Analysis

  • max time kernel
    153s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 07:48

General

  • Target

    60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe

  • Size

    1.4MB

  • MD5

    cc12ec67eab006a43338a10951daa7bb

  • SHA1

    72ef2f5b4572d1efa8d7c0f29be89e4873e8c541

  • SHA256

    60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece

  • SHA512

    24136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac

  • SSDEEP

    3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 14 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Disables taskbar notifications via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 15 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 29 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs
  • System policy modification 1 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe
    "C:\Users\Admin\AppData\Local\Temp\60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\\svchost.exe
      2⤵
        PID:1852
      • C:\Users\Admin\AppData\Local\Temp\60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Users\Admin\E696D64614\winlogon.exe
          "C:\Users\Admin\E696D64614\winlogon.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2040
          • C:\Users\Admin\E696D64614\winlogon.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1976
            • C:\Users\Admin\E696D64614\winlogon.exe
              "C:\Users\Admin\E696D64614\winlogon.exe"
              5⤵
              • Modifies firewall policy service
              • Modifies security service
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Windows security bypass
              • Disables RegEdit via registry modification
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Sets file execution options in registry
              • Drops startup file
              • Windows security modification
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Modifies Control Panel
              • Modifies Internet Explorer settings
              • Modifies Internet Explorer start page
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:528
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\\svchost.exe
            4⤵
              PID:960
      • C:\Windows\system32\wbem\unsecapp.exe
        C:\Windows\system32\wbem\unsecapp.exe -Embedding
        1⤵
          PID:580
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:812
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:812 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1764
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:812 CREDAT:734219 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1748
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:812 CREDAT:668694 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1392
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:812 CREDAT:1061904 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1220
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:812 CREDAT:1324057 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2360

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Modify Existing Service

        2
        T1031

        Hidden Files and Directories

        2
        T1158

        Registry Run Keys / Startup Folder

        2
        T1060

        Privilege Escalation

        Bypass User Account Control

        1
        T1088

        Defense Evasion

        Modify Registry

        12
        T1112

        Hidden Files and Directories

        2
        T1158

        Bypass User Account Control

        1
        T1088

        Disabling Security Tools

        3
        T1089

        Credential Access

        Credentials in Files

        1
        T1081

        Discovery

        System Information Discovery

        2
        T1082

        Collection

        Data from Local System

        1
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
          Filesize

          1KB

          MD5

          79341a72b77d23e92e284c609042d185

          SHA1

          abf2442e615b28ac099c688be99b89e6355573c4

          SHA256

          0cd273ef624d3e69706595982ee7b74e4e04a6215365b26e77d140442b099ade

          SHA512

          959810157c0c9af762427aa7810790a82be5a5c28db50c2af64c730aa9bb3e2e8185e88fb5a5812a32f88aeabfaa411c0eba237f7dfd862932223c307c219bf3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
          Filesize

          472B

          MD5

          76544babbcf6515110bd81aaee8e7e63

          SHA1

          043497692868c67ac84cdfe70d0a484517abd1c2

          SHA256

          a19d5958d683662375a2469d1d7e551188469b967eb6f2bae2d5e43dac51a4f0

          SHA512

          a23198710b8898b9fe8f9d62841567995b30be60938ebba2a3aad94c4dc7687d5e5d188f3388f939d27833e44a9aec275cdadc815e01d6ce32ae3b9b07d4a561

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
          Filesize

          1KB

          MD5

          b8914a9f1a906f927cccce6ced9b2d0a

          SHA1

          416b18e429e5666f291b0b1c2a027540ccac9d98

          SHA256

          368fea95d9e90df28a6bfddc6b5a4541a082e521f28dca1fda3c0451926fa10d

          SHA512

          c182123030362c722735903641739a02f42a625f0a0080495b99a70150bbfb5e7a81cb6c88a0bf21b5547308621e1b487947298c8c5ab302b94a7e4bb72190d7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
          Filesize

          61KB

          MD5

          3dcf580a93972319e82cafbc047d34d5

          SHA1

          8528d2a1363e5de77dc3b1142850e51ead0f4b6b

          SHA256

          40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

          SHA512

          98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
          Filesize

          1KB

          MD5

          d416222752f135ed236e638a9446d727

          SHA1

          705876fb8232b28d61bc23d3a48a42ad293106ed

          SHA256

          d86e5758fb2d4f5cb0ea9be687e11c7056f094dc24a445971c75e23b97e8d24b

          SHA512

          25f495232f2f28d41335eaed9a400af4e2942b0d25997b171b9ea9d06a42ebe316a7456d5b08814b47ab924f2f4db0ccad6726a8c62382fa1d3c004e56bcb555

