Analysis
-
max time kernel
152s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 07:16
Static task
static1
Behavioral task
behavioral1
Sample
a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe
Resource
win10v2004-20220901-en
General
-
Target
a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe
-
Size
160KB
-
MD5
43e5f86f81586d8d6c1b4fac4b6b4cd0
-
SHA1
c6940a2c2817359ab1a0b7ea560be3c0f97a72dc
-
SHA256
a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf
-
SHA512
ace1b9deafa47bab4b7209ba4d9b214ecd5a054d0df1760fce5691cfa922e9a7513f2b1cca0de0b807261511a6bf0e36927ba5bbb773549b1812d0d38b63f6ee
-
SSDEEP
3072:TGrNIkMzZwveK8ss81GITFJ/G4bSGXO7QD56i:qrNrMzKeRIhzG4mG+MD59
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" D3_08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" D3_08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" D3_08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command D3_08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" D3_08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command D3_08.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command D3_08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" D3_08.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" D3_08.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE -
Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" D3_08.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" D3_08.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CSRSS.EXE -
Disables RegEdit via registry modification 16 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" D3_08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" D3_08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 63 IoCs
pid Process 632 D3_08.exe 2744 IExplorer.exe 2168 WINLOGON.EXE 4600 D3_08.exe 1232 D3_08.exe 2724 IExplorer.exe 5000 D3_08.exe 1872 IExplorer.exe 4836 IExplorer.exe 1580 WINLOGON.EXE 1332 WINLOGON.EXE 3356 CSRSS.EXE 4916 WINLOGON.EXE 3796 CSRSS.EXE 4736 CSRSS.EXE 4328 SERVICES.EXE 800 SERVICES.EXE 3876 SERVICES.EXE 868 LSASS.EXE 984 LSASS.EXE 1100 LSASS.EXE 4348 D3_08.exe 3068 SMSS.EXE 1152 IExplorer.exe 4072 SMSS.EXE 1772 SMSS.EXE 504 WINLOGON.EXE 1748 CSRSS.EXE 516 D3_08.exe 4204 SERVICES.EXE 1520 IExplorer.exe 2960 CSRSS.EXE 3724 WINLOGON.EXE 3088 LSASS.EXE 1212 SERVICES.EXE 4632 CSRSS.EXE 404 LSASS.EXE 3704 SMSS.EXE 4268 SERVICES.EXE 1712 SMSS.EXE 1360 LSASS.EXE 4492 SMSS.EXE 2120 D3_08.exe 4044 D3_08.exe 2304 IExplorer.exe 3576 IExplorer.exe 4780 WINLOGON.EXE 3928 WINLOGON.EXE 308 CSRSS.EXE 328 D3_08.exe 3968 CSRSS.EXE 5036 IExplorer.exe 2248 SERVICES.EXE 1236 SERVICES.EXE 2504 WINLOGON.EXE 3732 LSASS.EXE 4616 LSASS.EXE 3872 CSRSS.EXE 3128 SMSS.EXE 1904 SMSS.EXE 5088 SERVICES.EXE 848 LSASS.EXE 3572 SMSS.EXE -
Loads dropped DLL 8 IoCs
pid Process 4600 D3_08.exe 1232 D3_08.exe 5000 D3_08.exe 4348 D3_08.exe 516 D3_08.exe 2120 D3_08.exe 4044 D3_08.exe 328 D3_08.exe -
Adds Run key to start application 2 TTPs 56 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\D3_08 = "C:\\Windows\\D3_08.exe" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\D3_08 = "C:\\Windows\\D3_08.exe" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\D3_08 = "C:\\Windows\\D3_08.exe" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" D3_08.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\D3_08 = "C:\\Windows\\D3_08.exe" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\D3_08 = "C:\\Windows\\D3_08.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\D3_08 = "C:\\Windows\\D3_08.exe" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" D3_08.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" D3_08.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\D3_08 = "C:\\Windows\\D3_08.exe" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\D3_08 = "C:\\Windows\\D3_08.exe" D3_08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" D3_08.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ D3_08.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ D3_08.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SMSS.EXE -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\desktop.ini IExplorer.exe File created C:\desktop.ini IExplorer.exe File opened for modification C:\desktop.ini D3_08.