Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 01:24

General

  • Target

    2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe

  • Size

    3.5MB

  • MD5

    8784f682b99ff4d525e623544ae67e24

  • SHA1

    4bc752a2fbe5964b1cdfe57f62ab80531c181912

  • SHA256

    2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d

  • SHA512

    08a376c53e2488067e6145d7583478ceef1ae7d01aeedc185d84e849fba89dd201bc8720ff291c65ceb3e4b7223fe08d2e7ae01c070ef4bf0461f3e6531eaeaf

  • SSDEEP

    98304:74qk4B+JfG/r17Z64wNlnadfucOS+MgZk:7HJr/r17Z64SaebRy

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 20 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe
    "C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pkbvuaq0\pkbvuaq0.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC5BF.tmp" "c:\Windows\System32\CSC5B71691A9E72498D8FE6361356C6FE90.TMP"
        3⤵
          PID:2164
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:2192
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:2028
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:304
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:688
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1288
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:916
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:2484
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:444
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:548
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:3016
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:3008
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:3020
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Documents\csrss.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:2588
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\OSPPSVC.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:844
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Favorites\lsass.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1348
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\spoolsv.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1928
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\dwm.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1608
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:2900
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EOnAqtgfsh.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2496
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:2804
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2604
          • C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe
            "C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe"
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2212
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hprTb2T9jZ.bat"
              4⤵
              • Deletes itself
              PID:832
              • C:\Windows\system32\chcp.com
                chcp 65001
                5⤵
                  PID:2740
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  5⤵
                    PID:1540
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Documents\csrss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2764
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Documents\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2812
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Documents\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2668
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\OSPPSVC.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:768
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\OSPPSVC.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2108
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\OSPPSVC.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:840
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Favorites\lsass.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1672
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Public\Favorites\lsass.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2856
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Favorites\lsass.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2944
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\spoolsv.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1312
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\spoolsv.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1264
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\spoolsv.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2984
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\dwm.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2128
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\dwm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2308
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Portable Devices\dwm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1988
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d2" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2176
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2700
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d2" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2248
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "csrss" /f
            1⤵
            • Process spawned unexpected child process
            PID:2972
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "csrssc" /f
            1⤵
            • Process spawned unexpected child process
            PID:584

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\MSOCache\All Users\f3b6ecef712a24

            Filesize

            679B

            MD5

            6e18d4c556747506873b26f332b3228f

            SHA1

            e2f9c6c58c583caee66f04d4a9f6d13896cd9804

            SHA256

            3e0ea90f5df591e5e7da0da1626e4c7fd9924a98788f2584acc59edc63d0a679

            SHA512

            dc767a260d4bea5a4ed88671148a557a10867ceea9badfe11bf0a2413cfb732161768f1d0f227fac4e7807d9df08ff4c4a822df89223053e3c81d7823dd5808c

          • C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\1610b97d3ab4a7

            Filesize

            386B

            MD5

            316d898c2bdd000c1f68da92d686592d

            SHA1

            16c247b03b341011069c2f984704a2142f476703

            SHA256

            0af9c3e9fb9e4ed06ea5730e103c62e366aee2fe9650913e2c996417842a1005

            SHA512

            374171f4781d01aed5da29207dd0e9e0bdad91d750f6c0c31f87b50595387f2ec5bf269e800d555bd3be5b736c3f9885f2b4c409a1d3536b948e1307af6720c7

          • C:\Program Files\Windows Portable Devices\6cb0b6c459d5d3

            Filesize

            622B

            MD5

            f68a9a3550e29e204d898bbb482adea5

            SHA1

            4763391a02c8b32c694811c3ddcb675478d3bab5

            SHA256

            c3fb5e4a99410e885e24faf363073dc3e10e60cf543187fe82922c00cf05875b

            SHA512

            3f824de2eddd3482515372235b77c28877b069c35f04a96de53b624120da89d19f2b6d1b9cdd00621c91fdac4c78ff9ef3b97c1fd16618f0559a0b10559bd112

          • C:\Users\Admin\AppData\Local\Temp\EOnAqtgfsh.bat

            Filesize

            230B

            MD5

            5d892603e184c36fcf819abda1698789

            SHA1

            f7cf3b5b1c8bba57d137514b77201e9ab8906298

            SHA256

            65cf1c01ee8fb54c63e34bda18fbe0d7368b340cebbdc4bb4984044f9950d3b1

            SHA512

            2c0091aac7c39eddc81dd7a79d4501fea9cf302b3ce55b67082c8233a117055a541594d0a6d568564c6ac1a79bbf491ae36ca2e62f4cb44753eaa5c3dfb28f0a

          • C:\Users\Admin\AppData\Local\Temp\RESC5BF.tmp

            Filesize

            1KB

            MD5

            33e224a561b6685896f98bf4e80b12a0

            SHA1

            8e03215e721242d77d731a575797e7b7c01ca65d

            SHA256

            fc6044e90493e3f50ef913d10e17183c7c3e726f7c9209e459ee000abd4a5f8a

            SHA512

            f0cdbb340a9527439d5edf3ba1bb02e989663f6dc90642bd7a1540023c9abc6657b351455692e60d65eae2465fb2c63e90312d845b7a93fd9ea51a76a6ad2f00