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
          Filesize

          724B

          MD5

          f569e1d183b84e8078dc456192127536

          SHA1

          30c537463eed902925300dd07a87d820a713753f

          SHA256

          287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

          SHA512

          49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
          Filesize

          410B

          MD5

          bb649aaffa55cfcfbbdc8aaa0df71a7c

          SHA1

          80c27ae299b7ebc0b24ed93ba20d6f0f0a8627d2

          SHA256

          1182806843382b5cc87aa231128fb2c5c7c21a3bbff91b0e0d5b4ad06287fda1

          SHA512

          255322c29347c6908f0e95c08ee5b98eccfba05b762d18a51b1b2b83987fa94bbf8062d6d9872f5c326e7b959812b24f13d2d38090b5b160747c3da9bb025b3f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
          Filesize

          402B

          MD5

          a1ed665516bf20bcb8f6a6f14287efd7

          SHA1

          a75ce54fec86dfbbb4a9e06918ee548536d3344b

          SHA256

          7132e7605ee8ba3ba831435dd3c24296bdc23144dd6a1a1ead7395cbe6b99069

          SHA512

          457b4c947b521a4656156ee63cdc3df709e1341e2074f615e5ac5ba574965ae0aacb74ed2931b344394b5b0ceba025af9b8f537dd34e58d3138e786e0e611d03

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
          Filesize

          466B

          MD5

          27fa89a476e8243dcb56a973724561ee

          SHA1

          85136ed254ab25a1c4254de0b60a1fed7ddccec1

          SHA256

          85a9c3b346ccd2fa1a69710ef3a3e41389d204d62d394f2834618b46acbb4627

          SHA512

          df85e02f5ead43ba8439cd997e57d8e40b399fa087c2f5ca131d341a4de400c9fe0d40a0ba7d24d6fd47a138cc6e04976871901d7506901096657cc7ed1716ad

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          46b1b30fdbf8686dab6ae7e49b9ff1c0

          SHA1

          ff4c641c287f444190d0a78c407e7731c2e99769

          SHA256

          02df2a3276b2946648d4b4e0ae7fa627398e27c32d6d2ec16d3fc7879f31276d

          SHA512

          2a8c2f5017b159bb8a42d4691ed1be6c1a580a69bc208002bec30e6b3a75c0ebf8c214e33e73cfb44e8fa8c8d6383b8355c785e867b6669f818073a594334c87

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          a05342a1e4c0e7aafe27e73cdedd54bb

          SHA1

          4338d977a68abd34fbac4c027e067e7e80f14a62

          SHA256

          9dd1f70dd60793de846ef12a5445441f7458e0519556ad89b881aaeaf3896afb

          SHA512

          1d7fe30d3aeb2ec17fbdc706df2945a2426ddd33bb9bc22cbb694599d4e7511815bff56162e73940ac2bddac9bc882828f36800abcf1dfcfb395ab80d912f1a6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          3b2c4584edc1db75a24a8aa179045b92

          SHA1

          c5ce878b45ed6b5927c412704245cc60ef304ad6

          SHA256

          a903a6bfde7ff936d6e6d8bc2585c96b1c458be34a2a43161ba9ca85cd4c6745

          SHA512

          033c174972f6c4e2b9b92a58d036326a806f98a76d079cf47ee36b46ba2ab0d00b0b63eb88388bbc43333970971ad517f8730518cb5530c1d06c51b02c02ed6d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          ab8537027342bfe60ae2c7852dbbf9d8

          SHA1

          f36a3029e8cc51c36b4ae4456725b62ca9452689

          SHA256

          fb009dd8f9ae53812da1903fdb94c880ab2f6ad2592fe463dd777316feec19f4

          SHA512

          038e73f63a326140d3dc80d49203b6ef8706c110ff4d00fdd224450c6d735dc95fa70c8e5ea0061430f6ebe48969761002eef35c4c7774f86b003e28a06733b0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          bcca18c14c1b5e8e5d21350ce4363db2