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\Z: IExplorer.exe File opened (read-only) \??\P: a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File opened (read-only) \??\Z: CSRSS.EXE File opened (read-only) \??\O: D3_08.exe File opened (read-only) \??\B: LSASS.EXE File opened (read-only) \??\O: LSASS.EXE File opened (read-only) \??\U: LSASS.EXE File opened (read-only) \??\T: SERVICES.EXE File opened (read-only) \??\Z: SMSS.EXE File opened (read-only) \??\U: SMSS.EXE File opened (read-only) \??\N: IExplorer.exe File opened (read-only) \??\F: D3_08.exe File opened (read-only) \??\P: D3_08.exe File opened (read-only) \??\W: D3_08.exe File opened (read-only) \??\I: LSASS.EXE File opened (read-only) \??\P: LSASS.EXE File opened (read-only) \??\H: WINLOGON.EXE File opened (read-only) \??\H: SERVICES.EXE File opened (read-only) \??\L: SERVICES.EXE File opened (read-only) \??\F: CSRSS.EXE File opened (read-only) \??\V: SERVICES.EXE File opened (read-only) \??\V: LSASS.EXE File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\O: a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File opened (read-only) \??\M: WINLOGON.EXE File opened (read-only) \??\N: WINLOGON.EXE File opened (read-only) \??\P: WINLOGON.EXE File opened (read-only) \??\S: LSASS.EXE File opened (read-only) \??\L: CSRSS.EXE File opened (read-only) \??\G: LSASS.EXE File opened (read-only) \??\H: LSASS.EXE File opened (read-only) \??\P: SMSS.EXE File opened (read-only) \??\Y: SMSS.EXE File opened (read-only) \??\L: D3_08.exe File opened (read-only) \??\B: a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File opened (read-only) \??\F: WINLOGON.EXE File opened (read-only) \??\Y: WINLOGON.EXE File opened (read-only) \??\N: CSRSS.EXE File opened (read-only) \??\X: IExplorer.exe File opened (read-only) \??\H: CSRSS.EXE File opened (read-only) \??\F: SERVICES.EXE File opened (read-only) \??\K: SMSS.EXE File opened (read-only) \??\R: IExplorer.exe File opened (read-only) \??\V: IExplorer.exe File opened (read-only) \??\X: a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File opened (read-only) \??\K: LSASS.EXE File opened (read-only) \??\M: SERVICES.EXE File opened (read-only) \??\S: SMSS.EXE File opened (read-only) \??\V: WINLOGON.EXE File opened (read-only) \??\O: SERVICES.EXE File opened (read-only) \??\H: SMSS.EXE File opened (read-only) \??\L: SMSS.EXE File opened (read-only) \??\O: SMSS.EXE File opened (read-only) \??\V: SMSS.EXE File opened (read-only) \??\E: LSASS.EXE File opened (read-only) \??\N: SERVICES.EXE File opened (read-only) \??\I: D3_08.exe File opened (read-only) \??\T: D3_08.exe File opened (read-only) \??\H: a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File opened (read-only) \??\M: a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File opened (read-only) \??\B: WINLOGON.EXE File opened (read-only) \??\S: WINLOGON.EXE File opened (read-only) \??\Q: SERVICES.EXE -
Drops file in System32 directory 53 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe D3_08.exe File opened for modification C:\Windows\SysWOW64\MrD3_08.scr SERVICES.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\MrD3_08.scr CSRSS.EXE File created C:\Windows\SysWOW64\IExplorer.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\MrD3_08.scr LSASS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\shell.exe a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\MrD3_08.scr a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File opened for modification C:\Windows\SysWOW64\MrD3_08.scr IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe WINLOGON.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe SERVICES.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe SERVICES.EXE File created C:\Windows\SysWOW64\IExplorer.exe SERVICES.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\MrD3_08.scr SMSS.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrD3_08.scr D3_08.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File created C:\Windows\SysWOW64\IExplorer.exe D3_08.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrD3_08.scr WINLOGON.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\MrD3_08.scr a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe WINLOGON.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe SMSS.EXE File created C:\Windows\SysWOW64\shell.exe D3_08.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe WINLOGON.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe SMSS.EXE File created C:\Windows\SysWOW64\IExplorer.exe a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File opened for modification C:\Windows\SysWOW64\shell.exe D3_08.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe -
Drops file in Windows directory 34 IoCs
description ioc Process File opened for modification C:\Windows\D3_08.exe D3_08.exe File created C:\Windows\D3_08.exe IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\D3_08.exe IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\D3_08.exe LSASS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\D3_08.exe a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\D3_08.exe CSRSS.EXE File opened for modification C:\Windows\D3_08.exe SMSS.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\D3_08.exe WINLOGON.EXE File created C:\Windows\D3_08.exe CSRSS.EXE File created C:\Windows\D3_08.exe a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\D3_08.exe SERVICES.EXE File opened for modification C:\Windows\D3_08.exe LSASS.EXE File created C:\Windows\D3_08.exe SMSS.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\D3_08.exe D3_08.exe File created C:\Windows\D3_08.exe WINLOGON.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\D3_08.exe SERVICES.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe -
Modifies Control Panel 32 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" D3_08.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ D3_08.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" D3_08.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" D3_08.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\ LSASS.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile D3_08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" D3_08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command D3_08.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" D3_08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe -
Suspicious behavior: GetForegroundWindowSpam 7 IoCs
pid Process 632 D3_08.exe 3356 CSRSS.EXE 2168 WINLOGON.EXE 2744 IExplorer.exe 868 LSASS.EXE 4328 SERVICES.EXE 3068 SMSS.EXE -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 632 D3_08.exe 2744 IExplorer.exe 2168 WINLOGON.EXE 1232 D3_08.exe 4600 D3_08.exe 5000 D3_08.exe 2724 IExplorer.exe 1872 IExplorer.exe 1580 WINLOGON.EXE 4836 IExplorer.exe 1332 WINLOGON.EXE 4916 WINLOGON.EXE 3356 CSRSS.EXE 3796 CSRSS.EXE 4736 CSRSS.EXE 4328 SERVICES.EXE 800 SERVICES.EXE 3876 SERVICES.EXE 868 LSASS.EXE 984 LSASS.EXE 1100 LSASS.EXE 4348 D3_08.exe 1152 IExplorer.exe 3068 SMSS.EXE 4072 SMSS.EXE 1772 SMSS.EXE 504 WINLOGON.EXE 1748 CSRSS.EXE 516 D3_08.exe 4204 SERVICES.EXE 1520 IExplorer.exe 2960 CSRSS.EXE 3724 WINLOGON.EXE 3088 LSASS.EXE 1212 SERVICES.EXE 4632 CSRSS.EXE 404 LSASS.EXE 3704 SMSS.EXE 4268 SERVICES.EXE 1712 SMSS.EXE 1360 LSASS.EXE 4492 SMSS.EXE 2120 D3_08.exe 4044 D3_08.exe 2304 IExplorer.exe 3576 IExplorer.exe 4780 WINLOGON.EXE 3928 WINLOGON.EXE 308 CSRSS.EXE 328 D3_08.exe 5036 IExplorer.exe 3968 CSRSS.EXE 2248 SERVICES.EXE 2504 WINLOGON.EXE 1236 SERVICES.EXE 3732 LSASS.EXE 4616 LSASS.EXE 3872 CSRSS.EXE 3128 SMSS.EXE 1904 SMSS.EXE 5088 SERVICES.EXE 848 LSASS.EXE 3572 SMSS.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4108 wrote to memory of 632 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 84 PID 4108 wrote to memory of 632 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 84 PID 4108 wrote to memory of 632 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 84 PID 4108 wrote to memory of 2744 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 85 PID 4108 wrote to memory of 2744 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 85 PID 4108 wrote to memory of 2744 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 85 PID 4108 wrote to memory of 2168 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 86 PID 4108 wrote to memory of 2168 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 86 PID 4108 wrote to memory of 2168 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 86 PID 2744 wrote to memory of 4600 2744 IExplorer.exe 94 PID 2744 wrote to