Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
be93cfd2de9fc49ecf6f64b9259c64fd.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
be93cfd2de9fc49ecf6f64b9259c64fd.exe
Resource
win10v2004-20240226-en
General
-
Target
be93cfd2de9fc49ecf6f64b9259c64fd.exe
-
Size
17KB
-
MD5
be93cfd2de9fc49ecf6f64b9259c64fd
-
SHA1
3951d2178bb35de0f3ae261ca71cd90123e0463e
-
SHA256
12fcee89bbd445a5f4521c9d5f637b4726658a33aa2135aa4fa468f8d0ca6360
-
SHA512
36537ef7cf9f41cfa2141811142d5659838a7f13a4b1a7856be1321a7117dfb5d8c541b17e313eb410485adf9b277b4f9ef7a0d3705fd9cd76b120300c7d045a
-
SSDEEP
384:IqV0cHn8tiDgu+rTXZde7ZAMX/gcCyq/cN/EOZPOr1qN3nVn1:jwtughTXZ07+MP9C9/cN8OQJqF
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4524 azzxaime.exe 4648 azzxaime.exe 4756 azzxaime.exe 4860 azzxaime.exe -
Loads dropped DLL 8 IoCs
pid Process 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 4524 azzxaime.exe 4524 azzxaime.exe 4648 azzxaime.exe 4648 azzxaime.exe 4756 azzxaime.exe 4756 azzxaime.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\zyzxjime.dll be93cfd2de9fc49ecf6f64b9259c64fd.exe File opened for modification C:\Windows\SysWOW64\zyzxjime.dll azzxaime.exe File opened for modification C:\Windows\SysWOW64\zyzxjime.dll azzxaime.exe File created C:\Windows\SysWOW64\zyzxjime.dll azzxaime.exe File opened for modification C:\Windows\SysWOW64\fxzxbime.sys be93cfd2de9fc49ecf6f64b9259c64fd.exe File opened for modification C:\Windows\SysWOW64\fxzxbime.sys azzxaime.exe File opened for modification C:\Windows\SysWOW64\azzxaime.exe azzxaime.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe azzxaime.exe File opened for modification C:\Windows\SysWOW64\fxzxbime.sys azzxaime.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe azzxaime.exe File opened for modification C:\Windows\SysWOW64\fxzxbime.sys azzxaime.exe File opened for modification C:\Windows\SysWOW64\zyzxjime.dll azzxaime.exe File created C:\Windows\SysWOW64\zyzxjime.dll be93cfd2de9fc49ecf6f64b9259c64fd.exe File opened for modification C:\Windows\SysWOW64\azzxaime.exe be93cfd2de9fc49ecf6f64b9259c64fd.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe azzxaime.exe File opened for modification C:\Windows\SysWOW64\azzxaime.exe azzxaime.exe File opened for modification C:\Windows\SysWOW64\fxzxbime.sys azzxaime.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe be93cfd2de9fc49ecf6f64b9259c64fd.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe azzxaime.exe File opened for modification C:\Windows\SysWOW64\zyzxjime.dll azzxaime.exe File opened for modification C:\Windows\SysWOW64\azzxaime.exe azzxaime.exe File created C:\Windows\SysWOW64\azzxaime.exe be93cfd2de9fc49ecf6f64b9259c64fd.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA}\InprocServer32\ThreadingModel = "Apartment" be93cfd2de9fc49ecf6f64b9259c64fd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA}\InprocServer32 azzxaime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA}\InprocServer32\ThreadingModel = "Apartment" azzxaime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA}\InprocServer32\ = "C:\\Windows\\SysWow64\\zyzxjime.dll" azzxaime.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA} be93cfd2de9fc49ecf6f64b9259c64fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA}\InprocServer32\ = "C:\\Windows\\SysWow64\\zyzxjime.dll" azzxaime.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA}\InprocServer32 azzxaime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA}\InprocServer32\ = "C:\\Windows\\SysWow64\\zyzxjime.dll" azzxaime.