Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04/12/2024, 22:22
Behavioral task
behavioral1
Sample
spoof test.7z
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
spoof test.7z
Resource
win10v2004-20241007-en
General
-
Target
spoof test.7z
-
Size
50KB
-
MD5
2b80931dfec2265ac0357414e27497f4
-
SHA1
d7bfec86f61e214a8b43fcdcaaf82bda5e88557a
-
SHA256
9f83ee8c3f2263e2400f1dc667c58520a846d81b12e8d15f62e4dfeba4389b3b
-
SHA512
cb9443487acf4de4a33deb781ef206533cf5b4095671f08dd2b5607f388a82be8478b4db86b5ceaebb6f1dcd6958cd2d09399a0acea04ecb6d9368fb94cda203
-
SSDEEP
768:AH1u19IsbaKCa8fll6kehelKR8e1vmrnwJU2O3QLp5OYgtf8aGZqfTn:AVuXIsqaSlRehZRBF+/pip/glOcTn
Malware Config
Extracted
xworm
database-recommendations.gl.at.ply.gg:17666
-
Install_directory
%AppData%
-
install_file
System User.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x003700000001875f-25.dat family_xworm behavioral1/memory/2644-27-0x00000000000F0000-0x000000000010A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2640 powershell.exe 1864 powershell.exe 1412 powershell.exe 2976 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System User.lnk mapper.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System User.lnk mapper.exe -
Executes dropped EXE 1 IoCs
pid Process 2644 mapper.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\System User = "C:\\Users\\Admin\\AppData\\Roaming\\System User.exe" mapper.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" mapper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BA7AA41-B28E-11EF-8D2A-5E7C7FDA70D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2956 7zFM.exe 2640 powershell.exe 1864 powershell.exe 1412 powershell.exe 2976 powershell.exe 2644 mapper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2956 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeRestorePrivilege 2956 7zFM.exe Token: 35 2956 7zFM.exe Token: SeSecurityPrivilege 2956 7zFM.exe Token: SeSecurityPrivilege 2956 7zFM.exe Token: SeDebugPrivilege 2644 mapper.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 1864 powershell.exe Token: SeDebugPrivilege 1412 powershell.exe Token: SeDebugPrivilege 2976 powershell.exe Token: SeDebugPrivilege 2644 mapper.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2956 7zFM.exe 2956 7zFM.exe 2956 7zFM.exe 2896 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2644 mapper.exe 2896 iexplore.exe 2896 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2956 wrote to memory of 1196 2956 7zFM.exe 31 PID 2956 wrote to memory of 1196 2956 7zFM.exe 31 PID 2956 wrote to memory of 1196 2956 7zFM.exe 31 PID 2956 wrote to memory of 2644 2956 7zFM.exe 33 PID 2956 wrote to memory of 2644 2956 7zFM.exe 33 PID 2956 wrote to memory of 2644 2956 7zFM.exe 33 PID 2644 wrote to memory of 2640 2644 mapper.exe 34 PID 2644 wrote to memory of 2640 2644 mapper.exe 34 PID 2644 wrote to memory of 2640 2644 mapper.exe 34 PID 2644 wrote to memory of 1864 2644 mapper.exe 36 PID 2644 wrote to memory of 1864 2644 mapper.exe 36 PID 2644 wrote to memory of 1864 2644 mapper.exe 36 PID 2644 wrote to memory of 1412 2644 mapper.exe 38 PID 2644 wrote to memory of 1412 2644 mapper.exe 38 PID 2644 