Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    154s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 14:38

General

  • Target

    018df191f0db6e21907cc999d9f6467c.exe

  • Size

    294KB

  • MD5

    018df191f0db6e21907cc999d9f6467c

  • SHA1

    1557261aa56ecd7f355f104b80ad8ad2f620eee2

  • SHA256

    08dad3498c2ab4855eac9c9324fca017308b5aa1bc573c95c37148b4ed89f08d

  • SHA512

    2e440a1d343981a457e6ca0459b67c8be574173f49f90e72530de8c8f36727c322d3136d39b2dac0ea78fe2b6a889bc0c1d889939917cf11916b79e8b610b955

  • SSDEEP

    6144:wz4aVvv5nsxGlx4fbDHHWnQP9anNRrLYW92Q9WnlJifcUWsOC8rlo:wEaVnx2Glxqbbf9Lw9WngUy8rlo

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 38 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 12 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 39 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe
    "C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\SysWOW64\ACCTRES.exe
      "C:\Windows\system32\ACCTRES.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2104
      • C:\Windows\SysWOW64\acppage.exe
        "C:\Windows\system32\acppage.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Windows\SysWOW64\amstream.exe
          "C:\Windows\system32\amstream.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Enumerates connected drives
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Windows\SysWOW64\AdmTmpl.exe
            "C:\Windows\system32\AdmTmpl.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Enumerates connected drives
            • Drops file in System32 directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3008
            • C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe
              "C:\Windows\system32\api-ms-win-crt-private-l1-1-0.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Enumerates connected drives
              • Drops file in System32 directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1656
              • C:\Windows\SysWOW64\ActionCenter.exe
                "C:\Windows\system32\ActionCenter.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1376
                • C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe
                  "C:\Windows\system32\api-ms-win-crt-heap-l1-1-0.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2032
                  • C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe
                    "C:\Windows\system32\api-ms-win-core-debug-l1-1-0.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe"
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:576
                    • C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe
                      "C:\Windows\system32\api-ms-win-core-string-l1-1-0.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe" -m"576:C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe"
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Enumerates connected drives
                      • Drops file in System32 directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1616
                      • C:\Windows\SysWOW64\aclui.exe
                        "C:\Windows\system32\aclui.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe" -m"576:C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe" -m"1616:C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe"
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1952
                        • C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe
                          "C:\Windows\system32\api-ms-win-core-delayload-l1-1-0.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe" -m"576:C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe" -m"1616:C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe" -m"1952:C:\Windows\SysWOW64\aclui.exe"
                          12⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Enumerates connected drives
                          • Drops file in System32 directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1784
                          • C:\Windows\SysWOW64\accessibilitycpl.exe
                            "C:\Windows\system32\accessibilitycpl.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe" -m"576:C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe" -m"1616:C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe" -m"1952:C:\Windows\SysWOW64\aclui.exe" -m"1784:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe"
                            13⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Enumerates connected drives
                            • Drops file in System32 directory
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2120
                            • C:\Windows\SysWOW64\acledit.exe
                              "C:\Windows\system32\acledit.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe" -m"576:C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe" -m"1616:C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe" -m"1952:C:\Windows\SysWOW64\aclui.exe" -m"1784:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe" -m"2120:C:\Windows\SysWOW64\accessibilitycpl.exe"
                              14⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in System32 directory
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:1608
                              • C:\Windows\SysWOW64\actxprxy.exe
                                "C:\Windows\system32\actxprxy.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe" -m"576:C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe" -m"1616:C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe" -m"1952:C:\Windows\SysWOW64\aclui.exe" -m"1784:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe" -m"2120:C:\Windows\SysWOW64\accessibilitycpl.exe" -m"1608:C:\Windows\SysWOW64\acledit.exe"
                                15⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Drops file in System32 directory
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:2912
                                • C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe
                                  "C:\Windows\system32\api-ms-win-core-delayload-l1-1-0.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe" -m"576:C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe" -m"1616:C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe" -m"1952:C:\Windows\SysWOW64\aclui.exe" -m"1784:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe" -m"2120:C:\Windows\SysWOW64\accessibilitycpl.exe" -m"1608:C:\Windows\SysWOW64\acledit.exe" -m"2912:C:\Windows\SysWOW64\actxprxy.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Enumerates connected drives
                                  • Drops file in System32 directory
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:1700
                                  • C:\Windows\SysWOW64\adsnt.exe
                                    "C:\Windows\system32\adsnt.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe" -m"576:C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe" -m"1616:C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe" -m"1952:C:\Windows\SysWOW64\aclui.exe" -m"1784:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe" -m"2120:C:\Windows\SysWOW64\accessibilitycpl.exe" -m"1608:C:\Windows\SysWOW64\acledit.exe" -m"2912:C:\Windows\SysWOW64\actxprxy.exe" -m"1700:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Enumerates connected drives
                                    • Drops file in System32 directory
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1948
                                    • C:\Windows\SysWOW64\api-ms-win-core-console-l1-1-0.exe
                                      "C:\Windows\system32\api-ms-win-core-console-l1-1-0.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe" -m"576:C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe" -m"1616:C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe" -m"1952:C:\Windows\SysWOW64\aclui.exe" -m"1784:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe" -m"2120:C:\Windows\SysWOW64\accessibilitycpl.exe" -m"1608:C:\Windows\SysWOW64\acledit.exe" -m"2912:C:\Windows\SysWOW64\actxprxy.exe" -m"1700:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe" -m"1948:C:\Windows\SysWOW64\adsnt.exe"
                                      18⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Enumerates connected drives
                                      • Drops file in System32 directory
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2096
                                      • C:\Windows\SysWOW64\aaclient.exe
                                        "C:\Windows\system32\aaclient.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe" -m"576:C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe" -m"1616:C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe" -m"1952:C:\Windows\SysWOW64\aclui.exe" -m"1784:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe" -m"2120:C:\Windows\SysWOW64\accessibilitycpl.exe" -m"1608:C:\Windows\SysWOW64\acledit.exe" -m"2912:C:\Windows\SysWOW64\actxprxy.exe" -m"1700:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe" -m"1948:C:\Windows\SysWOW64\adsnt.exe" -m"2096:C:\Windows\SysWOW64\api-ms-win-core-console-l1-1-0.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Adds Run key to start application
                                        • Drops file in System32 directory
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2920
                                        • C:\Windows\SysWOW64\aeevts.exe
                                          "C:\Windows\system32\aeevts.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe" -m"576:C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe" -m"1616:C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe" -m"1952:C:\Windows\SysWOW64\aclui.exe" -m"1784:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe" -m"2120:C:\Windows\SysWOW64\accessibilitycpl.exe" -m"1608:C:\Windows\SysWOW64\acledit.exe" -m"2912:C:\Windows\SysWOW64\actxprxy.exe" -m"1700:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe" -m"1948:C:\Windows\SysWOW64\adsnt.exe" -m"2096:C:\Windows\SysWOW64\api-ms-win-core-console-l1-1-0.exe" -m"2920:C:\Windows\SysWOW64\aaclient.exe"
                                          20⤵
                                          • Deletes itself
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Enumerates connected drives
                                          • Drops file in System32 directory
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:2104
                                        • C:\Windows\SysWOW64\netsh.exe
                                          "C:\Windows\system32\netsh.exe" firewall add allowedprogram "C:\Windows\SysWOW64\aaclient.exe" enable
                                          20⤵
                                          • Modifies Windows Firewall
                                          PID:2720
                                        • C:\Windows\SysWOW64\aaclient.exe
                                          "C:\Windows\SysWOW64\aaclient.exe" -m"1936:C:\Users\Admin\AppData\Local\Temp\018df191f0db6e21907cc999d9f6467c.exe" -m"2104:C:\Windows\SysWOW64\ACCTRES.exe" -m"2404:C:\Windows\SysWOW64\acppage.exe" -m"2728:C:\Windows\SysWOW64\amstream.exe" -m"3008:C:\Windows\SysWOW64\AdmTmpl.exe" -m"1656:C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe" -m"1376:C:\Windows\SysWOW64\ActionCenter.exe" -m"2032:C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe" -m"576:C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe" -m"1616:C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe" -m"1952:C:\Windows\SysWOW64\aclui.exe" -m"1784:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe" -m"2120:C:\Windows\SysWOW64\accessibilitycpl.exe" -m"1608:C:\Windows\SysWOW64\acledit.exe" -m"2912:C:\Windows\SysWOW64\actxprxy.exe" -m"1700:C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe" -m"1948:C:\Windows\SysWOW64\adsnt.exe" -m"2096:C:\Windows\SysWOW64\api-ms-win-core-console-l1-1-0.exe" -w2920
                                          20⤵
                                          • Executes dropped EXE
                                          • Enumerates connected drives
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ACCTRES.exe