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA}\InprocServer32 be93cfd2de9fc49ecf6f64b9259c64fd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node be93cfd2de9fc49ecf6f64b9259c64fd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID be93cfd2de9fc49ecf6f64b9259c64fd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA}\InprocServer32 azzxaime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA}\InprocServer32\ = "C:\\Windows\\SysWow64\\zyzxjime.dll" be93cfd2de9fc49ecf6f64b9259c64fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA}\InprocServer32\ThreadingModel = "Apartment" azzxaime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA59145F-315D-BC23-AC1F-145DF81A34AA}\InprocServer32\ThreadingModel = "Apartment" azzxaime.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 4524 azzxaime.exe 4648 azzxaime.exe 4756 azzxaime.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe Token: SeDebugPrivilege 4524 azzxaime.exe Token: SeDebugPrivilege 4648 azzxaime.exe Token: SeDebugPrivilege 4756 azzxaime.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1712 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 28 PID 2108 wrote to memory of 1712 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 28 PID 2108 wrote to memory of 1712 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 28 PID 2108 wrote to memory of 1712 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 28 PID 2108 wrote to memory of 4524 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 30 PID 2108 wrote to memory of 4524 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 30 PID 2108 wrote to memory of 4524 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 30 PID 2108 wrote to memory of 4524 2108 be93cfd2de9fc49ecf6f64b9259c64fd.exe 30 PID 4524 wrote to memory of 4596 4524 azzxaime.exe 31 PID 4524 wrote to memory of 4596 4524 azzxaime.exe 31 PID 4524 wrote to memory of 4596 4524 azzxaime.exe 31 PID 4524 wrote to memory of 4596 4524 azzxaime.exe 31 PID 4524 wrote to memory of 4648 4524 azzxaime.exe 33 PID 4524 wrote to memory of 4648 4524 azzxaime.exe 33 PID 4524 wrote to memory of 4648 4524 azzxaime.exe 33 PID 4524 wrote to memory of 4648 4524 azzxaime.exe 33 PID 4648 wrote to memory of 4712 4648 azzxaime.exe 34 PID 4648 wrote to memory of 4712 4648 azzxaime.exe 34 PID 4648 wrote to memory of 4712 4648 azzxaime.exe 34 PID 4648 wrote to memory of 4712 4648 azzxaime.exe 34 PID 4648 wrote to memory of 4756 4648 azzxaime.exe 36 PID 4648 wrote to memory of 4756 4648 azzxaime.exe 36 PID 4648 wrote to memory of 4756 4648 azzxaime.exe 36 PID 4648 wrote to memory of 4756 4648 azzxaime.exe 36 PID 4756 wrote to memory of 4812 4756 azzxaime.exe 37 PID 4756 wrote to memory of 4812 4756 azzxaime.exe 37 PID 4756 wrote to memory of 4812 4756 azzxaime.exe 37 PID 4756 wrote to memory of 4812 4756 azzxaime.exe 37 PID 4756 wrote to memory of 4860 4756 azzxaime.exe 39 PID 4756 wrote to memory of 4860 4756 azzxaime.exe 39 PID 4756 wrote to memory of 4860 4756 azzxaime.exe 39 PID 4756 wrote to memory of 4860 4756 azzxaime.exe 39 PID 4860 wrote to memory of 4920 4860 azzxaime.exe 40 PID 4860 wrote to memory of 4920 4860 azzxaime.exe 40 PID 4860 wrote to memory of 4920 4860 azzxaime.exe 40 PID 4860 wrote to memory of 4920 4860 azzxaime.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\be93cfd2de9fc49ecf6f64b9259c64fd.exe"C:\Users\Admin\AppData\Local\Temp\be93cfd2de9fc49ecf6f64b9259c64fd.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259396340.bat2⤵PID:1712
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259396762.bat3⤵PID:4596
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259396840.bat4⤵PID:4712
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259396886.bat5⤵PID:4812
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259396949.bat6⤵PID:4920
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe6⤵PID:5792
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259401005.bat7⤵PID:5848
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe7⤵PID:5896
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259401223.bat8⤵PID:5944