          • C:\Users\Admin\AppData\Local\Temp\a0b8953a6e4c3f

            Filesize

            725B

            MD5

            0a90b1189a62bd0fce9ac42a6f449e1e

            SHA1

            8b31d9e765d09fb70518b11bbb30a0edfd38b476

            SHA256

            fabc64e47a21b048471294d8e5f7e370a7616fc61c4daebb4450f9afa02b78b4

            SHA512

            0b1c431a83988fde45588618880aec9829a18a365ad3314e7792fad8f4f4141a021777d0169d4def4fd27d72192e03a5eb63b4e4fa83831e3f037c9594ba115e

          • C:\Users\Admin\AppData\Local\Temp\hprTb2T9jZ.bat

            Filesize

            347B

            MD5

            558c08dec133095dc531ee628653d6a3

            SHA1

            390fa51505b3ebc86a6867bd5933073a024a5f48

            SHA256

            4eabd9c60a553fb810154122c82576f9b92b6052beb3d9d9b7be0145ab04ef48

            SHA512

            b639421fa31819f8a9f7ba6cc9ba30128445f550fc863cd53cb079932c705f0e88cafd0a1c4acc08b6c0c90a528264106a7d31dca0cb3ddedb839f18b33aac92

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J6D668GFOQVVVUUOOVS3.temp

            Filesize

            7KB

            MD5

            12a502585ac4ad1b8ff7e8d8c1a118ad

            SHA1

            05c6c087b5759d67d79435b6a49b7a4c8d4152e7

            SHA256

            3a3d05ac896e37cdb1bcff7108ee7abca93f105652169b916a1ebe069b547cf7

            SHA512

            7f6be7a8a9543be14cbc53b129c798adbfdebc81f34c3263c202611970ff0d916b0fe62ec6a9a68420efd680a0883ef277586175037a4085f73efdf04d87d7f7

          • C:\Users\All Users\Documents\886983d96e3d3e

            Filesize

            537B

            MD5

            99a0202ccd488632a5ffeffe0579e687

            SHA1

            b0ba52be93ad19ea648d89af85eff7f09ea04d35

            SHA256

            18579f0c5a9e09c37219cec0df14dd1fbe16cc81e8778f2c0071c94abcfb3fa5

            SHA512

            060372cd2c918de73a2a394f40942e3bf7bc3d2ec4506e566a5f778e0e0219db5ef95df80ca22b6b94de1a9b23fa8775c6acf7e1007c8fb95f953bbed456e72c

          • C:\Users\Public\Documents\csrss.exe

            Filesize

            3.5MB

            MD5

            8784f682b99ff4d525e623544ae67e24

            SHA1

            4bc752a2fbe5964b1cdfe57f62ab80531c181912

            SHA256

            2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d

            SHA512

            08a376c53e2488067e6145d7583478ceef1ae7d01aeedc185d84e849fba89dd201bc8720ff291c65ceb3e4b7223fe08d2e7ae01c070ef4bf0461f3e6531eaeaf

          • C:\Users\Public\Favorites\6203df4a6bafc7

            Filesize

            565B

            MD5

            c1481210245abfff6f5babeb09ee4840

            SHA1

            c844800a0efa7d80923904f96281d4110cdfd900

            SHA256

            9e742f62b092a35e3bf1e3db6be2fbdd80a9d684fa370c4b7103093483bb62fe

            SHA512

            46c01b682df9eb521f93e529143f2b9c2c2eb13db7ab85b4ddccb1a0dd85ef446ca56dabb4c24f3bd71fa347600bf9ce9c9666a9007b3402c96647b9f12eb23f

          • C:\windows\system32\8wawgv.exe

            Filesize

            4KB

            MD5

            e395b78a4b09227317f6e62893cbb6d7

            SHA1

            ac70c3243b0a76635c523605c4be48d797a94f1f

            SHA256

            73ec7b9407181ac0d453b91e4502bd464ecdff2de40895aaf3fd160584e034f3

            SHA512

            dcb4162fcf950d4a161188875947919ed621d45d728bee9a640cabde7603b5d8f027db0b3948a0dd64ddb24cd023e2fbfaf476a0feaa8ef47623bfe30a5dd63a

          • \??\c:\Users\Admin\AppData\Local\Temp\pkbvuaq0\pkbvuaq0.0.cs

            Filesize

            370B

            MD5

            f89d7224ed960771ed94c0d42149086c

            SHA1

            ff7a4c4bc881c13566aab8705d57eecaf634d2b8

            SHA256

            8296286a5b6ec62a303eee124957fa63e936aaca6a4b05c061c899494fc3a01a

            SHA512

            7d5e8667893a5ed0f4b4885f5720f75ad33213c5e73907658eaab1f7dc05348847b0346f1ae909a355d6b4cf15ffa6c729a99b62f94ab6d4caeae9af5441c0d5