memory of 4600 2744 IExplorer.exe 94 PID 2744 wrote to memory of 4600 2744 IExplorer.exe 94 PID 4108 wrote to memory of 1232 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 93 PID 4108 wrote to memory of 1232 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 93 PID 4108 wrote to memory of 1232 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 93 PID 4108 wrote to memory of 2724 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 87 PID 4108 wrote to memory of 2724 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 87 PID 4108 wrote to memory of 2724 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 87 PID 632 wrote to memory of 5000 632 D3_08.exe 88 PID 632 wrote to memory of 5000 632 D3_08.exe 88 PID 632 wrote to memory of 5000 632 D3_08.exe 88 PID 2744 wrote to memory of 1872 2744 IExplorer.exe 89 PID 2744 wrote to memory of 1872 2744 IExplorer.exe 89 PID 2744 wrote to memory of 1872 2744 IExplorer.exe 89 PID 632 wrote to memory of 4836 632 D3_08.exe 90 PID 632 wrote to memory of 4836 632 D3_08.exe 90 PID 632 wrote to memory of 4836 632 D3_08.exe 90 PID 4108 wrote to memory of 1580 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 92 PID 4108 wrote to memory of 1580 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 92 PID 4108 wrote to memory of 1580 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 92 PID 2744 wrote to memory of 1332 2744 IExplorer.exe 91 PID 2744 wrote to memory of 1332 2744 IExplorer.exe 91 PID 2744 wrote to memory of 1332 2744 IExplorer.exe 91 PID 632 wrote to memory of 4916 632 D3_08.exe 95 PID 632 wrote to memory of 4916 632 D3_08.exe 95 PID 632 wrote to memory of 4916 632 D3_08.exe 95 PID 4108 wrote to memory of 3356 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 96 PID 4108 wrote to memory of 3356 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 96 PID 4108 wrote to memory of 3356 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 96 PID 2744 wrote to memory of 3796 2744 IExplorer.exe 97 PID 2744 wrote to memory of 3796 2744 IExplorer.exe 97 PID 2744 wrote to memory of 3796 2744 IExplorer.exe 97 PID 632 wrote to memory of 4736 632 D3_08.exe 98 PID 632 wrote to memory of 4736 632 D3_08.exe 98 PID 632 wrote to memory of 4736 632 D3_08.exe 98 PID 2744 wrote to memory of 800 2744 IExplorer.exe 99 PID 2744 wrote to memory of 800 2744 IExplorer.exe 99 PID 2744 wrote to memory of 800 2744 IExplorer.exe 99 PID 4108 wrote to memory of 4328 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 100 PID 4108 wrote to memory of 4328 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 100 PID 4108 wrote to memory of 4328 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 100 PID 632 wrote to memory of 3876 632 D3_08.exe 101 PID 632 wrote to memory of 3876 632 D3_08.exe 101 PID 632 wrote to memory of 3876 632 D3_08.exe 101 PID 2744 wrote to memory of 868 2744 IExplorer.exe 102 PID 2744 wrote to memory of 868 2744 IExplorer.exe 102 PID 2744 wrote to memory of 868 2744 IExplorer.exe 102 PID 4108 wrote to memory of 984 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 103 PID 4108 wrote to memory of 984 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 103 PID 4108 wrote to memory of 984 4108 a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe 103 PID 632 wrote to memory of 1100 632 D3_08.exe 104 PID 632 wrote to memory of 1100 632 D3_08.exe 104 PID 632 wrote to memory of 1100 632 D3_08.exe 104 PID 2168 wrote to memory of 4348 2168 WINLOGON.EXE 105 -
System policy modification 1 TTPs 24 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System D3_08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" D3_08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" D3_08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe"C:\Users\Admin\AppData\Local\Temp\a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf.exe"1⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4108 -
C:\Windows\D3_08.exeC:\Windows\D3_08.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:632 -
C:\Windows\D3_08.exeC:\Windows\D3_08.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5000
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4836
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4916
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4736