    Filesize

    182KB

    MD5

    3139474451312c90a06f6f4b698911ad

    SHA1

    c380fff3b93ff77be43f3ee0269dca20acd16770

    SHA256

    f2f5c1b9d1060b815da2c9d0bc8313864409be3c49498f53a199955d15f04c41

    SHA512

    6b5f652c4cfe5f69ed8da43bbe1d3743291754d981374d0938aa455962ee0332d9598cc2e146ea744c4892be7c81e5807e851af2eca22488c981dc97c0a85da2

  • C:\Windows\SysWOW64\ActionCenter.exe

    Filesize

    50KB

    MD5

    049d1709eedc4b12d09151163d47263e

    SHA1

    9c45a7432d41b518a36aeee8a0b9c458455dfd30

    SHA256

    69893fb4c2158d18a99a6cf2a0f53ae840ae7f2aea063b5b622e1c774de4009b

    SHA512

    8fe15c57d4b79de0de014474378107762d2d8176b63d307c2dd70818041c8b9bb3235c589448ba08cff89b493b556f9a839e0bd7924dac6966897d753ab38c1b

  • C:\Windows\SysWOW64\ActionCenter.exe

    Filesize

    154KB

    MD5

    89367c012e78d8f2e90297e12bbc011e

    SHA1

    8233a6e050f98bbd9ebfe4514a6385b073b96bf1

    SHA256

    3dd4c0a9f43abe80ce3f0796f1a6929f369390939e52baa55beddc8f46d00a43

    SHA512

    3294c04715ea981715b1ff04923492f401e9ea52c59a52dfa1bf980916d848ff8fcb04d8627dd1bb00be63b0b0560b217f134822e253ad51ad23ee5a7eeaed71

  • C:\Windows\SysWOW64\AdmTmpl.exe

    Filesize

    127KB

    MD5

    1f75be63cbe3bf12165734138f11fc5b

    SHA1

    d533e22cdfa142a37572a44244adeab7a521d8cc

    SHA256

    e72d3f2aff429a09eb4f764653e658945d32a481f72776962340f7df62ddabd2

    SHA512

    877478b1fbf6c947b186e7ae5e7b44fe0d825579233f3d598a4d5e89347ab700fb65cee89e7130cf18483b4a4180e45bc206c879007bd31d10e91ebd3681b24a

