Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 06:58

General

  • Target

    da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa.exe

  • Size

    531KB

  • MD5

    c4a0bfbd42a2e42e261ca21d6cf4f638

  • SHA1

    329e7e3425e5da6632377ebdc243cf9645bdc5bd

  • SHA256

    da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa

  • SHA512

    fe71f3b2afd76d509b684c5030b078f6a128a2c9dfc16c3940f2442052fa803c53938f64cb32969db0eacf4e39bc7e0630ec28384fc19f1f5f0ec6322e76a5d3

  • SSDEEP

    3072:OwHl/Gnrl2wGELlyzXq4D2N3v5FQLffCv7oVJNpUpnrT8vp:tB4rlryzIFQLfqvsPfSUv

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 14 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Disables taskbar notifications via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 15 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa.exe
    "C:\Users\Admin\AppData\Local\Temp\da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe
      2⤵
        PID:1168
      • C:\Users\Admin\AppData\Local\Temp\da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa.exe
        2⤵
          PID:1124
        • C:\Users\Admin\AppData\Local\Temp\da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa.exe
          2⤵
            PID:1084
          • C:\Users\Admin\AppData\Local\Temp\da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa.exe
            2⤵
              PID:896
            • C:\Users\Admin\AppData\Local\Temp\da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa.exe
              2⤵
                PID:1624
              • C:\Users\Admin\AppData\Local\Temp\da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa.exe
                2⤵
                  PID:1900
                • C:\Users\Admin\AppData\Local\Temp\da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa.exe
                  2⤵
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:948
                  • C:\Users\Admin\E696D64614\winlogon.exe
                    "C:\Users\Admin\E696D64614\winlogon.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:2040
                    • C:\Windows\SysWOW64\svchost.exe
                      C:\Windows\system32\svchost.exe
                      4⤵
                        PID:276
                      • C:\Users\Admin\E696D64614\winlogon.exe
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:1760
                        • C:\Users\Admin\E696D64614\winlogon.exe
                          "C:\Users\Admin\E696D64614\winlogon.exe"
                          5⤵
                          • Modifies firewall policy service
                          • Modifies security service
                          • Modifies visibility of file extensions in Explorer
                          • Modifies visiblity of hidden/system files in Explorer
                          • UAC bypass
                          • Windows security bypass
                          • Disables RegEdit via registry modification
                          • Drops file in Drivers directory
                          • Executes dropped EXE
                          • Sets file execution options in registry
                          • Drops startup file
                          • Windows security modification
                          • Adds Run key to start application
                          • Checks whether UAC is enabled
                          • Modifies Control Panel
                          • Modifies Internet Explorer settings
                          • Modifies Internet Explorer start page
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of SetWindowsHookEx
                          • System policy modification
                          PID:1696
                • C:\Windows\system32\wbem\unsecapp.exe
                  C:\Windows\system32\wbem\unsecapp.exe -Embedding
                  1⤵
                    PID:1420
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1508
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:275457 /prefetch:2
                      2⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:844
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:603145 /prefetch:2
                      2⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:1496
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:472078 /prefetch:2
                      2⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:520
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:603158 /prefetch:2
                      2⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:632
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:930854 /prefetch:2
                      2⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:2304

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Modify Existing Service

                  2
                  T1031

                  Hidden Files and Directories

                  2
                  T1158

                  Registry Run Keys / Startup Folder

                  2
                  T1060

                  Privilege Escalation

                  Bypass User Account Control

                  1
                  T1088

                  Defense Evasion

                  Modify Registry

                  12
                  T1112

                  Hidden Files and Directories

                  2
                  T1158

                  Bypass User Account Control

                  1
                  T1088

                  Disabling Security Tools

                  3
                  T1089

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Discovery

                  System Information Discovery

                  2
                  T1082

                  Collection

                  Data from Local System

                  1
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
                    Filesize