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3876
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2744 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1872
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1332
-
-
C:\Windows\D3_08.exeC:\Windows\D3_08.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4600
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3796
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:800
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:868 -
C:\Windows\D3_08.exeC:\Windows\D3_08.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2120
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2304
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:308
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2248
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3732
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3128
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4072
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2168 -
C:\Windows\D3_08.exeC:\Windows\D3_08.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4348
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1152
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:504
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1212
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:404
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1712
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
C:\Windows\D3_08.exeC:\Windows\D3_08.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1232
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3356 -
C:\Windows\D3_08.exeC:\Windows\D3_08.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:516
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3724
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4632
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4268
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1360
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4492
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4328 -
C:\Windows\D3_08.exeC:\Windows\D3_08.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4044
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3576
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3928
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3968
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1236
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4616
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1904
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:984
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3068 -
C:\Windows\D3_08.exeC:\Windows\D3_08.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:328
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:5036
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2504
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3872
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5088
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:848
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3572
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4204
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3088
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3704
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD543e5f86f81586d8d6c1b4fac4b6b4cd0
SHA1c6940a2c2817359ab1a0b7ea560be3c0f97a72dc
SHA256a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf
SHA512ace1b9deafa47bab4b7209ba4d9b214ecd5a054d0df1760fce5691cfa922e9a7513f2b1cca0de0b807261511a6bf0e36927ba5bbb773549b1812d0d38b63f6ee
-
Filesize
160KB
MD543e5f86f81586d8d6c1b4fac4b6b4cd0
SHA1c6940a2c2817359ab1a0b7ea560be3c0f97a72dc
SHA256a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf
SHA512ace1b9deafa47bab4b7209ba4d9b214ecd5a054d0df1760fce5691cfa922e9a7513f2b1cca0de0b807261511a6bf0e36927ba5bbb773549b1812d0d38b63f6ee
-
Filesize
160KB
MD5adf7c00e7e2c67db9ea07216c02f3daa
SHA1a40023b4c88b5c34bbd1d91ac4e91c3c8741a069
SHA256c606b4ec044cf929a33581f58ad11868343e893d00cce6b8aac8f527fa3e321c
SHA5126833f5b10c106e90bacb2d0f7da7eb389108c62c3addc2683518ee3727fe84be2e7364e240a8518ba6fc216cb9c8af9ea175d11f5da515c2732f2b456dd90169
-
Filesize
160KB
MD5adf7c00e7e2c67db9ea07216c02f3daa
SHA1a40023b4c88b5c34bbd1d91ac4e91c3c8741a069