          • \??\c:\Users\Admin\AppData\Local\Temp\pkbvuaq0\pkbvuaq0.cmdline

            Filesize

            235B

            MD5

            ae935f7d88f7138004af65f6a71d6130

            SHA1

            c0feba81dd5139cb7e4b88dad681433d6e7d6726

            SHA256

            5129c50c47796f43ff887e4e94b4dc1cfe0a334bf1f9a050ec227bccd4f40e91

            SHA512

            6a094f4ed7810ceaf2bc0ce4314d49f5cc946515be4c105f4e2d045a6662d6aae337a1909e62b3d25485f088d019cc7c09c6ad3ca162df9c45c6aad843c2a7e9

          • \??\c:\Windows\System32\CSC5B71691A9E72498D8FE6361356C6FE90.TMP

            Filesize

            1KB

            MD5

            028d4cd290ab6fe13d6fecce144a32cc

            SHA1

            e1d9531cb2e6bc9cab285b1f19e5d627257a3394

            SHA256

            3f42f68eb3df49cf836fbb0019b8206af735e22f3d528e7b122fa9b2541fdde3

            SHA512

            2f99d37a56444831298f8efaef425e5dadec938ac459bfc0cdaf3708ef8662f12bd8d687a58fc1dd6bbdac6c806214b65a21489a24d3160c1e8575968e3caa6e

          • memory/916-88-0x00000000026E0000-0x00000000026E8000-memory.dmp

            Filesize

            32KB

          • memory/916-87-0x000000001B630000-0x000000001B912000-memory.dmp

            Filesize

            2.9MB

          • memory/1728-20-0x0000000000430000-0x0000000000440000-memory.dmp

            Filesize

            64KB

          • memory/1728-26-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

            Filesize

            9.9MB

          • memory/1728-30-0x0000000000AF0000-0x0000000000B06000-memory.dmp

            Filesize

            88KB

          • memory/1728-32-0x00000000005F0000-0x00000000005FE000-memory.dmp

            Filesize

            56KB

          • memory/1728-34-0x0000000000620000-0x000000000062C000-memory.dmp

            Filesize

            48KB

          • memory/1728-36-0x0000000000630000-0x0000000000640000-memory.dmp

            Filesize

            64KB

          • memory/1728-37-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

            Filesize

            9.9MB

          • memory/1728-39-0x0000000000640000-0x0000000000650000-memory.dmp

            Filesize

            64KB

          • memory/1728-41-0x000000001AEC0000-0x000000001AF1A000-memory.dmp

            Filesize

            360KB

          • memory/1728-42-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

            Filesize

            9.9MB

          • memory/1728-44-0x0000000000B10000-0x0000000000B1E000-memory.dmp

            Filesize

            56KB

          • memory/1728-45-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

            Filesize

            9.9MB

          • memory/1728-47-0x0000000000B20000-0x0000000000B30000-memory.dmp

            Filesize

            64KB

          • memory/1728-49-0x0000000000C30000-0x0000000000C3E000-memory.dmp

            Filesize

            56KB

          • memory/1728-51-0x0000000001200000-0x0000000001218000-memory.dmp

            Filesize

            96KB

          • memory/1728-53-0x0000000000C40000-0x0000000000C4C000-memory.dmp

            Filesize

            48KB

          • memory/1728-55-0x000000001B040000-0x000000001B08E000-memory.dmp

            Filesize

            312KB

          • memory/1728-28-0x00000000005E0000-0x00000000005F0000-memory.dmp

            Filesize

            64KB

          • memory/1728-25-0x0000000000600000-0x0000000000612000-memory.dmp

            Filesize

            72KB

          • memory/1728-23-0x00000000005D0000-0x00000000005DE000-memory.dmp

            Filesize

            56KB

          • memory/1728-21-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

            Filesize

            9.9MB

          • memory/1728-0-0x000007FEF57B3000-0x000007FEF57B4000-memory.dmp

            Filesize

            4KB

          • memory/1728-18-0x0000000000420000-0x0000000000430000-memory.dmp

            Filesize

            64KB

          • memory/1728-16-0x00000000005A0000-0x00000000005B8000-memory.dmp

            Filesize

            96KB

          • memory/1728-14-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

            Filesize

            9.9MB

          • memory/1728-13-0x0000000000410000-0x0000000000420000-memory.dmp

            Filesize

            64KB

          • memory/1728-100-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

            Filesize

            9.9MB

          • memory/1728-1-0x0000000001280000-0x0000000001606000-memory.dmp

            Filesize

            3.5MB

          • memory/1728-11-0x0000000000470000-0x000000000048C000-memory.dmp

            Filesize

            112KB

          • memory/1728-9-0x0000000000200000-0x000000000020E000-memory.dmp

            Filesize

            56KB

          • memory/1728-7-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

            Filesize

            9.9MB

          • memory/1728-6-0x0000000000440000-0x0000000000466000-memory.dmp

            Filesize

            152KB

          • memory/1728-4-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

            Filesize

            9.9MB

          • memory/1728-3-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

            Filesize

            9.9MB

          • memory/1728-2-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

            Filesize

            9.9MB

          • memory/2212-176-0x0000000000060000-0x00000000003E6000-memory.dmp

            Filesize

            3.5MB