD5c3f402c80c48412f277bd5be3b299e53
SHA16fbc5af54bad77872a23fe361666192d2653266d
SHA2568ee6322b41af0a9dfbe278fa65a963358ba6734ceb681dd3eafb9387e43bc540
SHA51222d1314d66404f9a6beab0c3141878f77af5f29bf139665149ac1ea01ab8e6b35eb6f7717b70ddb4f78688d5af79c7d4d518c4fec7b9a9b84a2fba07cba3c4bc
-
Filesize
11KB
MD52c97f495cac9ec9d86bfb2c8a264133a
SHA1976daabd0a2bc133380035aa7676362e05034109
SHA25696a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2
SHA5122d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76
-
Filesize
11KB
MD52c97f495cac9ec9d86bfb2c8a264133a
SHA1976daabd0a2bc133380035aa7676362e05034109
SHA25696a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2
SHA5122d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76
-
Filesize
11KB
MD52c97f495cac9ec9d86bfb2c8a264133a
SHA1976daabd0a2bc133380035aa7676362e05034109
SHA25696a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2
SHA5122d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76
-
Filesize
11KB
MD52c97f495cac9ec9d86bfb2c8a264133a
SHA1976daabd0a2bc133380035aa7676362e05034109
SHA25696a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2
SHA5122d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76
-
Filesize
11KB
MD52c97f495cac9ec9d86bfb2c8a264133a
SHA1976daabd0a2bc133380035aa7676362e05034109
SHA25696a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2
SHA5122d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76
-
Filesize
11KB
MD52c97f495cac9ec9d86bfb2c8a264133a
SHA1976daabd0a2bc133380035aa7676362e05034109
SHA25696a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2
SHA5122d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76
-
Filesize
11KB
MD52c97f495cac9ec9d86bfb2c8a264133a
SHA1976daabd0a2bc133380035aa7676362e05034109
SHA25696a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2
SHA5122d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76
-
Filesize
11KB
MD52c97f495cac9ec9d86bfb2c8a264133a
SHA1976daabd0a2bc133380035aa7676362e05034109
SHA25696a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2
SHA5122d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76
-
Filesize
11KB
MD52c97f495cac9ec9d86bfb2c8a264133a
SHA1976daabd0a2bc133380035aa7676362e05034109
SHA25696a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2
SHA5122d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76