wrote to memory of 1412 2644 mapper.exe 38 PID 2644 wrote to memory of 2976 2644 mapper.exe 40 PID 2644 wrote to memory of 2976 2644 mapper.exe 40 PID 2644 wrote to memory of 2976 2644 mapper.exe 40 PID 2644 wrote to memory of 3036 2644 mapper.exe 42 PID 2644 wrote to memory of 3036 2644 mapper.exe 42 PID 2644 wrote to memory of 3036 2644 mapper.exe 42 PID 2644 wrote to memory of 2896 2644 mapper.exe 47 PID 2644 wrote to memory of 2896 2644 mapper.exe 47 PID 2644 wrote to memory of 2896 2644 mapper.exe 47 PID 2896 wrote to memory of 2904 2896 iexplore.exe 48 PID 2896 wrote to memory of 2904 2896 iexplore.exe 48 PID 2896 wrote to memory of 2904 2896 iexplore.exe 48 PID 2896 wrote to memory of 2904 2896 iexplore.exe 48 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\spoof test.7z"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7zOC8B2F317\mapshit.bat" "2⤵PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\7zOC8BBFA67\mapper.exe"C:\Users\Admin\AppData\Local\Temp\7zOC8BBFA67\mapper.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\7zOC8BBFA67\mapper.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'mapper.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\System User.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System User.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System User" /tr "C:\Users\Admin\AppData\Roaming\System User.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3036
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\How To Decrypt My Files.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0BCFD8AC-2912-48A6-8CB1-C94B60BB04D0} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]1⤵PID:2524
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1689a4ead47b53f67515d9c9b11f7a4
SHA1137e7963c10de73f40ebd15fc19ee0a129062cd9
SHA2564d82d1da756f68cc2133832816f3bc87212561adcf78825608221d1bc6331f25
SHA512bb0e11f5b78ee4216ab0ad84ee82df07e9789d383282ade98b5adc0cd41b9ae9ce6ed40d486b86be6494f7cce4b3a1f17ee3b547a7f0b2a4d34b3bc337623aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552dff33eed85f33a6edd6b335980f77a
SHA10ce06a010d0b154d878b0997a224dad75e938eec
SHA2569c52348bb3032a68d74a73f346435f7e56e40c614b5578d4a4f1b24941e4b6d0
SHA5126af850a52f6f9c2676cdd3c0237cdd2a9173bcbb5b07915fa1d1b91700c513652202f3b526c62e6f60203951ab94487221a0e100beb5267cb6ad0197773d0ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0abbc2bd18de3b6a2dd41348a7b61bb
SHA1d7975459c37cec98de196561398fae9f760a75df
SHA25678bba0efde3a00e2bd7670dc044014ecc381c93e61024c98cbaa69592e88b36a
SHA512102ebee75ba8e844b4bbf75d68c76d0e451d9c6d0d81996c7ce59cb381f6fcd3d9de000a1c942ef0b2b8b56e099041b691b2b5c910ff739c1a61ce7c834d690b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592f26ea39d5dfaa34277dcee58e2941b
SHA13f14e03676b35a1f3df88b148fc3b28b94bd692d
SHA2564489d321a00a05a239da28f74b782d0ad60b89916d0ebfade17df28ca752274d
SHA5125d2dae0861fe4632bd4efd43ca2e69361e9b2586eca35431c0d0d8439641671fde8d03dcdbf0f27ccdb31d6875636afd2a935381c6d423fd605a9c16428da7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc78b412c4476797346818fd413be84
SHA111a4e9051d7edf687b7726ba8001316e5a20cb49