SHA256c606b4ec044cf929a33581f58ad11868343e893d00cce6b8aac8f527fa3e321c
SHA5126833f5b10c106e90bacb2d0f7da7eb389108c62c3addc2683518ee3727fe84be2e7364e240a8518ba6fc216cb9c8af9ea175d11f5da515c2732f2b456dd90169
-
Filesize
160KB
MD55fa9841e8ff302294d89e670c6a8442a
SHA17e676448353841f3d330cff286fe4ed8b22d7621
SHA256aae820df8e3111cb6adbee242ffea8eef695b516c2fcac3c8b598e3ca902c705
SHA51212aaeee333a95c0d58e6d50ac024e75188a5e8c61295764db3379657ca80149335d34eb2022112c2a8f417f42adfb1611975b3f75b79f3da2b73ef90a5453933
-
Filesize
441B
MD5de8b6c4c740b3046924d844032767852
SHA1256842ccefd03f97013f51ec8bd25f842acec59a
SHA256c8cfecfb4260f0488e4152cdaaca8854865f0e20d15e9e37cba26f81db38c195
SHA512a08b0e866da0dbf21dae68deccd826e0a376695088c27fcddea444d01a8ca0f5cf01d282b9f2d9a4183e2503f7d2d7c850c722bd7976050b79c56feb70c6de29
-
Filesize
441B
MD5de8b6c4c740b3046924d844032767852
SHA1256842ccefd03f97013f51ec8bd25f842acec59a
SHA256c8cfecfb4260f0488e4152cdaaca8854865f0e20d15e9e37cba26f81db38c195
SHA512a08b0e866da0dbf21dae68deccd826e0a376695088c27fcddea444d01a8ca0f5cf01d282b9f2d9a4183e2503f7d2d7c850c722bd7976050b79c56feb70c6de29
-
Filesize
441B
MD5de8b6c4c740b3046924d844032767852
SHA1256842ccefd03f97013f51ec8bd25f842acec59a
SHA256c8cfecfb4260f0488e4152cdaaca8854865f0e20d15e9e37cba26f81db38c195
SHA512a08b0e866da0dbf21dae68deccd826e0a376695088c27fcddea444d01a8ca0f5cf01d282b9f2d9a4183e2503f7d2d7c850c722bd7976050b79c56feb70c6de29
-
Filesize
160KB
MD55fa9841e8ff302294d89e670c6a8442a
SHA17e676448353841f3d330cff286fe4ed8b22d7621
SHA256aae820df8e3111cb6adbee242ffea8eef695b516c2fcac3c8b598e3ca902c705
SHA51212aaeee333a95c0d58e6d50ac024e75188a5e8c61295764db3379657ca80149335d34eb2022112c2a8f417f42adfb1611975b3f75b79f3da2b73ef90a5453933
-
Filesize
160KB
MD525188d21e0fe4e2186fde8422b5074be
SHA1d28667272d55b8ad493b13a5b48dedc9f98fb316
SHA256f5b6dd86e26e0edc2c56efa0788d2a887508bc471e55904c37c6c9aa0044eb87
SHA5120b9e948eb62d125cdbd4dd8acb2b25462139d10fc332486e9e9cd5b8566305d09f6d4bfdf113b9e2652d314dd88b96a4707ba0751aadaeebc3c7a638dda4d976
-
Filesize
160KB
MD5891190df7959351ff5dc06194645e348
SHA1fce88603f7c8d57d58aae70ec314301b60471754
SHA25659a597e09abebe3acc3868ea9af064503f4eed2b648d161a3da6a21b4c4afe46
SHA5128b1d5902b8f45e14df6e9382beaed8e3e6c870adf70aba978d332988a6ad0cee5870b344ff6572fa5f622d4bfdeb3070a33f5d9991eb550d3ed54da176ad2807
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5891190df7959351ff5dc06194645e348
SHA1fce88603f7c8d57d58aae70ec314301b60471754
SHA25659a597e09abebe3acc3868ea9af064503f4eed2b648d161a3da6a21b4c4afe46
SHA5128b1d5902b8f45e14df6e9382beaed8e3e6c870adf70aba978d332988a6ad0cee5870b344ff6572fa5f622d4bfdeb3070a33f5d9991eb550d3ed54da176ad2807
-
Filesize
160KB
MD5e895ea10fbcd310ea59309f378b1e3ab
SHA13039096997f145fb22f87ded13555f2ebca0e6ed
SHA25695905dd44a94681aa6518f2f20d90dc3edbecb21a2c3d45b1e9787eb7da0d108
SHA5122c61f9f73b70c0a7e63fd0cefa616e3dee57378608a8f80614da5a652feb77b38af718c8ef27e7eb5c07d64f8548a37e1ead6dc05d32c95ef6d10c6acfa8c7c1
-
Filesize
160KB
MD5e895ea10fbcd310ea59309f378b1e3ab
SHA13039096997f145fb22f87ded13555f2ebca0e6ed
SHA25695905dd44a94681aa6518f2f20d90dc3edbecb21a2c3d45b1e9787eb7da0d108
SHA5122c61f9f73b70c0a7e63fd0cefa616e3dee57378608a8f80614da5a652feb77b38af718c8ef27e7eb5c07d64f8548a37e1ead6dc05d32c95ef6d10c6acfa8c7c1
-
Filesize
160KB
MD5e895ea10fbcd310ea59309f378b1e3ab
SHA13039096997f145fb22f87ded13555f2ebca0e6ed
SHA25695905dd44a94681aa6518f2f20d90dc3edbecb21a2c3d45b1e9787eb7da0d108
SHA5122c61f9f73b70c0a7e63fd0cefa616e3dee57378608a8f80614da5a652feb77b38af718c8ef27e7eb5c07d64f8548a37e1ead6dc05d32c95ef6d10c6acfa8c7c1
-
Filesize
160KB
MD5a6429985b82707fdcb7bcaaead0e3f26
SHA1f6a902a930591c7bbf245495abfd1c380eae713f
SHA256b3100a7ea089ee77ee26539111dc745fa925d27e2194c01d57798729ff941526
SHA51218859d15bdee006461af51893e13b90a25dc55b70e37a45c1185762d7b06a0a9b077f65a4d124ac2960f3477a2115c135013370a9926598b0b7f28b69f5d5d98
-
Filesize
160KB
MD5e895ea10fbcd310ea59309f378b1e3ab
SHA13039096997f145fb22f87ded13555f2ebca0e6ed
SHA25695905dd44a94681aa6518f2f20d90dc3edbecb21a2c3d45b1e9787eb7da0d108
SHA5122c61f9f73b70c0a7e63fd0cefa616e3dee57378608a8f80614da5a652feb77b38af718c8ef27e7eb5c07d64f8548a37e1ead6dc05d32c95ef6d10c6acfa8c7c1
-
Filesize
160KB
MD58e4a608981cde3af32e8710cc769983e
SHA13ec0a2d93c81083ae7882262024ac8a3bc9aae70