                    1KB

                    MD5

                    79341a72b77d23e92e284c609042d185

                    SHA1

                    abf2442e615b28ac099c688be99b89e6355573c4

                    SHA256

                    0cd273ef624d3e69706595982ee7b74e4e04a6215365b26e77d140442b099ade

                    SHA512

                    959810157c0c9af762427aa7810790a82be5a5c28db50c2af64c730aa9bb3e2e8185e88fb5a5812a32f88aeabfaa411c0eba237f7dfd862932223c307c219bf3

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
                    Filesize

                    472B

                    MD5

                    76544babbcf6515110bd81aaee8e7e63

                    SHA1

                    043497692868c67ac84cdfe70d0a484517abd1c2

                    SHA256

                    a19d5958d683662375a2469d1d7e551188469b967eb6f2bae2d5e43dac51a4f0

                    SHA512

                    a23198710b8898b9fe8f9d62841567995b30be60938ebba2a3aad94c4dc7687d5e5d188f3388f939d27833e44a9aec275cdadc815e01d6ce32ae3b9b07d4a561

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
                    Filesize

                    1KB

                    MD5

                    b8914a9f1a906f927cccce6ced9b2d0a

                    SHA1

                    416b18e429e5666f291b0b1c2a027540ccac9d98

                    SHA256

                    368fea95d9e90df28a6bfddc6b5a4541a082e521f28dca1fda3c0451926fa10d

                    SHA512

                    c182123030362c722735903641739a02f42a625f0a0080495b99a70150bbfb5e7a81cb6c88a0bf21b5547308621e1b487947298c8c5ab302b94a7e4bb72190d7

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                    Filesize

                    61KB

                    MD5

                    3dcf580a93972319e82cafbc047d34d5

                    SHA1

                    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

                    SHA256

                    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

                    SHA512

                    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
                    Filesize

                    1KB

                    MD5

                    d416222752f135ed236e638a9446d727

                    SHA1

                    705876fb8232b28d61bc23d3a48a42ad293106ed

                    SHA256

                    d86e5758fb2d4f5cb0ea9be687e11c7056f094dc24a445971c75e23b97e8d24b

                    SHA512

                    25f495232f2f28d41335eaed9a400af4e2942b0d25997b171b9ea9d06a42ebe316a7456d5b08814b47ab924f2f4db0ccad6726a8c62382fa1d3c004e56bcb555

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
                    Filesize

                    724B

                    MD5

                    f569e1d183b84e8078dc456192127536

                    SHA1

                    30c537463eed902925300dd07a87d820a713753f

                    SHA256

                    287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

                    SHA512

                    49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
                    Filesize

                    1KB

                    MD5

                    a266bb7dcc38a562631361bbf61dd11b

                    SHA1

                    3b1efd3a66ea28b16697394703a72ca340a05bd5

                    SHA256

                    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                    SHA512

                    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
                    Filesize

                    410B

                    MD5

                    c86b17ac903ee28ef695357a6ab7379f

                    SHA1

                    77b95224a05306ee27d88c27607d307a43611faf

                    SHA256

                    87669585f5bf419b33553bdb56c3d72da686e5f4029f015a7c1c5268f155cbd0

                    SHA512

                    01fef38f8bd62714751b84b52332ed58a76b88f27278c91ee034c2e51d66c06418dd117bd3d630810a3b2c3aef8ca97494bd096b04d7ead27885d204df8871f7

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
                    Filesize

                    402B

                    MD5

                    8c0768279edeee3f1cec26058a0d89c1

                    SHA1

                    32e1d7281d994d0c1f274c77424a40a9e385ab6d

                    SHA256

                    d23541a345a2a36ed1c58830329290b7e4304a8506576b17217fb7dcc59bc6fd

                    SHA512

                    bdf9f5ce4597702c0def93a3070fc8d57fc5c940db8e865f57872adeccb2c68684480656246244cc39ae292bcee8b69a55122b0c5402459ff20f56033b9dc960

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
                    Filesize