SHA256471973476892012c52f8f51449ae5065e12bb7de4f1ebc6836d0138ecb21d320
SHA5125221f176a5eba7cf884c7989dabaeeb13ad38a86169a44b4e7d0a8e47c0a086a9fc6402ca74b53af961f77328f4b5b1827fafdedaeb6f289b13794026fd34ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7cd7de673666eab331f6e0935408c70
SHA1dcb6ef92cdf93844b76c52ad471449887486eaf6
SHA2561f9c7ee8836721fa42d39d336bd02614b2ca098ccf2a5179dd1c94bc366a12a1
SHA5125f9b36114f75ac14c5dea88af079a862421518c37d2a18fc4ae994ec42c85aca0be1986b1eefbd961cb7fffbe001cef5bbd692e683bb9fe37ef94a8c26c91e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b350a71597e29059d9adc0528d1144dd
SHA173d038cf1d3b3781167d87fc3cbeacb1013f148e
SHA2564e0582d4634f77c0dc99827e83f44ba0bd282fe86cd228fe5435529c5986c76a
SHA5123724c25621484648884aa4a45b47b6e20b6f6a52717bc7a00297aaecce634a56aa7df3210ccf0c72f6d91a168ead7d94dd4902cbc971b0abbc49bebdf1c62bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d42204d2b7ac7c0a136141b88a60ef
SHA17fa09168e44292eb619a7f3779aecbe99612ae1b
SHA25648291b7af12cbd4ca1da00a01d7558b547d34848add66b1eeb1fd285f80cb8ee
SHA512082d52226976e61a67acb428fa6dc322d9ae81322c5cb514499ef1552c20403ff6a9dd3a3380073adfe9ced001d501632c8e8774d00e462f3f1d1c1f14f37ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad366b0f785d627962f604bc007d7ed
SHA15355d2c37156b2c9157db49b59f374fffe7c075c
SHA2560c248a573994fd81fead61e032b987f9b49a6897e4f596cb5f9bf95e8db3c371
SHA512c76be9f70bd4f3c9e5d236843feb4aeb53031c8c9544f7c468aa9803925daee10cc2088649f16ffef700c6d22c93ed2793db548d34170ed0e4d78b9228c083ac
-
Filesize
461B
MD5b8e618e6f339b03be77b4b606a360166
SHA18b91267bb92ffb2f957aba4ddb5fff13bcc9d48b
SHA256fa5ca5898c1ac8616f4a9350560aeb09c3f8070323f5843b8ddeede91a5cc428
SHA5129f1ade19d6ce8e95d9ab48211e1e3595dd6c646b403dab4c5dadabcb682d97c1f46716d27215650bbc67eb47d681b30459b7b78d77cdaa452d2707a224d03354
-
Filesize
78KB
MD5919023267a38b0b6641b26319901fddf
SHA1dbd25f981353ce0f824fb441a2a0dc2441bdc8da
SHA256c68421f86ca419eac8bb89fcd66b860db60ed4201c16bfa4159436bbbae9401e
SHA512ece9275342a3986ef2ab60e0128ca055ea7e1352c13c05367b62e1296dbf4105d757ce0181a79888f1144f14379dc15518aac87bac81da093036ba1a243bbfbf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5f7ca283f2e5b2c58bd1a62facad5804e
SHA167c4466bf832e2e01b57bf578de5ebfe30f02364
SHA25600638f8f6ec7bb3f52aba10142fa36d822fd8f372136b48b72b54bfc7936f779
SHA51214f78bb7243ee0ea433cef51f8fe04e67c84bc50b521ca28bacc49870e5e3cbce11baea736b93439a0d11f6a7749c2bf78093cec69accb51080f35e2a450ed8c
-
Filesize
624B
MD5997dd57752f8b1670d77578e978b346b
SHA1c9b536bf00ac37cee6e747b1dbacdb6f8eddb0eb
SHA256e5f3373efbd527f969b281aaec84ef2a7a1657e8fbb1f95d31f8a74f3b4c155c
SHA512496ea318c6b338d31c4d4694c3f93c8ba496a67309b14d0e44335958b65356de68f90efdcb997626d1451e2d3b2a5227aaa61367d0d4a494d92610903c285d7d
-
C:\Users\Admin\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000001.regtrans-ms.ENC
Filesize16B
MD517869dbc67df2e3d232de9dbdc40767d
SHA19228b64f9436c833428e83fd1952448eb4800d93
SHA25672826958043a1252c135dc654334cc89d0dbb1944fbf096b9c2134cc38ebee60
SHA512d2a68df030aab44ce9ce57ce2702a47fde40464b880b833c408cbbd31d6363d36dab960011f7a0a0b626f0fefb9b82a82cda264105557e2506d75dd9b7c0884f