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe8⤵PID:4008
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259401910.bat9⤵PID:812
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe9⤵PID:5756
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259403142.bat10⤵PID:5684
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe10⤵PID:2620
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259404546.bat11⤵PID:4088
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe11⤵PID:4020
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259405888.bat12⤵PID:2008
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe12⤵PID:3788
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259408009.bat13⤵PID:3740
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe13⤵PID:1980
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259408649.bat14⤵PID:4028
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe14⤵PID:3856
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259411004.bat15⤵PID:2512
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe15⤵PID:7996
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259413017.bat16⤵PID:8044
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe16⤵PID:5080
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259414717.bat17⤵PID:6160
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe17⤵PID:1968
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259423875.bat18⤵PID:2840
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe18⤵PID:324
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259430551.bat19⤵PID:5132
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe19⤵PID:2228
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259431612.bat20⤵PID:2712
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe20⤵PID:2416
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259433952.bat21⤵PID:6052
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe21⤵PID:4728
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259434857.bat22⤵PID:4348
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe22⤵PID:2776
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259438476.bat23⤵PID:4568
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe23⤵PID:5084
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259450348.bat24⤵PID:2164
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe24⤵PID:6960
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259451066.bat25⤵PID:3204
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe25⤵PID:3972
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259451924.bat26⤵PID:3812
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe26⤵PID:900
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259455309.bat27⤵PID:3164
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe27⤵PID:6736
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259457462.bat28⤵PID:7044
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe28⤵PID:1100
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259472609.bat29⤵PID:1752
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe29⤵PID:1172
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259480378.bat30⤵PID:6192
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe30⤵PID:4784
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259481969.bat31⤵PID:1388
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe31⤵PID:1548
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259483217.bat32⤵PID:7140
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe32⤵PID:6060
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259484465.bat33⤵PID:6036
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe33⤵PID:2864
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259485121.bat34⤵PID:5464
-
-