                    466B

                    MD5

                    bfe03677bb6ac1203aa50d06190532c5

                    SHA1

                    c547fbfe90f880a077ced05d62c8a62f5b35f5d7

                    SHA256

                    afbf37d22ce624f5c669d2992de2a0f2729b8cb1d8281f72ad038bfd539abe4a

                    SHA512

                    413b2e34e71f3470534e9d618cd4e739b49d90e5196eef999492b8a79a933f3262a14dec45cb5775a0df44c056484dd984ebda2012e1b8b2c61248d369a08a3f

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                    Filesize

                    342B

                    MD5

                    30eb69d2d2b70f1977b03c1ae7e50f9e

                    SHA1

                    c3930ee134c4705e9df3a2834436de9a743f558a

                    SHA256

                    e569bf6710c850c6ec4b14bcdbe462b193b6e95e8bdaf8c43b3d815888158f90

                    SHA512

                    5d802e7cc823972082179838a02f9915d6bca337159e4245a6096eb417ed9c381ff94c9698d7cdf277d4267d1d0de4e6f7cca331350a86987983bbbf8765666e

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                    Filesize

                    342B

                    MD5

                    b4d9493d204c34ed3ace310e6bc653eb

                    SHA1

                    5c9c1a26ebed639a417ea3cf2eb718c4a9130ff7

                    SHA256

                    06ad50dd25d3238534d959005a4f6c5a0f55a12e729269677f658ae7cbe80858

                    SHA512

                    fd9020db07278fd92a5452240b375d90d30686bc1515695ab99cd660feed59dd2b3a9b5d1a07ee16e858e40495b515ae419eb1a7ce8cad1e0b6b799f682e6382

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                    Filesize

                    342B

                    MD5

                    7df1c9f406308a3d65668fe1f4e8c70b

                    SHA1

                    5abc81f21322be1b708c6e718da5e0b067db71ed

                    SHA256

                    772b8486d3668d9dbae60a072a82d725daa7acf604df1d5a1a60b88efd963043

                    SHA512

                    1b394dd913f204b05df9f2f588ca68e96480a7dea7d579b57983221af7a26aca801a33bba30303f2b44ec678fe2162b6f41d8224efef5007079f3dbf6f196e33

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                    Filesize

                    342B

                    MD5

                    bb0bc0fe3c53873c51b70bbeba65acdb

                    SHA1

                    c3da0c1a925b32badb96c0790ecd809030536b87

                    SHA256

                    c4e8fba65542fe6bd317b318e611eb6473c0ecd819447a6ab03c2861562ce5e4

                    SHA512

                    4df8753dabaa4d2af7891337767efcdf8c81b8966657df018cff141b4cdecff81ccdb0a2d79b75258649c3897d7076277554f0f7a9eb30afa58c1825087edd88

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                    Filesize

                    342B

                    MD5

                    981cc889753ca13979372b8de6d636c8

                    SHA1

                    559e9a5e22f2b6b4d3f43775a3be295bd58334b3

                    SHA256

                    95bb9192d10103208a937c834d3941a044aa8e7f8381a3f803e731860a25fcaf

                    SHA512

                    e31bf159072b792eddb3adb12edc73f8498542901d87e227cbe2d6ea7974c2ff599ec36e5e22195183b705238b387bcc4b22385852f43813c2d5651ff40a32da

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                    Filesize

                    342B

                    MD5

                    f6e86a8c0632d07ec49c6e5b4b922493

                    SHA1

                    ba3bbab5a78201932d0ffc16278d67d0e2ee7663

                    SHA256

                    b63092bee411a191743f26295bc9dd4cd516c45274e041410ee8d5607bf89e6c

                    SHA512

                    5620b803c08e3ea16bc33b8134e8616eec3cc9966111365e1eeded2b2fe093bf460eda98c98d89a8d5ec9391c5f73a86bfbf8b0161779943040a515471e8ee4b

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
                    Filesize