  • C:\Windows\SysWOW64\AdmTmpl.exe

    Filesize

    71KB

    MD5

    84056bc852613b8902be73320159bdb4

    SHA1

    be491f815cfbd3d1bb4080303d5459d5c8cedb60

    SHA256

    74423f4620c774ed3d9303a60dfef9d2d1ec8d4eeaadc5aa36e911d7450ae804

    SHA512

    0527f1d4523029df242a09d5db2d1c51fa18f2dd1c4b51e23e0eb470dc20bd326a46c2b5bab1fdd86fb1de56c1227c05955392b9d93cba21eb9320aa4dccbfd3

  • C:\Windows\SysWOW64\accessibilitycpl.exe

    Filesize

    54KB

    MD5

    be983f6baf0e435bb3a06650203f1253

    SHA1

    236461ace9ae12e0d3ae61c77a115e8c1a873fa7

    SHA256

    330c108b526d3aebc4f36d5fac099ceb1dbe0304136d25b1ab4ee4516194d73a

    SHA512

    61560fae09a29a9ddf408f5cc509e2471072fbc9d88bbe5a572854a39a25db1779e4f8ca87ded4af498496a6d9e6cf640e7d8945348016be6e3374039026b4ae

  • C:\Windows\SysWOW64\accessibilitycpl.exe

    Filesize

    32KB

    MD5

    ba04677ab70b9d936d700ad9c71497b8

    SHA1

    4f7734f8cc51aaf5f59f69925d4848a59e9dd8a2

    SHA256

    a89e43c000dea42a877812c58a8b4f1af31f9b936c0c5f122c3823a41b756bb0

    SHA512

    3a9b07797b1c1295f19b61e97d39a0833d6dbec0dec61f10d56e9aff3650ab25b8e3c2205a533536b615873812390f85d2a7d56188f0d5448b1505d0cd40bc95

  • C:\Windows\SysWOW64\acledit.exe

    Filesize

    39KB

    MD5

    4d74b8d76889e7c1c936672cf22dbe48

    SHA1

    0bb7aa9819e8561d259c4f3472349ebe74646e8f

    SHA256

    efde93fce73bc2a9bd92ef934f932ecc504f7fedc26e6877e6cdd9b419af8d3f

    SHA512

    87f6ef2e0035e5e2ba76a8bbed9f23af98ed6c02ddb6f811a404eb39792c2c11e70921131eca5f95aee3ccc3b302c652a2488b32446a5d94b50e1e088a7b6122

  • C:\Windows\SysWOW64\acledit.exe

    Filesize

    64KB

    MD5

    d87ff4493fd5d255d84b45dc2c422987

    SHA1

    77a48536af4a97852c4abe0a10c2e7b7db0911ba

    SHA256

    44b5797f8dbaf242bf59bac037c576fcaaaf42c693dac997af788e166f3d01cb

    SHA512

    dbde2b9ab9482220feb16c5e9475337efc653592fac445ff45beeee2372bf70f7ef70224c43a832b10d8293a456f38175b377b7aa911bd693d5aca11d576019f

  • C:\Windows\SysWOW64\aclui.exe

    Filesize

    35KB

    MD5

    83e0d87ff5768fe883ebcc44a1395f41

    SHA1

    f7fb45de6bc86d7c8d1c44bafe6e795239966b69

    SHA256

    daae53bd60626ff4632ce0c9751ec1f591885f9440e9c667adbbcb436f1c1013

    SHA512

    fa1b64f407e25307e2f30a0b720484f734b94f01f82d3e1fb2f9fdbb2724f8c31bdae7dec89f5d660425d46a1cc7b72f31d2be921699a313c9c86172f530bd1d

  • C:\Windows\SysWOW64\aclui.exe

    Filesize

    15KB

    MD5

    e467556743fd162bc95b89616e4a5419

    SHA1

    5bcbd054a5d76c60e8d07d05656af852d0415249

    SHA256

    34eb591b9d059b71674971fa3cee656ef728fd92e4f49767f1dbc0d3c8748c30

    SHA512

    d18cf539b248bb7e6a346d4aa2a9de4d6294ed88c8fd48a87fe1c37d4c22f37a2d26b07d2f21956e74ed95549974e46e5e0e32462db2c6a1a88315a8f4c71c1c

  • C:\Windows\SysWOW64\acppage.exe

    Filesize

    90KB

    MD5

    f4892d166dabc755238626d2468d26ac

    SHA1

    c6c73b1c0f5afab499a3ead5ee1f81950a36cedd

    SHA256

    bab4cca51c406c45ef06ec70ce7bc6e2028c55eccdafa03cfa09f8780d3d2b40

    SHA512

    6ac04d12b1ee70d4ff8c757523ca869364ddff57265a27d828190dc0ab14311ae29ec504c9fb0d4566f273ec3d50a45c41be238f986fbf49cbaf2e9455c1739a

  • C:\Windows\SysWOW64\actxprxy.exe

    Filesize

    49KB

    MD5

    8fb6dc5ddea89c35957088ab8581ca1f

    SHA1

    6424bac4ee843db7f32adda7546348d8a716feb5

    SHA256

    c8d964e25cd6495fe19251c8c5be29226cbc0ad9bef70c266256a4c29cc5f97a

    SHA512

    80846ff3ff866410b41f05b6b337227039fd8037b1aca0b91b0e3dbc14d8a7a1a2c524cf501fdbd43ecf4292d1341537a1840c8859bbf80144c84424c13563ae