          SHA1

          00bdc6fc14bc851a864351c95e64be6e3cf966a4

          SHA256

          9455c727cfbcb319a12cb98c965c3e328f22a4c88fb7fbd8eea57366e475f130

          SHA512

          61bb304ae8a99d489167ca3f4e1bc6b0a76ef6635ca30c946e36e5254504d115a26ad37976f055f85790c639a48ccca3072d5475cb4924f9e37489a5b07518db

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          bcca18c14c1b5e8e5d21350ce4363db2

          SHA1

          00bdc6fc14bc851a864351c95e64be6e3cf966a4

          SHA256

          9455c727cfbcb319a12cb98c965c3e328f22a4c88fb7fbd8eea57366e475f130

          SHA512

          61bb304ae8a99d489167ca3f4e1bc6b0a76ef6635ca30c946e36e5254504d115a26ad37976f055f85790c639a48ccca3072d5475cb4924f9e37489a5b07518db

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          49922a2579e01037820785cd302ceaaa

          SHA1

          3e3b1171cce3418b941a1670c5cf53687184e76c

          SHA256

          e1fd64937c3c120ed376845f780c89357f7341240be8fd49aca5684047496501

          SHA512

          38a6b1294100a86accba62feaf48298f2848e9b32b6b3c9108a2b89c707989972cddb87cb89d5cdbb09aed6ee9d488beb263f7be022d109afdeb5f7dce0ec9c0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          36d95ff53d36912674eb742c3d52f2b0

          SHA1

          76eae24b152e33aabf5f077555b9595da4c42458

          SHA256

          c0dab6eb1816001964691bd78d4dff56d9cfa41fd2d2fd653e55ef4fcf0c8f9b

          SHA512

          a0180bdbebb27188c66f31392ffef18733b0b6a6a30d3a0f11798832d8695fde06371a9892d207762b65ba576c1c450ecffe0a914fc58083df3a3c19a4dd339c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
          Filesize

          470B

          MD5

          387c9162b83bd8bc4481808a46b7da9d

          SHA1

          f9024926c16f94c71bd35942d124c5e8012f62c1

          SHA256

          9ff9415babd6a776217ac80d319545b17a3fd947434914592afd7d7197948b70

          SHA512

          f25a7170370f77b6d0626aa623034d473ddd18c26bfed123f8fab2b692a4a8340c66853bc594343bb7fc8ff9a7798a62079cf9110064e5f9e1f122155c4a8c2a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
          Filesize

          392B

          MD5

          7226036bd78fb5483947c3e494a1e55e

          SHA1

          3e6baa12567496c52d5472cdf99184d2db981a15

          SHA256

          ae024c139a242b938338ab68f0218337dac37cfe1e97a1e9520019124316d60d

          SHA512

          0eb2f45238cf715594922cd1f303f34093e5329c78fee24ccedbdfd14cb868a4f4f68be28c1fc814e0597ecdf195659e2e166bd07a5be05d013505394fe06e3a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
          Filesize

          242B

          MD5

          d6d2bf51979c9a35ebc929aedf5583d1

          SHA1

          8d968e0210fab884ddd3f4bde585d1142727d908

          SHA256

          873da10ac90cd33063a768b19edd1306ded9b88b6b60f8b5f4c477a21614ab81

          SHA512

          30a05f4ea4c4f3e121d0aa0f8f0587d4cad806d3c1a0c754d528fa9b4c2eaf30446c789e6d3761abe0836004e7ce59805558e67fafea8be0291714c67a15ff1e

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\712M22PI\www6.buscaid[1].xml
          Filesize

          13B

          MD5

          c1ddea3ef6bbef3e7060a1a9ad89e4c5

          SHA1

          35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

          SHA256

          b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

          SHA512

          6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\M1HJWZ9U.txt
          Filesize

          601B

          MD5

          c71fefc576c79e9cb6a0df7d9ed96767

          SHA1

          30368077abf53de358916762ffcd540cbb9f988e

          SHA256

          e0b96a583952cf3847d01dcec8e8137be90e5ef660bbf8abc3c400b19cf697c0

          SHA512

          3cedc1043819eb7008d101cf6c5595d02cc2989f1fb5833234bb0e8439d03c9e52b23b324a75e86f8bb4abe889ee9f243ad16349b6fa66d697a487d0fbf2e44f