SHA2568e9bc518737d5ad05624b8c80b041224bbcc123d11fbb36c5eaedf421568c6c4
SHA51269faa5707453e824551d686085b010442f95cb8b3407d64151b70184ee0588eddda831085b8922c0c68c78b17621a1778d5c7147de1b39961956690ccebd0b11
-
Filesize
160KB
MD5891190df7959351ff5dc06194645e348
SHA1fce88603f7c8d57d58aae70ec314301b60471754
SHA25659a597e09abebe3acc3868ea9af064503f4eed2b648d161a3da6a21b4c4afe46
SHA5128b1d5902b8f45e14df6e9382beaed8e3e6c870adf70aba978d332988a6ad0cee5870b344ff6572fa5f622d4bfdeb3070a33f5d9991eb550d3ed54da176ad2807
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD53833333ebad986a11d8d5938fba662e0
SHA1f64205ecebcb4e1c63a108514e148bc65161f3d1
SHA25642de92de81981cc8df79e057ee6722dfe8dd99038d086cf1469a81707d3a006f
SHA512ded8373cd3dfb50aa01ffc1aa5c4d50ccf87a7f40b1357cd17109f090a5eb7368d2264d8f5ce20b307185c34cb7ce6be41613eec6901eba07b256f21894dfce2
-
Filesize
160KB
MD5891190df7959351ff5dc06194645e348
SHA1fce88603f7c8d57d58aae70ec314301b60471754
SHA25659a597e09abebe3acc3868ea9af064503f4eed2b648d161a3da6a21b4c4afe46
SHA5128b1d5902b8f45e14df6e9382beaed8e3e6c870adf70aba978d332988a6ad0cee5870b344ff6572fa5f622d4bfdeb3070a33f5d9991eb550d3ed54da176ad2807
-
Filesize
160KB
MD536d660a775f18325a37655944da982f9
SHA15e7695e4d8aa1bdddd211f5e740b33b3c6e225a0
SHA2564f3dc852e5b75a74a4e74193521742c9a358b14be57208f7945ebdca291494b6
SHA5120239da977997c20831117c94583f6a33c10f7904cfa00dff0e72f03b60a0004ed4c6b4182e73308e784b93a68269695009533819ca3d10be6ec29bef69007054
-
Filesize
160KB
MD536d660a775f18325a37655944da982f9
SHA15e7695e4d8aa1bdddd211f5e740b33b3c6e225a0
SHA2564f3dc852e5b75a74a4e74193521742c9a358b14be57208f7945ebdca291494b6
SHA5120239da977997c20831117c94583f6a33c10f7904cfa00dff0e72f03b60a0004ed4c6b4182e73308e784b93a68269695009533819ca3d10be6ec29bef69007054
-
Filesize
160KB
MD536d660a775f18325a37655944da982f9
SHA15e7695e4d8aa1bdddd211f5e740b33b3c6e225a0
SHA2564f3dc852e5b75a74a4e74193521742c9a358b14be57208f7945ebdca291494b6
SHA5120239da977997c20831117c94583f6a33c10f7904cfa00dff0e72f03b60a0004ed4c6b4182e73308e784b93a68269695009533819ca3d10be6ec29bef69007054
-
Filesize
160KB
MD536d660a775f18325a37655944da982f9
SHA15e7695e4d8aa1bdddd211f5e740b33b3c6e225a0
SHA2564f3dc852e5b75a74a4e74193521742c9a358b14be57208f7945ebdca291494b6
SHA5120239da977997c20831117c94583f6a33c10f7904cfa00dff0e72f03b60a0004ed4c6b4182e73308e784b93a68269695009533819ca3d10be6ec29bef69007054
-
Filesize
160KB
MD55fa9841e8ff302294d89e670c6a8442a
SHA17e676448353841f3d330cff286fe4ed8b22d7621
SHA256aae820df8e3111cb6adbee242ffea8eef695b516c2fcac3c8b598e3ca902c705
SHA51212aaeee333a95c0d58e6d50ac024e75188a5e8c61295764db3379657ca80149335d34eb2022112c2a8f417f42adfb1611975b3f75b79f3da2b73ef90a5453933
-
Filesize
160KB
MD5891190df7959351ff5dc06194645e348
SHA1fce88603f7c8d57d58aae70ec314301b60471754
SHA25659a597e09abebe3acc3868ea9af064503f4eed2b648d161a3da6a21b4c4afe46
SHA5128b1d5902b8f45e14df6e9382beaed8e3e6c870adf70aba978d332988a6ad0cee5870b344ff6572fa5f622d4bfdeb3070a33f5d9991eb550d3ed54da176ad2807
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
160KB
MD5891190df7959351ff5dc06194645e348
SHA1fce88603f7c8d57d58aae70ec314301b60471754
SHA25659a597e09abebe3acc3868ea9af064503f4eed2b648d161a3da6a21b4c4afe46
SHA5128b1d5902b8f45e14df6e9382beaed8e3e6c870adf70aba978d332988a6ad0cee5870b344ff6572fa5f622d4bfdeb3070a33f5d9991eb550d3ed54da176ad2807
-
Filesize
160KB
MD5891190df7959351ff5dc06194645e348
SHA1fce88603f7c8d57d58aae70ec314301b60471754
SHA25659a597e09abebe3acc3868ea9af064503f4eed2b648d161a3da6a21b4c4afe46
SHA5128b1d5902b8f45e14df6e9382beaed8e3e6c870adf70aba978d332988a6ad0cee5870b344ff6572fa5f622d4bfdeb3070a33f5d9991eb550d3ed54da176ad2807
-
Filesize
160KB
MD5891190df7959351ff5dc06194645e348
SHA1fce88603f7c8d57d58aae70ec314301b60471754
SHA25659a597e09abebe3acc3868ea9af064503f4eed2b648d161a3da6a21b4c4afe46
SHA5128b1d5902b8f45e14df6e9382beaed8e3e6c870adf70aba978d332988a6ad0cee5870b344ff6572fa5f622d4bfdeb3070a33f5d9991eb550d3ed54da176ad2807
-
Filesize
160KB
MD5891190df7959351ff5dc06194645e348
SHA1fce88603f7c8d57d58aae70ec314301b60471754
SHA25659a597e09abebe3acc3868ea9af064503f4eed2b648d161a3da6a21b4c4afe46
SHA5128b1d5902b8f45e14df6e9382beaed8e3e6c870adf70aba978d332988a6ad0cee5870b344ff6572fa5f622d4bfdeb3070a33f5d9991eb550d3ed54da176ad2807
-
Filesize
160KB