  • C:\Windows\SysWOW64\actxprxy.exe

    Filesize

    65KB

    MD5

    4f59d84dc4936b41857553d14ce24e37

    SHA1

    3249d5e9808d46510fd357fa415d51ea59c09b94

    SHA256

    1e4eeee25aea84519bd206c33d4cf4490b4992be907f05286a9879d6475f5087

    SHA512

    424fb71b3b9c2dbe9b9973626d586202c1fbbb26bb59c983c1b553da6cb39704ef5c14399b5f0c73f5330c84604eaf8ab36455918040cfcd7121c957f3b266b1

  • C:\Windows\SysWOW64\adsnt.exe

    Filesize

    53KB

    MD5

    713fc3a7b44f3c1ddbea981ae188c844

    SHA1

    19e3717b373e670bad1b94c7390b14e2f9ebdfe0

    SHA256

    c773c7ee481e84eaeab88003b9fcc2bceec3aae5a2653968dd4a5b92bacef3c5

    SHA512

    14c9d6fb2753bf528a04eebbcc78045d254b0ba5c6beef4ec541b14119eb68da648bc63fae9981acd78da3d7c6151d67c69253e5cacb18e56510b126ff385c29

  • C:\Windows\SysWOW64\adsnt.exe

    Filesize

    41KB

    MD5

    2c3a27e042ebb849f71bab72f51b7eb0

    SHA1

    7590cac86aaedfd4306d2b154c6fc788404732ce

    SHA256

    24687dddbf694d1cb33cc0a6a40842c0950ab5f0d1035d6dcfbfc324957f76d7

    SHA512

    d85f77109d65b9464d189a89ee104ec85c3b2966602455d3d8a3fd8b2e4105d52709255e68a0901ec66167b04a163a191aac47997fcd78b311a3949784b93599

  • C:\Windows\SysWOW64\amstream.exe

    Filesize

    117KB

    MD5

    29ed246fa96a71c363fdb68c90ac172f

    SHA1

    8c70a70766599fceba07b5e66e4c7c03f2e81dd2

    SHA256

    265e35b116eb747de295cf2445ce744562d685904d2841e7525e6580a7748da0

    SHA512

    29c1dfc5c2c96fbb76192288f032d57cff8d4b242218f14696c13c8f2706ec1fee13fb26b425500931d310ae123bce416685be77d4f1de71fb7ff0aa9cfd260c

  • C:\Windows\SysWOW64\amstream.exe

    Filesize

    45KB

    MD5

    914246183c966803bbc9a379ea9561e6

    SHA1

    6bb2dfabf3a0b125841263f0412e5ae275aee2ac

    SHA256

    1f55b40f62ca5e2b691a944a951fbfcd967b3ed5463b009ea398f9a3e1896896

    SHA512

    a241a2079cc2acb3f412693e81540f2456270544ea50eaf148c5039e7035373e1ae8be0c12c7d148c8dd291725669457be6770d16f44c8652a6247d308322138

  • C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe

    Filesize

    92KB

    MD5

    6a8df65c52cbc93dff67827a48796970

    SHA1

    8fab2abca0749223bc7d5b682a241749acee9420

    SHA256

    91989f157bad0692af4db607763ec2701625381f2031a06f4a30429cb7b2a95f

    SHA512

    bdeae0e0c5c1c11075527ada6373f917b5ba83cb058c1ff2ffbfd5edbf41167df370c1d13fda416f4eb1a2966e337042d3219ccd2ae343f0a18bc8a1eb33a336

  • C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe

    Filesize

    101KB

    MD5

    1f313ca84527792ec137e9d86e2ac58c

    SHA1

    b8629616afd11d6a8228daf9b1a7f626efad0587

    SHA256

    95e2deb6fd8145edf3bd31c4c4bb8a2a5872bac298e351e6d2cc32b19a457905

    SHA512

    f341241e413d27e9ba741976f2a6ebbd0370f2c534b38a05b9fcdf0f37adb0b343c566f094abe926a712d8b0d5333a2bcf980cf4f90741a9bfac61e5a0aedaa7

  • C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe

    Filesize

    45KB

    MD5

    1a9b25b49fae911695d35474b30217b2

    SHA1

    75bbd7d665d69c449c930627a45b36de74e29f84

    SHA256

    cac09212747a60a2d30e08d7c4b28488a8029cec25c55c5f6db63ba4e2d7711b

    SHA512

    31a9f2989191a65761c86fdb5de6ecf702a0a53eb5f603902ba6464bed22e8cbd1fb8a37fbdd08711942b134136701d64041d603843142df00e850f6d78fa823

  • C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe

    Filesize

    64KB

    MD5

    af4ef404b7e54bb29e68352d00f0f3c2

    SHA1

    8f57a5df8de1125843a58a6a97928350c666feea

    SHA256

    c1484499159d426cdcd1664938f58f82741756ba233fe8084804da63bb8dc0e5

    SHA512

    05cbe0a5a3cb2bcdf88ddd0703dd674116e30c5b4f659c262eebdf8d7a91483c2c8cad57f8ffd07712dde055d170fcefc18cfc1818eea18065012e9bb3c2cafd

  • C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe

    Filesize

    14KB

    MD5

    48fdae5d7093ac0330fe2fe651da8f29

    SHA1

    a5dc7fea9fd346b0e0c74c68ce9feb38ed5f8a74

    SHA256

    332a383edbe51301b0488c3c727f149ed829c553ab24d84966d91bbca8f04b23

    SHA512

    396f17a5306e6f71860fb3191a113aab345a3127a55174a0ee43dffa8dac82bb832069dd07a7d47840dfa84ba8a3c3900da4f899352ba3d70101133eeb400cea