C:\Windows\SysWOW64\azzxaime.exeC:\Windows\system32\azzxaime.exe34⤵PID:5100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259516524.bat33⤵PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259514932.bat32⤵PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259513060.bat31⤵PID:6480
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259512858.bat30⤵PID:6268
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259510845.bat29⤵PID:7948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259502717.bat28⤵PID:6532
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259493373.bat27⤵PID:2120
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259486961.bat26⤵PID:5500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259482437.bat25⤵PID:7196
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259481283.bat24⤵PID:4732
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259480846.bat23⤵PID:4588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259468506.bat22⤵PID:5588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259465246.bat21⤵PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259464060.bat20⤵PID:3624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259462142.bat19⤵PID:4540
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259460894.bat18⤵PID:944
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259454576.bat17⤵PID:1312
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259444513.bat16⤵PID:7652
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259443265.bat15⤵PID:5428
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259440036.bat14⤵PID:6924
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259439038.bat13⤵PID:7224
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259438383.bat12⤵PID:7940
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259436355.bat11⤵PID:1308
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259435060.bat10⤵PID:1740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259433172.bat9⤵PID:7452
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259432283.bat8⤵PID:3212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259431706.bat7⤵PID:5864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259431285.bat6⤵PID:3024
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259429849.bat5⤵PID:7248
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259427400.bat4⤵PID:7416
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259429475.bat3⤵PID:7336
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259428960.bat2⤵PID:7288
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121B
MD509517fc62284f33e877a276463580bd1
SHA10b14fe1db4493818f9de0bf2a56ee5370b8d479a
SHA2566cc6bbb1f3f754b6894d84130f5f2d86569ac3a603e1632d3cefa028f22b6238
SHA5121b924dd216d0f38199cc6df215e65ff260aa48fa37aa620dabcbc616f434643bd1f2e617d66b14bd52900214148741565128ba9589782ba582fd7308369f4a4d
-
Filesize
121B
MD55c37f2c308f2a9c21f5869cd2e1f5fbb
SHA1a5962e2d14a62638b589d03692c10d46f2ded9da
SHA25603401227088bab33f8fcf2503aa6d888662c3df19b19f912151764a91ced2a69
SHA51292fd5afb790507461bded85c1e4411a03cc44d8a5a4049e064634c1fca6a0a4ddef09a656bfb6df9bafdbed141dbfa622a4f4233e7b48e65266a324aea8d163f
-
Filesize
197B
MD55602c94bda26a5958ff8c92ba0a4e77a
SHA1eca7a3003f335443c7071db336d47a95a14a0fa4
SHA256c3cf7023d9fe2100ba9b189bf87ae7f73eda82413c578df38eccdc6d8f65100e
SHA512fa243d97f035c641d3506ffe3744a8e82da8e7e1f9a6eb23fd938682a3cd4b7d94e178c8f74e4ae86ab68ce8b71101f577ee530f6301e280ef369b5d8d16c64b
-
Filesize
1KB
MD5713f4923802dfcd08331c9b9500655d8
SHA1c13fa895bcc9f9ee40e760029b56bd11bac31f98
SHA256d076bf34c6e9e6ff620c472b9a55a42e699d1218aa015a024d54c394fee42501
SHA512845fd77d3581b91f0de44d0a3e3d8264c2f1b562fef69662df5dde1dcdf3686ffbccddf3ee99cb7104cf8b2563be384162d7f411702afa0d551c3c407897da23
-
Filesize
1KB
MD58627981aa1bb3d06c9346498a7d2bb16
SHA1da666beec220f38c232d39efb046e3175c72665a