        • C:\Users\Admin\E696D64614\winlogon.exe
          Filesize

          1.4MB

          MD5

          cc12ec67eab006a43338a10951daa7bb

          SHA1

          72ef2f5b4572d1efa8d7c0f29be89e4873e8c541

          SHA256

          60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece

          SHA512

          24136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac

        • C:\Users\Admin\E696D64614\winlogon.exe
          Filesize

          1.4MB

          MD5

          cc12ec67eab006a43338a10951daa7bb

          SHA1

          72ef2f5b4572d1efa8d7c0f29be89e4873e8c541

          SHA256

          60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece

          SHA512

          24136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac

        • C:\Users\Admin\E696D64614\winlogon.exe
          Filesize

          1.4MB

          MD5

          cc12ec67eab006a43338a10951daa7bb

          SHA1

          72ef2f5b4572d1efa8d7c0f29be89e4873e8c541

          SHA256

          60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece

          SHA512

          24136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac

        • C:\Users\Admin\E696D64614\winlogon.exe
          Filesize

          1.4MB

          MD5

          cc12ec67eab006a43338a10951daa7bb

          SHA1

          72ef2f5b4572d1efa8d7c0f29be89e4873e8c541

          SHA256

          60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece

          SHA512

          24136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac

        • \Users\Admin\E696D64614\winlogon.exe
          Filesize

          1.4MB

          MD5

          cc12ec67eab006a43338a10951daa7bb

          SHA1

          72ef2f5b4572d1efa8d7c0f29be89e4873e8c541

          SHA256

          60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece

          SHA512

          24136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac

        • \Users\Admin\E696D64614\winlogon.exe
          Filesize

          1.4MB

          MD5

          cc12ec67eab006a43338a10951daa7bb

          SHA1

          72ef2f5b4572d1efa8d7c0f29be89e4873e8c541

          SHA256

          60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece

          SHA512

          24136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac

        • memory/528-98-0x0000000000400000-0x0000000000443000-memory.dmp
          Filesize

          268KB

        • memory/528-93-0x0000000000400000-0x0000000000443000-memory.dmp
          Filesize

          268KB

        • memory/528-90-0x0000000000441740-mapping.dmp
        • memory/528-89-0x0000000000400000-0x0000000000443000-memory.dmp
          Filesize

          268KB

        • memory/528-94-0x0000000000400000-0x0000000000443000-memory.dmp
          Filesize

          268KB

        • memory/528-100-0x0000000000400000-0x0000000000443000-memory.dmp
          Filesize

          268KB

        • memory/528-124-0x0000000003B50000-0x0000000004BB2000-memory.dmp
          Filesize

          16.4MB

        • memory/960-72-0x0000000000000000-mapping.dmp
        • memory/1852-54-0x0000000000000000-mapping.dmp
        • memory/1976-88-0x0000000000400000-0x000000000041C000-memory.dmp
          Filesize

          112KB

        • memory/1976-80-0x000000000041ABB0-mapping.dmp
        • memory/1976-99-0x0000000000400000-0x000000000041C000-memory.dmp
          Filesize

          112KB

        • memory/2008-76-0x0000000000400000-0x000000000041C000-memory.dmp
          Filesize

          112KB

        • memory/2008-67-0x0000000076151000-0x0000000076153000-memory.dmp
          Filesize

          8KB

        • memory/2008-63-0x0000000000400000-0x000000000041C000-memory.dmp
          Filesize

          112KB

        • memory/2008-64-0x0000000000400000-0x000000000041C000-memory.dmp
          Filesize

          112KB

        • memory/2008-62-0x0000000000400000-0x000000000041C000-memory.dmp
          Filesize

          112KB

        • memory/2008-60-0x000000000041ABB0-mapping.dmp
        • memory/2008-59-0x0000000000400000-0x000000000041C000-memory.dmp
          Filesize

          112KB

        • memory/2008-58-0x0000000000400000-0x000000000041C000-memory.dmp
          Filesize

          112KB

        • memory/2008-56-0x0000000000400000-0x000000000041C000-memory.dmp
          Filesize

          112KB

        • memory/2008-55-0x0000000000400000-0x000000000041C000-memory.dmp
          Filesize

          112KB

        • memory/2040-70-0x0000000000000000-mapping.dmp