  • C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe

    Filesize

    23KB

    MD5

    6bbf1bf021464947ce2f46c2de7019f9

    SHA1

    67e967a3c843a4479d3701f1005e9d8f5d75a9d1

    SHA256

    d215f449a5c8c2f4f50a16d025a823629dc38c79966b9fc3bf1ab1aba9ab52e8

    SHA512

    8e8ed178a3458827a65f09260793c84097f88213a5c24a4efacf6d689e75ca57aefc68df2687f13b73d16cc990e11f26b7b16d0b92a9339f39bc8303590d58c8

  • C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe

    Filesize

    129KB

    MD5

    ae1c078bae7c82fd7a1ca542f4358d22

    SHA1

    004c7ccce69424f6e5855da861f750a85f07414a

    SHA256

    d626b0c10de511b7180a6b98a4554dc604819d66f4ff170997d18d8d4e218bfc

    SHA512

    e8342ace97d99597649a6856d863448577bb6ae128369974d463cb596efce7707f27126a6554bd1c2ba02b2a10c1ebaedd948df013fce801c9f258c42ec1a60a

  • C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe

    Filesize

    57KB

    MD5

    4d23e75bf998e53ffa469971ed5363f7

    SHA1

    bfe2896f3c5c8c04436278b3125c51ebc2aff952

    SHA256

    1b66d224cfeaa49ff263b466dd62c56edf879a94d646b0bd7236c1bb9cf9c1c6

    SHA512

    2f84d8b3c860b34e93ccd54ea3b421678dc8390e1e7ab889e21cb47acf3ecab1cccbf4eceabf5610a51e7b937b8fe1bb659c575d690d6153e87fdc9333748499

  • C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe

    Filesize

    34KB

    MD5

    2662f09a22fa18babdaa8cdb12176302

    SHA1

    788e3f943319d7e1546c74f5598579b628591802

    SHA256

    d2b23ba9156d4b87fb54c6920425ea2e12a2604d41e1a3c39124b5d43de07ece

    SHA512

    2bfcefcc3bb1555fbfc0fc32611f0af5056130348c06377dbd3cd7ffabc9b92f6240e1c6a38d46b6a5dbab29801c993ff4cde64597643fe49b0847c538a5dec4

  • C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe

    Filesize

    137KB

    MD5

    5710341f78a63faa543a30a4253afc69

    SHA1

    12c077abd48fbe5c96af15134489f890a2069d8c

    SHA256

    e2c3093b2be2d8f4790cd3ab8dc0753de871c3ea99fc50ee8b5751fa4421e40a

    SHA512

    51187c22e888cb12812605835936ffa4a0e1c280dac37f291e8544b781c9d967a913ff96c9b1b915be181763f96ef077eb47177adbbf32d9ab450b0db72a8510

  • C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe

    Filesize

    271KB

    MD5

    116e4091f3aff94f9a83bd2dae777195

    SHA1

    98bc4978fd33aa5a360654e8d796538b0b82f442

    SHA256

    1f7a46888abc3fb1595f932dbadbacb658b1757a21ef8a84b1c4b990cc0b8766

    SHA512

    27be34093b40ebf7d0632b9068459fb32ca2f405dd93f3abc5e54e1a6ccb534b102c4a0ad4114497f82bad057270a89216ea6bc7c90c6fda0f904f1b2dd49985

  • \Windows\SysWOW64\ACCTRES.exe

    Filesize

    294KB

    MD5

    018df191f0db6e21907cc999d9f6467c

    SHA1

    1557261aa56ecd7f355f104b80ad8ad2f620eee2

    SHA256

    08dad3498c2ab4855eac9c9324fca017308b5aa1bc573c95c37148b4ed89f08d

    SHA512

    2e440a1d343981a457e6ca0459b67c8be574173f49f90e72530de8c8f36727c322d3136d39b2dac0ea78fe2b6a889bc0c1d889939917cf11916b79e8b610b955

  • \Windows\SysWOW64\ActionCenter.exe

    Filesize

    31KB

    MD5

    274fce4c4337930ca816eb5f3a24ad66

    SHA1

    8b44c7d7af035dfa4d503b3c699bd63fcd22153c

    SHA256

    fb208e6211c409df1022c61a0d78d90ffc701d48f8504b1b9da2d2c4db66c814

    SHA512

    f53768deaee2e0156099da68e9d056693ded58eccada9eff5287afc96c62454bc1603527e7551eef33a5303f468a4df8ddbb17090ee2183c95641a45820a7b40

  • \Windows\SysWOW64\ActionCenter.exe

    Filesize

    48KB

    MD5

    462ce0edad66d41839f10d33544883e5

    SHA1

    734c6ac08cac0a64518b33bba35226c0595d72ec

    SHA256

    18ded447d6522309f1d89b7bf2b688d508746c33f835111c1f43d14f553444d3

    SHA512

    47a9114fd18cf4d38ed98f5468f0f1f90a18e68b92e3e2ae48ec9915f621321d043c7ac4ff6bc8442457ecc6be4d08207ebb07a63a838ee823607bf3f5f7412c