                    470B

                    MD5

                    9964eaaf0a452d47cd711be29a547d74

                    SHA1

                    0a803d5c4256f9e9a695dad2961829357e0e109f

                    SHA256

                    8e8c556b2b3e2e278dbac88c409a6ee17e6297526fdf497a416b08ec27d16352

                    SHA512

                    8e9a2bcfffdafbcf504293adcd588a6eefe4049d9b4fa58388e38aecb7324bea3887023b6b22919fbfac8adcb605e9f73036ed77e55e26571ee1dd77f7f5c0f7

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
                    Filesize

                    392B

                    MD5

                    61851069db32deeb0100f2c1909cfb9a

                    SHA1

                    57bb13df260191b23b121de75674ab553daa2184

                    SHA256

                    f07fef216c39e0b3b4177e560b0a64046bc4299cf481972ec2fa94f2a7a629ef

                    SHA512

                    b68fa3c3d92e5acd88908090cb8acc9e9242293892dda870c7950cc819ca8dab53608786671fb1fa20ef86adf7b53cf1ce05e8f4c2c412e5ddef42543699fcfb

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
                    Filesize

                    242B

                    MD5

                    7d4cd00fe0a57cfe82d59bed53db6b24

                    SHA1

                    c6e69dcc6a9fd2f2cfcb126fdd2c3dc89902a43d

                    SHA256

                    5d2228bf80f318d13862415c1a649ca5c517674068047260b9d1e18990310536

                    SHA512

                    5c75bd62c841c23e62595f671e7fbbb6574d1a850273cbb18ddac25c4828a1e250ec9e54417a96ce48fa81dbee99403aaa09f877cd694075085223c3aa82013d

                  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\ZE43L5PM\www6.buscaid[1].xml
                    Filesize

                    13B

                    MD5

                    c1ddea3ef6bbef3e7060a1a9ad89e4c5

                    SHA1

                    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

                    SHA256

                    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

                    SHA512

                    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AMQ9Y5C0.txt
                    Filesize

                    601B

                    MD5

                    cc3ce50382433fdf07ccde641a497e6a

                    SHA1

                    410fdd7856c41685930e20e75c9458050d509747

                    SHA256

                    6f10836f14f5b02e9480d5273263f0c8e61ff3e5dea600784efdb4db955dd0af

                    SHA512

                    3f4bcc97d4d838b443b5145703033f4b53850da90d2a42fc3d8657406527b318aafd5bf20df2919acbfa3d7188884fcc82d95740f949e0aaf705da2cac164421

                  • C:\Users\Admin\E696D64614\winlogon.exe
                    Filesize

                    531KB

                    MD5

                    c4a0bfbd42a2e42e261ca21d6cf4f638

                    SHA1

                    329e7e3425e5da6632377ebdc243cf9645bdc5bd

                    SHA256

                    da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa

                    SHA512

                    fe71f3b2afd76d509b684c5030b078f6a128a2c9dfc16c3940f2442052fa803c53938f64cb32969db0eacf4e39bc7e0630ec28384fc19f1f5f0ec6322e76a5d3

                  • C:\Users\Admin\E696D64614\winlogon.exe
                    Filesize

                    531KB

                    MD5

                    c4a0bfbd42a2e42e261ca21d6cf4f638

                    SHA1

                    329e7e3425e5da6632377ebdc243cf9645bdc5bd

                    SHA256

                    da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa

                    SHA512

                    fe71f3b2afd76d509b684c5030b078f6a128a2c9dfc16c3940f2442052fa803c53938f64cb32969db0eacf4e39bc7e0630ec28384fc19f1f5f0ec6322e76a5d3

                  • C:\Users\Admin\E696D64614\winlogon.exe
                    Filesize

                    531KB

                    MD5

                    c4a0bfbd42a2e42e261ca21d6cf4f638

                    SHA1

                    329e7e3425e5da6632377ebdc243cf9645bdc5bd

                    SHA256

                    da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa

                    SHA512

                    fe71f3b2afd76d509b684c5030b078f6a128a2c9dfc16c3940f2442052fa803c53938f64cb32969db0eacf4e39bc7e0630ec28384fc19f1f5f0ec6322e76a5d3