SHA25634b07c46d7457a61407cad44c6c3b9282428402d53cce6572569111c7baddcaa
SHA512690547aff300d21d498c097c6c91b3b37a1402ddc48717290d43bb00c283b720968e51cb0cc9c5237d8b42887a083292de9259c999538102714b3040d86a00b6
-
Filesize
2KB
MD5856c9fe721d8e4631fdb7c02a0f35a3a
SHA1ff3feb4e8528652b32d0da904c30046a5bd302fd
SHA256e59053f6bae5ea29aa20a8f90906536a5aec1188225544066e0d464cedbdf117
SHA512f098a0ad79cda3e9c8bd00f6eaf743006b8412878b452d298eddbda32fe98417d2fc4f3d8a58d83ba709ec8e37bb9d4823766f0685476cc1c70f98eeedc115e6
-
Filesize
2KB
MD54b9aeb43ad0906333c42104c32b54f06
SHA12ee2de6e6a1f43e7c2cd3c93c132ba0c7f039af6
SHA256c59f62366aeb07cd40edce21007c58de26e450abfd60e375b90e58cdd49fe6fd
SHA5125ab37803afc7878b4c9a7e096ba8329eb4266d07b3108a0037d6aab0669f26aa37c6187326ab53d37beaf61e49fb7a9966c9742fc01f9b206c76b3bdc0b27fcd
-
Filesize
3KB
MD585c3392534b8f0e9ed05396763d11a2a
SHA1ecdb890f7f7d9adb07dfcda10de9030b71c45876
SHA256e3f3b8081a415726d096ce5ee3b21a3972af0cec97bb8e8bac221786d22fac2f
SHA51273a394d86a2f69579667b21bf214282f7768a2c96863751ef2a3aa2f5e7742b5135fd7df6615d78642dc9e96ae3f08270fb576fdafbecc254a4a0dc1270d461e
-
Filesize
3KB
MD5f7d0ab25589b526a0510b6d138190a45
SHA1fe7a13265caabcc74cf5472f0b860dd7d3ad36d2
SHA256979b212a6aa820a8c046baf1f5045ca5e06b861ae0a4c1d0923a25b42f8a027a
SHA512163f6f4d4a0a19f1b08675f02e2151ae7d94d31ea915380139b86075fe6cc7fcb7de2ba5989523db6bb5db3db99a2fbd66a233a479f1158498e132102c84a1f7
-
Filesize
4KB
MD59e81675129b2b714e19b0d14232d84ec
SHA156ed24001e0dfcc20a2274d129207f477fca628f
SHA25688ee8eb05b396612d0fa6d84c22c4b35af9fc634c9871a8b028e5ff58a6cc617
SHA512dfae194ba5bf232432beb7ffcb740dc5da9e7be47a1a47ed54b450fb11768f597bc3ec45f16200876740afc19e6b09f19f1bbdde5c014eeb285b0a43801d0465
-
Filesize
4KB
MD5fe06b2fe92cd023ca39c5024f4f2d600
SHA17103ecde94873542c993251ebbdce34ba0a6cdf8
SHA256b475cce0773acf6195ed57cf3967b30b88b70ef62773b4f1b8ba90e0b22773e2
SHA51274b9e62ffd4be867b677b26c2cdd3b436a453064f1bf9bba51bd944c5013b74b3050b647596bc1201ce4975c18fa1144c7456d81095f17bbca890cd9ffda6eba
-
Filesize
5KB
MD5a1bfcce7577e66938370ede255ffc432
SHA1caa71aff6f707c7e5894bd127006ba5cb3833203
SHA25621922e458863ed92547b88ec30a6a23c67262b59fd2fe574532003a1b85dedfd
SHA5120e2f838b1f0381d09baf608df778e5fff72dadcfa6408bf06856df0afc98843168ff3e267c7e17f70c480408d506b1ca4edc25a5d502e7bfcd037ac58adeaae6
-
Filesize
5KB
MD58ea11459389f498c5a419d3e3aa71e6d
SHA1c5af93d80fcae8e17f775de4d5c233fa8d9cedd1
SHA2565fc6bb1a4ca0fb2b71fa68c936db6d4d60264686acc37ccc8bd926f11dc9cd18
SHA51283fcdec5f53ebdf5a6c7fad239ecb99c5769b4f91ee807ba80eccb2eed975d8e8fcf35c766e431cc250c36c8d3e47bfde27760cc8195ac364ef89430b8ef78a4
-
Filesize
6KB
MD52363ca5a5042b75488254779a9dcdf6d
SHA171c47b1bb461169b17d8be85907db9b2d61cadc3
SHA256dcc247cc60434b545660efb8f52852f28b7d52381f653f397d9e63ca00c14a0f
SHA5122564369281be61a8720537134bb3d06de500cdee6d218277cccfa0793686e7a4f8a968286a449b6aceb8c53c70497c27bc1fdea6c18751f086dddc2b91fa0d7d
-
Filesize
525KB
MD5430395fe68180e8d4d70d4e0f8194a4a
SHA1bd6e36562f4a16a65a5edf53fa5286bd468afe98
SHA256e629b6350580533ec0016421d8209210f2e9f1404ce084492da3dca1ebc13dae
SHA512d510718fd3c8c94d6840ee3e90a3754489da0b12d828e85f8c8e09b61fb3bd6dd2f2bcab1aff62dc522527ef22d4ba7e7489e91cde2e23208e848ccf858d5639
-
Filesize
74KB
MD55ff4a9615de7b66351262f26fb581d60
SHA1a8edb4df745730f5ccd9d3a5b75220b8a3203aed
SHA25689bb3a1b3b66be5b12c7ffd140750a02e6eb4082e7ccf1fc8ec7b80091e2291d
SHA51290cdc30e349a72e41934f7b482598fd8c31ab0eabfa7fa14d9c3360ba8c454dafa404e32eab5cdd314fe1daba02629d89e75687bbcfad7a4273fea4d00453e52
-
Filesize
17KB
MD5be93cfd2de9fc49ecf6f64b9259c64fd
SHA13951d2178bb35de0f3ae261ca71cd90123e0463e
SHA25612fcee89bbd445a5f4521c9d5f637b4726658a33aa2135aa4fa468f8d0ca6360
SHA51236537ef7cf9f41cfa2141811142d5659838a7f13a4b1a7856be1321a7117dfb5d8c541b17e313eb410485adf9b277b4f9ef7a0d3705fd9cd76b120300c7d045a