  • \Windows\SysWOW64\AdmTmpl.exe

    Filesize

    108KB

    MD5

    28ea68859ff2fed379c8a534369281e4

    SHA1

    05a17ccff8ee1d6e0f5728a5b1b85ce26b110572

    SHA256

    77988c4b27ff8892846c1c87862311ee10d90ad1a5393f51f7b0cbd4d35d6239

    SHA512

    b71860dd52f6075f65a6be78eb3201857700361841f730704380f3b75939b27cb15c5d7d3d1fc89e9259013b1434cb5ebb3935d5a3ff291576205ff67a399b45

  • \Windows\SysWOW64\AdmTmpl.exe

    Filesize

    21KB

    MD5

    a9af9a6ce1a648567607bda23420d4cc

    SHA1

    8760ca1bab416452afbf6db380244fb6716c2d23

    SHA256

    fff93b36784eb4954230a9c64f602d6153c8725826220cc098953dd779479963

    SHA512

    16cf48d7b3b57987b99c3eefca83d17a6a0d0f285f61b573229127105928d891036fbf7ad6391f018ac049737f56086df6ea8b81ee20f4e4a6a6aa21fdcde18a

  • \Windows\SysWOW64\accessibilitycpl.exe

    Filesize

    15KB

    MD5

    f0cb949dadc0a583850211517890ba6e

    SHA1

    5d782091284b7eb131ba7196a88f3cb49b4358cc

    SHA256

    4ea49a1cb48486717c3432180499f68269a20be66cb5c8935b9d801962914a11

    SHA512

    4fd20db982827d4bd8d7b66d6d8d74ddd63066ff5b49f7f760dbc3cd03d48152a7223b161383826ca475521ea99a5aa5c2cd42b73ee4455dbfe2cbe5f8f957fa

  • \Windows\SysWOW64\accessibilitycpl.exe

    Filesize

    11KB

    MD5

    21e000d455ded86b63d41252f9029a05

    SHA1

    873bdf4bddbbd8d64347cf4c483e18cee95fd07f

    SHA256

    281f940f6273031d93e1224a2267ff8956a8bf3599648389ff7f92314297a8ed

    SHA512

    d26b5ada72a658082be19bbdcc39a51a3b8138ae1cb5ad38852445d9a900ebcdc5b7d246816bab714152a756f374fb39803f881d30b9d56d230ec384cc6c84de

  • \Windows\SysWOW64\acledit.exe

    Filesize

    143KB

    MD5

    5888c8589c7f955d979cf02ff46ab62f

    SHA1

    cd6fef3067bff6d1aaf7c63a631528a9fc2e2e78

    SHA256

    710784e4d16d05784cd6ba5b0124b11ddac37f3f3dc0f05034f8857a9bafd238

    SHA512

    ff81cdc1f53ed6bb293a2248065b237da3b1c3a8b2d65786ff3c89b42cff7c59e75fb379b5ddbb6f9347e63bd13189daf82df8031c622218be2d6c95b180072e

  • \Windows\SysWOW64\acledit.exe

    Filesize

    45KB

    MD5

    609c9131769f63297608a65d7d685987

    SHA1

    b804cde6ff7072a211a91738532ef5cb935f3405

    SHA256

    37f275dfa8affdeaa559a3ff6890621dfa0f418977df23fdeec04448d4c99902

    SHA512

    604e93035186d99cdd58646fb6bbe00a290254d481d9b911c9140f9a6edcb133e91be081293f728e179d0874a696c8d6ddc9011e8585b821aa9ae7e9b517dd29

  • \Windows\SysWOW64\aclui.exe

    Filesize

    62KB

    MD5

    fb489016b2acde79eb552b62d45d279e

    SHA1

    a82bd9e606449515f9875d93055b5bfa4e7edd07

    SHA256

    518ac102e79d33f68068eb42fc1a9aababca05d7a50f9d79bf0d6a3b3e88a875

    SHA512

    afb7d4261a89d51a6fcdc5311e039ed3de8b4f86f672c84ce367b0a281f8a30d6db8906de32d96228e1f120818cd9cb5331359ca96cc82f1767faaf9ff72122a

  • \Windows\SysWOW64\aclui.exe

    Filesize

    92KB

    MD5

    27c8353d72aca3d44676d4855f0a1c5c

    SHA1

    f938d50089d30c8a0748a32de4ef85361d30e869

    SHA256

    176e9ef8eee4dfabaf3944133591b46d107949439915f98594b5366dfd99da06

    SHA512

    fb7db11b10edfd8e0e03e2dacec3d25136320952909991f906011bb375ff49a30c394037d6667f0bc491e904a9b9d0b99b6c7f4961f4bb006119357ef83c6566

  • \Windows\SysWOW64\acppage.exe

    Filesize

    197KB

    MD5

    dc16e8cdadcd6de0f2967d3f78e43077

    SHA1

    d910725746bc0af7a23b7595eca38c73f998beb7

    SHA256

    cbe89eb6ee594248c81d4ffb5dd2cfb92afa95619abaf997d5f15dc48037fff8

    SHA512

    1ba63e91f47cb32e75e2103571dd709503f1a0f5fb414e29e250fcf8e919d559019f0d74b6bfa66cb71df89954a2b2a9aafe3a9a904f4ce253363d418cfde4dc

  • \Windows\SysWOW64\actxprxy.exe

    Filesize

    51KB

    MD5

    f23ebd39c18e35463d53bbfbc52000e1

    SHA1

    ddf1b05a37a0d86093cd1e5339e2deecea278ddf

    SHA256

    2138557ea2a61408dff2f1405c85d2a2833a814af3b338ce63d8a2f8d6f0c9f0

    SHA512

    661eaf8905dc7f4ec425f36361596257ff5c2d06c1ccedb4443272697801cd8834b32e9815ace3b824ed7f9d0f42a461611fc272a3a3220707b29428636d3c6e