                  • C:\Users\Admin\E696D64614\winlogon.exe
                    Filesize

                    531KB

                    MD5

                    c4a0bfbd42a2e42e261ca21d6cf4f638

                    SHA1

                    329e7e3425e5da6632377ebdc243cf9645bdc5bd

                    SHA256

                    da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa

                    SHA512

                    fe71f3b2afd76d509b684c5030b078f6a128a2c9dfc16c3940f2442052fa803c53938f64cb32969db0eacf4e39bc7e0630ec28384fc19f1f5f0ec6322e76a5d3

                  • \Users\Admin\E696D64614\winlogon.exe
                    Filesize

                    531KB

                    MD5

                    c4a0bfbd42a2e42e261ca21d6cf4f638

                    SHA1

                    329e7e3425e5da6632377ebdc243cf9645bdc5bd

                    SHA256

                    da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa

                    SHA512

                    fe71f3b2afd76d509b684c5030b078f6a128a2c9dfc16c3940f2442052fa803c53938f64cb32969db0eacf4e39bc7e0630ec28384fc19f1f5f0ec6322e76a5d3

                  • \Users\Admin\E696D64614\winlogon.exe
                    Filesize

                    531KB

                    MD5

                    c4a0bfbd42a2e42e261ca21d6cf4f638

                    SHA1

                    329e7e3425e5da6632377ebdc243cf9645bdc5bd

                    SHA256

                    da5171fca762e1e33a717a3e3cbf5a04a3bff7566f77f6c2014edb4f425c3efa

                    SHA512

                    fe71f3b2afd76d509b684c5030b078f6a128a2c9dfc16c3940f2442052fa803c53938f64cb32969db0eacf4e39bc7e0630ec28384fc19f1f5f0ec6322e76a5d3

                  • memory/276-71-0x0000000000000000-mapping.dmp
                  • memory/948-65-0x0000000000400000-0x000000000041C000-memory.dmp
                    Filesize

                    112KB

                  • memory/948-64-0x0000000076401000-0x0000000076403000-memory.dmp
                    Filesize

                    8KB

                  • memory/948-57-0x000000000041AA70-mapping.dmp
                  • memory/948-56-0x0000000000400000-0x000000000041C000-memory.dmp
                    Filesize

                    112KB

                  • memory/948-60-0x0000000000400000-0x000000000041C000-memory.dmp
                    Filesize

                    112KB

                  • memory/948-72-0x0000000000400000-0x000000000041C000-memory.dmp
                    Filesize

                    112KB

                  • memory/948-61-0x0000000000400000-0x000000000041C000-memory.dmp
                    Filesize

                    112KB

                  • memory/1124-55-0x0000000000240000-0x000000000027C000-memory.dmp
                    Filesize

                    240KB

                  • memory/1168-54-0x0000000000000000-mapping.dmp
                  • memory/1696-83-0x0000000000441670-mapping.dmp
                  • memory/1696-88-0x0000000000400000-0x0000000000443000-memory.dmp
                    Filesize

                    268KB

                  • memory/1696-87-0x0000000000400000-0x0000000000443000-memory.dmp
                    Filesize

                    268KB

                  • memory/1696-82-0x0000000000400000-0x0000000000443000-memory.dmp
                    Filesize

                    268KB

                  • memory/1696-94-0x0000000000400000-0x0000000000443000-memory.dmp
                    Filesize

                    268KB

                  • memory/1760-92-0x0000000000E90000-0x0000000000ECC000-memory.dmp
                    Filesize

                    240KB

                  • memory/1760-74-0x000000000041AA70-mapping.dmp
                  • memory/1760-93-0x0000000000400000-0x000000000041C000-memory.dmp
                    Filesize

                    112KB

                  • memory/1832-58-0x0000000000240000-0x000000000027C000-memory.dmp
                    Filesize

                    240KB

                  • memory/2040-77-0x0000000000E90000-0x0000000000ECC000-memory.dmp
                    Filesize

                    240KB

                  • memory/2040-68-0x0000000000000000-mapping.dmp