MD543e5f86f81586d8d6c1b4fac4b6b4cd0
SHA1c6940a2c2817359ab1a0b7ea560be3c0f97a72dc
SHA256a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf
SHA512ace1b9deafa47bab4b7209ba4d9b214ecd5a054d0df1760fce5691cfa922e9a7513f2b1cca0de0b807261511a6bf0e36927ba5bbb773549b1812d0d38b63f6ee
-
Filesize
160KB
MD543e5f86f81586d8d6c1b4fac4b6b4cd0
SHA1c6940a2c2817359ab1a0b7ea560be3c0f97a72dc
SHA256a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf
SHA512ace1b9deafa47bab4b7209ba4d9b214ecd5a054d0df1760fce5691cfa922e9a7513f2b1cca0de0b807261511a6bf0e36927ba5bbb773549b1812d0d38b63f6ee
-
Filesize
160KB
MD52b6b7841ebb16ea6a6e3cbbf95c6c614
SHA14a35f1f69bf8bf5401c6e27112e09051c70273d0
SHA256158daf22104a5c38bedac3a568e397f4dcb39bc0d2d1dab44950c5ec82cc3919
SHA5126176ac08cb474a33d0cedb1c2d86b08225dbf029c1b006a78fe0547dc871140ae1ae10cefe2b187d766d492991f70fa785d94c4cd446ae145188f09f55e00d62
-
Filesize
160KB
MD52b6b7841ebb16ea6a6e3cbbf95c6c614
SHA14a35f1f69bf8bf5401c6e27112e09051c70273d0
SHA256158daf22104a5c38bedac3a568e397f4dcb39bc0d2d1dab44950c5ec82cc3919
SHA5126176ac08cb474a33d0cedb1c2d86b08225dbf029c1b006a78fe0547dc871140ae1ae10cefe2b187d766d492991f70fa785d94c4cd446ae145188f09f55e00d62
-
Filesize
160KB
MD52b6b7841ebb16ea6a6e3cbbf95c6c614
SHA14a35f1f69bf8bf5401c6e27112e09051c70273d0
SHA256158daf22104a5c38bedac3a568e397f4dcb39bc0d2d1dab44950c5ec82cc3919
SHA5126176ac08cb474a33d0cedb1c2d86b08225dbf029c1b006a78fe0547dc871140ae1ae10cefe2b187d766d492991f70fa785d94c4cd446ae145188f09f55e00d62
-
Filesize
160KB
MD52b6b7841ebb16ea6a6e3cbbf95c6c614
SHA14a35f1f69bf8bf5401c6e27112e09051c70273d0
SHA256158daf22104a5c38bedac3a568e397f4dcb39bc0d2d1dab44950c5ec82cc3919
SHA5126176ac08cb474a33d0cedb1c2d86b08225dbf029c1b006a78fe0547dc871140ae1ae10cefe2b187d766d492991f70fa785d94c4cd446ae145188f09f55e00d62
-
Filesize
160KB
MD55fa9841e8ff302294d89e670c6a8442a
SHA17e676448353841f3d330cff286fe4ed8b22d7621
SHA256aae820df8e3111cb6adbee242ffea8eef695b516c2fcac3c8b598e3ca902c705
SHA51212aaeee333a95c0d58e6d50ac024e75188a5e8c61295764db3379657ca80149335d34eb2022112c2a8f417f42adfb1611975b3f75b79f3da2b73ef90a5453933
-
Filesize
160KB
MD543e5f86f81586d8d6c1b4fac4b6b4cd0
SHA1c6940a2c2817359ab1a0b7ea560be3c0f97a72dc
SHA256a06cde0c4240c9cb0da4b2cd36b2e9c116cd19aab6724a088484f4dc95a87aaf
SHA512ace1b9deafa47bab4b7209ba4d9b214ecd5a054d0df1760fce5691cfa922e9a7513f2b1cca0de0b807261511a6bf0e36927ba5bbb773549b1812d0d38b63f6ee
-
Filesize
160KB
MD5f090b14773e3ef6b85cd47ba03f82975
SHA1c3a3f5bd549bc204c10f5ba702a2adec228b11e7
SHA25651b1d444df61a4dee5fc889b60c3c714a8e6587272e1a334013d76f7c9ff9f90
SHA512047ba42134ffc99010c838592262c584c75631798854682b85d97eb90e2b2086238e33ad2aa0115f5bb4e8423e7ba23106e80d2e84bc3c7e2308b3c52274c795
-
Filesize
160KB
MD5d713cc049cd94e8f92c37947b2383eee
SHA1398d6c86350f4734e9f8a48f5ffae779ac244645
SHA256cc9aced23c38d776bb700558c2e87c8b43a27a31f5d31e8d47e3645d081843a4
SHA51238c25621e6e4e3834c38c9754502c48d2f55351a4b056de036d53059b8c0e7ee33fe843332ec0df57cc322994e3b4fb86bb1b3ecd81dc87086a2131855be17ac
-
Filesize
160KB
MD5d713cc049cd94e8f92c37947b2383eee
SHA1398d6c86350f4734e9f8a48f5ffae779ac244645
SHA256cc9aced23c38d776bb700558c2e87c8b43a27a31f5d31e8d47e3645d081843a4
SHA51238c25621e6e4e3834c38c9754502c48d2f55351a4b056de036d53059b8c0e7ee33fe843332ec0df57cc322994e3b4fb86bb1b3ecd81dc87086a2131855be17ac
-
Filesize
160KB
MD5d713cc049cd94e8f92c37947b2383eee
SHA1398d6c86350f4734e9f8a48f5ffae779ac244645
SHA256cc9aced23c38d776bb700558c2e87c8b43a27a31f5d31e8d47e3645d081843a4
SHA51238c25621e6e4e3834c38c9754502c48d2f55351a4b056de036d53059b8c0e7ee33fe843332ec0df57cc322994e3b4fb86bb1b3ecd81dc87086a2131855be17ac
-
Filesize
160KB
MD575a104937e428a368b2b7d2c828bc03c
SHA1c2245b12d9068d7c091abe29a981e8a6bf6fe4fd
SHA256b92eb8e8ba2f8285d21fc433246fb448598239c91844716f182e7f25c4c77030
SHA512d2656547d0a59189d8daa03309de94bf98cd2eccc1b1f3fa540fc03ffdf494413b252cd3cdc19aabbeec0d588afb7d4d6196a3da26c629ef8a36a859930dcb80
-
Filesize
160KB
MD55fa9841e8ff302294d89e670c6a8442a
SHA17e676448353841f3d330cff286fe4ed8b22d7621
SHA256aae820df8e3111cb6adbee242ffea8eef695b516c2fcac3c8b598e3ca902c705
SHA51212aaeee333a95c0d58e6d50ac024e75188a5e8c61295764db3379657ca80149335d34eb2022112c2a8f417f42adfb1611975b3f75b79f3da2b73ef90a5453933
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a