  • \Windows\SysWOW64\actxprxy.exe

    Filesize

    5KB

    MD5

    0aaac2ffc06f8df96de728f0d887a846

    SHA1

    17ba85eeffd601eba99ed2913c620760c747997e

    SHA256

    d3a70dbf4fb0db8961adb1db04f5fa874602daabd13b357ddc165acd93097f5e

    SHA512

    a1949fafcd64d0b70fd726946c1a743aabcce4b7bd39cb0aeaf9750be261811a0c4a114abcd6bbe9186fa478ecb7be5918d99a971821cbfafbe760c7cbbffe53

  • \Windows\SysWOW64\adsnt.exe

    Filesize

    37KB

    MD5

    281bce86743102eda378f5d32dace32c

    SHA1

    5346c8ee3675675213828019a3a6e2cd09a1a85b

    SHA256

    6208654a96cd8f478af54cd220ecaf02dc793b3826743a429213901f23bfe56d

    SHA512

    50452cacc2bf2a32dcdade434f23c22d2bd2525c1e6cf38b9952f71ad25a8ccabe4017e7062560a0f5923476c5a736b9cb61860fe06475f812b041512fd3988a

  • \Windows\SysWOW64\amstream.exe

    Filesize

    124KB

    MD5

    79c755cc305c4e334923779f73463483

    SHA1

    a2ff023068267ae6dee69faf3977ea7763724efa

    SHA256

    8b14346eb052e9e41a21b2fdebe5b37f5cee94327003ef3dae75df1c0b6b1f91

    SHA512

    b6b2fc69d34a56050359356b4862c0475c7f4b618762f88003131ba2f73c9f553b609c6422f9f2337ac44cf12ca2a8ceba023fcd9807d135fb6ac9e503069819

  • \Windows\SysWOW64\amstream.exe

    Filesize

    144KB

    MD5

    5d73a217e24de0c4bcc3ec45cbce7e1e

    SHA1

    5ebffd6881aaf2eff483be41eaf7311554c8eb79

    SHA256

    ed40686e3e470a785d80e9a1241856b3d04fbcab4830d6fe976f5885e231849a

    SHA512

    4de66aff77e4f4dbb8a874f08b93dfd5716be1e37accf77974907a27e49e05bd3a024a24eb0167b42acdfa89015d3d27ffc7f706ec66ec75d29a471b57a5a763

  • \Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe

    Filesize

    71KB

    MD5

    2fe31a63822a72d24764273c6fd55ecd

    SHA1

    d134bd5eb71c7ba87a5a206484ede4f592902500

    SHA256

    57363a8738b5cb4fc8e64a94b2952f4abef4947732bd54f6f180daec60d9bb6b

    SHA512

    33c898dda3b48731d679a797d93e2a88c03670957c9cbb1fcddffe77581014649fcdf14e3f8583bef2315be292d9a884a442eb753613501eda14be90c3b145f3

  • \Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.exe

    Filesize

    127KB

    MD5

    c28baceb7e809ae8ebd2d18213f6c035

    SHA1

    4f5e98a792d7da1c008fa2bc1b069deabab56ecc

    SHA256

    4cd94731b40aad49d936feb3855c19f159e78d01aaebded37e3296995aa0a9e4

    SHA512

    32ed444a304f550f640da626c46a6f200f19546b90f0fa99acf5749c51848ff387550349d5e1941b3dbd03cb9ef22bf74aaa97e0827a55c0b0805cbdbcdf333b

  • \Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe

    Filesize

    48KB

    MD5

    570d756bd3ce43b77d2641cd7a411b96

    SHA1

    af2b5dc4e64828be79c5afd0a6ed991a4fafdb15

    SHA256

    bb9eaf60fdefa05dc557320d768a7688a51b2c2e72c3eed9fdc3e4dce29e11bf

    SHA512

    93d2f1f4d400e7fa967b026b48232baa20f12988a3b7011369d098a23fa20b2b8130a2e6c77108b407d41393369496dc06cdd720ee54d329b626572477f66740

  • \Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe

    Filesize

    12KB

    MD5

    c783933f0efcb4e70ee22d4b2cc25e58

    SHA1

    1e446127494e3f7d32d8ff0124ff560bdde7a30c

    SHA256

    adb35116a22d04016f3045961f599bd75f876ea739a3e7c286b427e3cf0fe370

    SHA512

    ff93071fef61bfa4ced7c4f04c374243b6765cc060c73fb3159c1b1b831c3ec5c9f85826006a8f1bd75756bc8bd1c39d45f9a41ab4751f2c88ea7ff3ceed8326

  • \Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe

    Filesize

    22KB

    MD5

    10eb6213b834a275f519aa8c89d0aee2

    SHA1

    90ac15fad6e8863f2f135b334277e3fb87211dcd

    SHA256

    109982455d607a333f990c2ca47ea6053374b991cdaadaaf9882dbc3f38e9e31

    SHA512

    49bd3e1ff3e9965c8cbe6eea1cef1174c4e8212d082be1802d1f74af97ad8ba4846381b3d1b2d10c8ce46f62ef73bf92ff82a2557094d08dba4ab8d818dc771b

  • \Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.exe

    Filesize

    62KB

    MD5

    8499b1d11d0b7df1903242332e358461

    SHA1

    2c6124bd3db23f43bba898025e0aa85e13d348d0

    SHA256

    7a6bcd633a4aa9529feee7075e556f18b9269ffe628f94b17f841cd4b417ce35

    SHA512

    59a7cb0df8f760e9994918bde7271cda8bc9a3559af4545d918915f929b4ab2c26ca505eb0c231fab818918b524ad0c03b2e27e6998631013e5ea8a0f22c178d

  • \Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe

    Filesize

    104KB

    MD5

    b23695f429c6ec68f6d1a8f3252ebdb9

    SHA1

    c2aadeb2aa5da5539f50ee940b38ffb2bf5b1fb4

    SHA256

    8f00ed650a7168a6ad62e689282cb2b47b0a094deec6884ae45bd4c9456d3e0a

    SHA512

    d827fadd2d2820372926702651a0b9da65492f0abfe331513a75e6c7ebd7bb757b95d4905b880678bdc73ec84c0d9d5ddbeef3040d43079b38413a9a3ca68286

  • \Windows\SysWOW64\api-ms-win-core-string-l1-1-0.exe

    Filesize

    63KB

    MD5

    706208fc0d8a3c66780732080cf92dbf

    SHA1

    1632087c361c3d3d6020a3a0c818728b91d04beb

    SHA256

    3bd54314cadc6d36ed5f468cfe1b84c85136752f75e3cc0b3e94d6686d464c54

    SHA512

    51ebf1ff5cbaf2ee49189fe8d86b68a641a8ee58892e1ba0a5af38c0a5d0b4ae2e6cc0ca1031cb5472eb632591d9d15a1c15d46a5ccd3ad5a8f7eece48c0c21b

  • \Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe

    Filesize

    134KB

    MD5

    b828497ec1dd3110f01dd481749c1f87

    SHA1

    c1c7df726765a13e64fc900299e9a894e3bea8f9

    SHA256

    4b8af43fadc7ead3bfce2f509aae5a56dd8137ee6d8a7d42e783cc2133800914

    SHA512

    3c43d7665274ace0375d5fa543f053a03428e0cb225c4461554ee4a8f657280d2218c77e4472b084bf73a9ca8e5591241b74a3ba257becd89cf8aa929a62500d

  • \Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.exe

    Filesize

    11KB

    MD5

    d3fd0118abc2943f431d27e503f6e9e0

    SHA1

    38231b7d2e05f47397472ce8591cbc8c479c5cc1

    SHA256

    628380bab949826aa3cf66571ad26fed3b0ac399b8a817dbe55913dd634bb4c3

    SHA512

    46eb665e4e26257df8e711a2b87f1e5254560eb85225b7653c00bf5e411df15cc59cbb8b66efbbe696c728b6ab6ad94c6b3269e825ce4d3869c113630946d8e0

  • \Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe

    Filesize

    5KB

    MD5

    b996a51e7181fd66f114bc99ea3c91b3

    SHA1

    c3624a736f7af2dcd91bbf506492f6a17fddb26f

    SHA256

    ee8afd34f13420831087ac5b015d7c767d0138ff159a5bcfbe5daee175d34b0c

    SHA512

    517acaf4babe37d469249a6acb381ed3220fd3b82497e37af3edbd55ddfb3c2da8ac1699de81109d33dfd2b367adf23c92e681b9529276dc339ea4fe0952e6f8

  • \Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.exe

    Filesize

    131KB

    MD5

    34d9d592f01870ee8f050b4e9a3fa004

    SHA1

    672d5c15921d6c36b5a8461517f1468ec9c19ad5

    SHA256

    71b4f5db14757582d3840def8299177aab3fea16da2a86005b69c11ba2d6f6e8

    SHA512

    c33ef2c05b81f5e72ec6acc4eb0939101f5df8fbe3f01903068104cc9435f722511381d3f65c9db2af50cc7e0745e987f133008861992f6aee6318b80f6ee930

  • memory/576-112-0x0000000002DC0000-0x0000000002EAF000-memory.dmp

    Filesize

    956KB

  • memory/576-115-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/576-99-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/576-100-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1376-88-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1376-75-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1608-181-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1608-177-0x0000000002EE0000-0x0000000002FCF000-memory.dmp

    Filesize

    956KB

  • memory/1608-166-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1608-165-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1608-179-0x0000000002EE0000-0x0000000002FCF000-memory.dmp

    Filesize

    956KB

  • memory/1616-128-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1616-114-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1616-113-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1656-76-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1656-62-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1700-192-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1700-206-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1784-150-0x0000000002DC0000-0x0000000002EAF000-memory.dmp

    Filesize

    956KB

  • memory/1784-154-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1784-138-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1936-4-0x0000000002D50000-0x0000000002E3F000-memory.dmp

    Filesize

    956KB

  • memory/1936-13-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1936-0-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1936-1-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1948-215-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1948-204-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1948-205-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1952-140-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1952-127-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1952-126-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2032-87-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2032-101-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2096-214-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2096-224-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2104-230-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2104-11-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2104-26-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2104-24-0x0000000002ED0000-0x0000000002FBF000-memory.dmp

    Filesize

    956KB

  • memory/2104-232-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2120-151-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2120-167-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2120-152-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2404-25-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2404-35-0x0000000002E20000-0x0000000002F0F000-memory.dmp

    Filesize

    956KB

  • memory/2404-40-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2632-237-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2632-234-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2728-52-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2728-38-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2728-39-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2912-193-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2912-180-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-240-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-242-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-222-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-236-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-223-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-238-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-258-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-256-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-244-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-246-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-248-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-250-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-252-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/2920-254-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/3008-50-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/3008-66-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB