Analysis
-
max time kernel
152s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe
Resource
win10v2004-20221111-en
General
-
Target
0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe
-
Size
109KB
-
MD5
d3cf85e9e86cf715e17bebd2815293d1
-
SHA1
b0fae70548f2e79ffc37b6d8cc2c86e548514fa9
-
SHA256
0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae
-
SHA512
7c498a925b5337293fabf319645c117fb5160a935eb94a2b7babffa26e7d41a2c5024c1a1cf552962914dc82ccbc01ae19ee9592eabdb02bf6aa194fe6604952
-
SSDEEP
1536:AaKBPMrRyJVy9H4jN9cotLJo0XpAfTaU9v3nXXUr9WuXKrNgHCv8KG2ej+4sw:9KNM1yi9YjrtSGpA7JvnXnu4GF6y
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-70554750" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-28956246" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-57951861" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-53342401" winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Disables taskbar notifications via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Executes dropped EXE 3 IoCs
pid Process 576 winlogon.exe 1920 winlogon.exe 1936 winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guardgui.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csinsm32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exantivirus-cnet.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tfak.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcadmin.exe winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSOSYNC.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcscanpdsetup.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vswinperse.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atro55en.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ibmasn.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tca.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\whoswatchingme.exe winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SETLANG.EXE winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cleaner.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanv95.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iparmor.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvlaunch.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcfwallicon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perswf.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfgwiz.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dv95_o.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieCrypto.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530stbyb.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspatch.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpc32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gpedit.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\flowprotector.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isrv95.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nui.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpost.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shellspyinstall.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nmain.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ping.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smc.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vvstat.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pev.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defalert.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\undoboot.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GenericRenosFix.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alerter.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpupd.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\minilog.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\moolive.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HelpPane.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\evpn.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpfw32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsmain.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieBITS.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconfig.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcconsol.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\amon9x.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atguard.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ostronet.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavcl.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Restart.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icsupp.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msn.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nai_vs_stat.exe winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSQRY32.EXE winlogon.exe -
resource yara_rule behavioral1/memory/936-56-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/936-58-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/936-59-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/936-63-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/936-64-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/936-72-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1920-89-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1936-90-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1936-94-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1936-95-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1936-99-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1936-100-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Anytime Upgrade.exe winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 936 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 936 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\E50B29BAACAA360FCC344254F83743208BA6735D23877EED = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\B9373D14A02BC13F1345A3F7BC53B8BCC98D3B04DD0CD9CF = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1792 set thread context of 936 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 29 PID 576 set thread context of 1920 576 winlogon.exe 31 PID 1920 set thread context of 1936 1920 winlogon.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\buscaid.com\Total = "1097" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "1" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1097" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Download winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Local Page = "http://4rfmo08thhzd4u9.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\afternic.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\www6.buscaid.com\ = "1097" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{110995B1-7536-11ED-ABF5-56A236AC5043} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://t1z1r1x9739ndms.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://daellzxg664v1q5.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://pl34zh0iql923u8.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Local Page = "http://44svu238oc9244a.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377076059" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger = "Yes" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\buscaid.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://0q0xswtmyal76qd.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06565ec4209d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\afternic.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://vbvcby3hmy2v2az.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\www6.buscaid.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\buscaid.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af00000000020000000000106600000001000020000000b31ee2c82c4493aac7595a49bc4041e77420126bc4c2a1222a19c2b90096fbde000000000e800000000200002000000023834d322f362feea0c15831e662e882286a9f866567b726260e5d204706d7b620000000f0939944c977b53fd78a36164430112716fdcbbf78e98ec689ddbde8cffbba2140000000c2422a86c673c365e76bdf5df9335bef3e3c2c85cc13f7069203329d23b22eb12a652abc4625811aac7af5680b5800235492db8b68bb05e924152b772ef44404 iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://p6081740ta27u7s.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://p6mn4ka15vdyp47.directorio-w.com" winlogon.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1936 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 1936 winlogon.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 828 iexplore.exe 828 iexplore.exe 828 iexplore.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 936 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 1920 winlogon.exe 1936 winlogon.exe 828 iexplore.exe 828 iexplore.exe 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 828 iexplore.exe 828 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 828 iexplore.exe 828 iexplore.exe 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE 1936 winlogon.exe 1936 winlogon.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1792 wrote to memory of 956 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 28 PID 1792 wrote to memory of 956 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 28 PID 1792 wrote to memory of 956 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 28 PID 1792 wrote to memory of 956 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 28 PID 1792 wrote to memory of 936 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 29 PID 1792 wrote to memory of 936 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 29 PID 1792 wrote to memory of 936 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 29 PID 1792 wrote to memory of 936 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 29 PID 1792 wrote to memory of 936 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 29 PID 1792 wrote to memory of 936 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 29 PID 1792 wrote to memory of 936 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 29 PID 1792 wrote to memory of 936 1792 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 29 PID 936 wrote to memory of 576 936 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 30 PID 936 wrote to memory of 576 936 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 30 PID 936 wrote to memory of 576 936 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 30 PID 936 wrote to memory of 576 936 0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe 30 PID 576 wrote to memory of 656 576 winlogon.exe 32 PID 576 wrote to memory of 656 576 winlogon.exe 32 PID 576 wrote to memory of 656 576 winlogon.exe 32 PID 576 wrote to memory of 656 576 winlogon.exe 32 PID 576 wrote to memory of 1920 576 winlogon.exe 31 PID 576 wrote to memory of 1920 576 winlogon.exe 31 PID 576 wrote to memory of 1920 576 winlogon.exe 31 PID 576 wrote to memory of 1920 576 winlogon.exe 31 PID 576 wrote to memory of 1920 576 winlogon.exe 31 PID 576 wrote to memory of 1920 576 winlogon.exe 31 PID 576 wrote to memory of 1920 576 winlogon.exe 31 PID 576 wrote to memory of 1920 576 winlogon.exe 31 PID 1920 wrote to memory of 1936 1920 winlogon.exe 35 PID 1920 wrote to memory of 1936 1920 winlogon.exe 35 PID 1920 wrote to memory of 1936 1920 winlogon.exe 35 PID 1920 wrote to memory of 1936 1920 winlogon.exe 35 PID 1920 wrote to memory of 1936 1920 winlogon.exe 35 PID 1920 wrote to memory of 1936 1920 winlogon.exe 35 PID 1920 wrote to memory of 1936 1920 winlogon.exe 35 PID 1920 wrote to memory of 1936 1920 winlogon.exe 35 PID 1920 wrote to memory of 1936 1920 winlogon.exe 35 PID 828 wrote to memory of 1044 828 iexplore.exe 39 PID 828 wrote to memory of 1044 828 iexplore.exe 39 PID 828 wrote to memory of 1044 828 iexplore.exe 39 PID 828 wrote to memory of 1044 828 iexplore.exe 39 PID 828 wrote to memory of 1564 828 iexplore.exe 43 PID 828 wrote to memory of 1564 828 iexplore.exe 43 PID 828 wrote to memory of 1564 828 iexplore.exe 43 PID 828 wrote to memory of 1564 828 iexplore.exe 43 PID 828 wrote to memory of 1152 828 iexplore.exe 46 PID 828 wrote to memory of 1152 828 iexplore.exe 46 PID 828 wrote to memory of 1152 828 iexplore.exe 46 PID 828 wrote to memory of 1152 828 iexplore.exe 46 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe"C:\Users\Admin\AppData\Local\Temp\0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\0380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae.exe
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1936
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:656
-
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1076
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:1127430 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:734224 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1152
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
503B
MD575cab79670fac6b2ff2870605f09184a
SHA1a8b32d790d57b6c78133657b6a0fc5ab968d0dc2
SHA25622c76e179080dc8a480693e76d36259eb1d9ac69d936b284212cc86340a8282f
SHA5127376770a896106a9506c2842cedbf09ba46b670a620742328230ef7b4984ab293902673349a80d13d607173584ff6652e9e822a5c2b44c8b34882f721fef6d6a
-
Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD528b32aa5ff3510390e757a05e43f3b95
SHA1ec807cc921ef696297c7783aa463bbdea3b9d696
SHA2563482ea10aa62bb911999d06d1f8f875103e97140d691a6b7b202349f9674b0d7
SHA51278b598cd8e59ef5f038482576a8746233d66d592ea579691a88d53a38f4baaea7b7e4c8fb2f31ca8d496788e1d1a32fd936adf7a323220e41c1f758f852a9d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD55006b8e985c5838b7fd2f2b558a65bc4
SHA1183ff15e0faedf346305fd6fe1c70c9c7a1eef4a
SHA256fcbfec9f5fd0e10d44778c1df64d8612281cd39881cdfd0aa8ca30d13655655a
SHA51256526aaf34500a94404e83461b3580513be1f07b288485c7059fc1ec86b77cda50da613b7def2fe6a8e2d04bb3d522fdffb5f7e9293eab06e86cd2d6af24a1a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7E301575BABDCBC6D3C3B91BC6B458AD
Filesize471B
MD5342da2c33af109ac503ef72014789071
SHA19f9ce9e9c713ba3ebf8d2c2339b9ec2fa506567a
SHA256beade5b410ce931a244db18222f0228e501d4c517a29a1af6e316f6c2fc340a7
SHA512a743f374f1ace6ea6dfd7450cd5ccd6d7bd4d2e9a098932aff6105786a3b5e96647bce9a5029e2265517930478b41d96e261fd3cd9e7b4575605e679065101e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
Filesize1KB
MD5624ec7959768fb34e94feee318b8dd0a
SHA1417469bb00f00b7f7e9ef4bdfa4df7c1894df5cd
SHA25653afc3fbd47ad4ebad0f488de3b2fcbadb9f293bdcd49abc3d6d59665c0fa06d
SHA512de05ad95dd664e36d2277c973d904248d8741a13b41e33bb2a1174bbf7d16e91eb961a4ea51c722b16459cd902dfe619db103ea8815e2790462dde5359223b3d
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
Filesize1KB
MD5750b6d5503f71d788477b92f46154b6a
SHA1f06d67221f6014c471c1d6255a20f8d456141467
SHA256aa86374e793614e4f866a2034dfb5c5a59f21a5b50e4d57517b2e36c552d106e
SHA512a2d5b3f060971ef911edc9b40ea8f8c0ead2a0bc7cbb41e2a298a2d7dc7c478b72b46c721331db321b1dc111368476898d5080ffa9d574738dd93eee4047f746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\08B8D8C1791AA7714DD4D760C5F42C55
Filesize548B
MD5c143cf29cfb9fc987b97d07e42a66d9c
SHA1eab864beec5079880eb82c2f28ab5c99da539da7
SHA256b3d54752b10f12dad54c213b9acdccf9183160db5151072bd58ddeeb90372655
SHA512961983d44dfa1c52cd0f97ae2d0ef718eecc2b127055b76195653901e1916aba8c190e3a66b4f7db70b520b89106ec793c368768d14fd74da51360d464fa04bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5b292e8bd0d3be0e7ca4b48ebbe4f0a51
SHA10524c524a058ff4a9da2f416b3ae6199b7ed2995
SHA25638d2e0737ea2d6f3fd9ef968489f9995b569be076d539f063e061ea7776a9512
SHA512215d71007923a9e38ee5af0217c82e0aa1bf2dd5e1805c18454a24139217cc2c6423dcccf85de01be88c19c2d400154c3cbd9b5b143fd1f015704b9013b5db6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD557d7a09ffc085564c64616a941c9e51c
SHA186896bbb412affb397c08cebbc1954cc2622892f
SHA25612b1662bc7ccad97b2178f9eea095772c1b31b1555e418e14d8f3b84e5ed0eb7
SHA512be123fa5ce7145d2b0e5c737dc98e0a971e44e5ce43e6a12edeeb4e2f3e3756078f3021b74e4b1c98a32a566b670991deb1f76d5d6b6e30f7631d22ec7eb96f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD5f941e1bda5fbacb825978bb1ac61e18e
SHA1b57ffcbd8bea250f5db22e2e66d9c1bf81a6ac2e
SHA256868c8cdc05d6eb0b44ae2886b1700778b85fc4fe1aa270ad3342f3670a287a28
SHA512947ca313bdd8d603ca0fd8b430d85297fbed997b7e98417bd64ad02a15984085c71536d33a1a2d90fd0d0a26fe0a665204bdc2a241a93de5ef177be46700f4b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7E301575BABDCBC6D3C3B91BC6B458AD
Filesize406B
MD527f6384484838d040478fc480b6bacf7
SHA16b666aea64f0f038ea55f93707de2d8452cb58fe
SHA2560bba55073f1dbdea49b5eb7ca1f4f67ac5eb94b60fb63a6a2184313e6236eaca
SHA512bc16acc415644bc54f6f7f6c889a0c97c519dbc45381497b1ec0eb1d21a35028f2fa219495411ab74b634c40c20c9a2b8bab900007139a1347494be4a5c2d32c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
Filesize466B
MD552248147ced56c60d8d135e3cb195ed4
SHA1b6a609f6d7a11ec4fcd3893c3309c85f526bd447
SHA256ac2f7647f784b35eb8aa3ba5827d28d55ddd9c03f70dce9b4c30b4e4aecaf7ac
SHA512a2632c42ff5d7d36c9865da8ef1157a4cd701ce825ab8c2b64c9061be53af5564331e3c640b890aa9243d06c0689fc706b29b314e02887ab625d31ddeaa3677e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d69da1310832f70c8758d34cecdd7f
SHA123779089881d0750955e260466325d37a62873a0
SHA25656bfd0e63129e4e61969b8490f824d4510b2fd75b308323526e2b08572dce540
SHA512ac04e379203c1dd52b6c29a91b7bf478329bf0766678de47ebd5d6d4171804d131108fc2b9ba471258869cad39188b540826d27d54100d70d45e2c9ccd15095a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585678053a2bbb40a635c4b23ef2df471
SHA1bd449ece1374751105bb0d9c6b1ab3f409eea50e
SHA25625e42095510e3c64a664411e50e008dfb9598ad8d889d651bdd83ffad2d2c72b
SHA51235ca537a447407997fce2de67fff0a96156fe2399921affb1a54351b8dc58a4e067286226e779482bb2b403a6e7812fcd73ab2f2fd9b0a5e93153a4bae11eab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff85832337d6128bbe1ae0bfdd5ccd1
SHA1e445a194c9eadf270365a56843b4234769146e73
SHA256f3a5b982f21905a580fb54e95c262239ce87bb148ba0b8347420eb9c2c78b16b
SHA512759f155490eecde152a43e8d3250560b02f6969c55b2060759315d9ec3fdfd0cec0a2f7b51ba3a98e65535684a89f586e54e908dedcaa3cf70cd64e294080e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ce18037332589e816a8f0a86b6ad1b
SHA177ba0690d5736cdb7181ec4f70a83cdb59f851b4
SHA256f75fffd09168d3a2d968e6c922a02d8ec0388e6399be4e59d3ab165e5c75e836
SHA512ff8f3d3f41bc8b099547177363dd57c5065409bc4b6d030b46f816d534c89145fc4db9eec7170373e1d6dec00222d276bc0cd17dc623e43b138642cbae34f4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a64992d40a63aea71a72c233b1ff83
SHA1b249573f3e9d179e7b9396b9385a57e25d072e1f
SHA25643c0935c5ed9900579c9d903d0b965f2d81fc80cef2561815aeaf486132f0268
SHA5124623af299d08ff757509b6bc3a06704de5e0f5e579f678bb5fbf089d2830a8168ae3de3692b47d7b5269df4d887c58a2a278fe9b64c23a57c6b3cd5f23eb7c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c59fdd2695e9b515b929c61c64858f7
SHA1f5b0a0d33a78abd9edeec3320995e36fcc9c6514
SHA25641bcefe3c698a266edeeeab6e0ec394c144ded8944f84659539c87e45a15edbb
SHA512d91c2d8ff529930088cba41af47b283f435b944865ec96c63ddbb24180eab37af3717115d2ae4095f9cbce830502ee35624a4cf294bbe100ef710851dc9a1563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46aeae9d1ab0f650e88a6da0311d8b4
SHA140b51d849123169563c1ebb6479fa44864ccc824
SHA256bb908c6a429c516e366722151c59c518bf62ccc635a61a3b3c6b5fc818d79816
SHA5122ae18b2623dec92f5c18eebd18220c398a2c2926676f5863a91b17fea7ef00b49e133be54e6351cf63cad69b85f1631b9e783e1341735d910107d2a2ef270c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2bf40b959ce5cae6a1a0a6a3ad13081
SHA1a215a028d231469aec9d1dba2d59aacf6e95cbbe
SHA256bdcc9570f253aa172dca983b12dac57f7a6bdddefa9deb75945664bbfb596132
SHA512cbcd6ca55b0152df00d2e659d181be31173c0cf53a128d5a7f142891ef8df2b5afe64c5ecf6852c7fd435316a31d662ac855e47104adb3add0643653d5299084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d847e170b765749b23a152519c6382fb
SHA1f14a2540bd7135d1c59917ded5128f8b7e1792d4
SHA256bcc7c84377c8463c7f121c732b20fb50eb553e24338300411f093193dc71b64d
SHA5128d30c569e092b3d385036c00743e22b5c590a354ed2f93ca0c21c830e4420ce62c67b6726a9cf952ce63ce11caf64e8cd0fea2b32030cff5cf37292a6fb30e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d847e170b765749b23a152519c6382fb
SHA1f14a2540bd7135d1c59917ded5128f8b7e1792d4
SHA256bcc7c84377c8463c7f121c732b20fb50eb553e24338300411f093193dc71b64d
SHA5128d30c569e092b3d385036c00743e22b5c590a354ed2f93ca0c21c830e4420ce62c67b6726a9cf952ce63ce11caf64e8cd0fea2b32030cff5cf37292a6fb30e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b67b2f609737e823897e23bc31607181
SHA1238a5286b61f2ee935f324b911cd6e31e6691583
SHA25675ecd28dbbf676e96e590aa810011cf39d5fec2d11bd005798e857ab07f6bf42
SHA512fa05b08d79a488cbe57cbe6c0a922ff41f59be8c48fba942403115309df257330004d4d8272218958e0f23340f5f2ebba20c8c3329ebe9bbaf2cbd9b6de60c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58381f3a6de20098c594efeb6b596545b
SHA1f89e71360c57b3a596f53f29bbdb4f12cf24b0ca
SHA2562a8df78f659dfc23cf012ccd77d0bd796f9e2aa11a360d7e9c0d70c300c5e558
SHA512f14af8b03d7434e8e2049f6a0cc64af11bd1a5581ba33c1a362ad7cba39963ea3ed3292a023ad6848a7f6669b68e5c828f537ba3d176355d48ba43e7e2c6db48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fcaf37a95741e279f23cac8adc3dcdc
SHA1a4a147acf86eb27ef953a205d2272681358de64b
SHA256b1b65a30841af2eff63def36cd133b2ed273d9764398d39967ee38bd38bb4051
SHA51268c5d3c246a18144533b3cf924c337fc934f7a8a189a0bb309eebdb3593a91801bb947301cdb9287a485cad6210685280d1f49aeda7573ffb96f36ce39d11991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef43d0182b8698c3cf3845eca5dc3e2
SHA102e279dda138d493384796ec6153db05fa196c48
SHA2565553b93afaa769f81e87e2e78732d21574bc541668ed86dab263694caa4c5dd3
SHA512393a14bf6eb8f67fb6a83b2c7c7797df37466868493e94b6377984957538006fd24cdd084388d5a4cf4c9932ec7b6e39cb5d6ee6c59bb9c6e0a3400884f973eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a832be8f9e3d7ad382ee1814f46914e5
SHA163c75ec0a6309f255035841f79b4cb1dbd9bcfed
SHA256f47a40fee0e61ae97adb90bfa0d267e42194dfcf0c22eb5eeee30b9636bd0699
SHA51269ccb2df562f6af6134e51af946f0165fa2e263f6128a304c9a2141b31cbafbe737deba87eedbd4696c76dba91dc4c9ea325061aa2995ec7fae69c131cffb0d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520d35d933368df86e1c43365d317e113
SHA1cdc4545473eef66ef2e4f08686a891660b05c961
SHA2569b7ab92777069eafb8f60a78700cdd8d95c7c793f55f234ea9c60f9e337486a8
SHA51250dad8773f19f851dac22fdbf4adfcbd64374e5582c054fbe5e2196fe4fd14ba21e33e63fa379b5954860a826163f677923523171d594643dcb5d725a912c669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a88687c5034cb8ff3ce93b11ef6f8bc9
SHA12379257b6dc8378ae40202e647a8b8d1e25c8bb8
SHA256e7e8db53ce1aa2248563d1c06a86635280dcde87e634962ef7fbe98de224ecce
SHA512dd3370bc8fe23e7850fbd9e29d0ee53be7d3c5ce0305736c4682b351deecc0849d6477b7b78cfc280e857a851efc7f037db2f2df32e43440d51c731d6cb06d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378ac737999e050ee16205bc3485e127
SHA1fb5b2adb6a71b1cee635faa2b0a22ebe2f685d1f
SHA256ccaa414274ace33039e89bb0f279a4a23ad284003a1b276df426d1a85932f104
SHA5120122b95fe745919f326ad132d5c5d5b601790ea29bd1aad2062a720c28e19598fb66c69b0aabc44027c1f0066a90e661db43c31f78a14c9afdf9dcc547e7c6e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a88c9a8f6773cba1042bc52aefbbb3e
SHA113b23597e9a24edf15ed35be7fd147913fc3dfd2
SHA2568fd4b39850e07a2623552a5526c029442b453f7a809e801ad35e50bb79d648f9
SHA512f037a43c08663a8d73879eaea17efeffb872aa11d53b013f3034661de84ab4cab1c602a56464e1c064d7d543f04014fa215c12a84fd9b9466a1b1ea88e45f909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5884fe43e8ae0dccc905e7a9758d1e42d
SHA1868d960d97fdb94ef0a69e66cd6c7e211aae4993
SHA25665385ceab06b64c0909827a8339f4e2c69ba635e6deb03324d665b8da5594d16
SHA512d18b8dd6ab597eb748dee203cc71407536792e0d6deede46e747a534cf015575b34eca9f8b2eb37f0ec1e2004e93e9e735494e824c9d49b997ffe879e0e36b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f62d2d5c42ec9be24200c8e09bf1f7d4
SHA17cd727cc7fa634e415ecc76202f05b16353d201b
SHA256544aa76b33b9080d511d25ab2c9abc40485b5a04ded2f5d491b88218f3b041c8
SHA51212faac4d044408f25eb451fa131a2a98566f869d45e5281151c647fa925ef9918c4fa6c2e910ce099f90ed9bc71cbb90809fc28e3a3b2b0b0a06778bddac52fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e0bc63acd181385f1774a92dfc4242
SHA1506fd22ad2d6fe43db2395f211c017c558eddc0f
SHA256d16e8254d9fc9b4f21f14060fe2435f6fc0849b4af466b1f37a77279482ac563
SHA512b964b0c11f853acaa0d5eab488420d947b916bbe0ad8b0aa2793ad3ab663017c6cfbdbe2ccaa58223f751bcc2ec4547e6c64c80c409285c162e29c186fd624fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee64ed29c9c4bb62aade189912ca97c
SHA1582ed555e0a5b59ba9638eb064cbcf3e174ff224
SHA256b04a158cdc14960ab6706ea800ccdd3c40e79e1fed6bd21c15b5a53b3cf9e502
SHA512423b1c23d29faa32f7ad8841cb3ecd5560bebdc14e6a2eace41935369c276f1c4a6340e37a139b8c8b8e0a862c9e1a3a583ddff5222b8cf9e3130479b56dc401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1391f3a8017bf74c5006e8f87c56462
SHA19df1b5cab4ae8735d1f19e069502ec22e386ee7a
SHA256a129ebb34e2af1ac8af0f17f1573b83f8b546246f50a475fbbc3fda57ce5b645
SHA5128040a3eb6c7269ba1719d724c140db158586bfedac95ba52fb09d1e56ddc3dbfdee4f6682ae9c6cf77b157f1caa513146aa04c176f518635227eaac8e6a0628d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1fbf1e18e3f4dfc6e42215ca009a4bf
SHA10288efdb73efc199a3367a8accf2224b9db52f50
SHA256abc9f3aea0314e5e36be898b870aae25a1d8c81919d559b1b17c24a6ed86d86a
SHA512759741362b37dec6836f4a24113f69ae97373d07f791aef8caa539cc1bcb122be5cee36521f5b95b1778ac1c59bf1c7b642dbda2da2e88625e0006e8b59b6350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769d6dd5bad037cb92bd358d8cb9ac38
SHA1b73c1b97fff0ad8a73709293025d267e598609bc
SHA2565468953633b8b060db020a2f06e0c6c0a3bdcddc847170c98264192332c91e41
SHA512a215f004b70ee8dffa2fcde1506629db3db44f3710d3ff2e4c2b67a5ed10b3ed16712f90c68b733e4da411cc6ac44f40649aea50bb2bec76ed2aee8b89baaacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9c29d25f163e9bfec1eb9e44ed6be2
SHA192fb95b11b96e99b61af36e2fd134e6dbf6c9b38
SHA25697afbb758838d3baca1b3767a73c5b3a9b4a2dee9898c44c07ee31b65155f5d0
SHA5128eb71866cdd24b252bede9cfca369423e0cdda49f189c924c60f2ed785f5029511b2d53da5e35a613b7571e9189a206229bac08f219e2427e6880ef645c670ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ad3ef077f22d32eaf2d18690d4d9da
SHA18e580a3941e47894b0feef9dc4f00471140c442b
SHA256faf0cab5288fefcdbcfce8c74228ba6832ff2d45901e60537534fc0ddfe28bee
SHA51241a0bd28013aa77387c9795bbb3537aed9dda1242a7c287f08099581c4d6e85bf64b9cb2dc677bbac8f2ba314f9d0094b3206173f7fb039a6ae55a0001f4d62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e7a2141517a77d4a3a87a90bd7a486
SHA180c73a3a3e873c6f0e7090e3cc776a9d2ad29ca2
SHA256790ad93e93ceb772a7ee1d71521762432a973c1b5ed61bfad6e13e2817efeb05
SHA5125503a8ce853578fd74d023b2a5f8963fc78aa7557cad52380d02af218e983154f0ace7c8c9c73a7d3ef18d1e6a6d55ffd025b2d0de479c37f5615c2dc763545f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d4b69eda39a7452510f8d2b436d4be
SHA1ea9667356ffd482c56d6227b9941ef046e1735fb
SHA2560425d046627ff542fa6085ee82d5e81ff040cb37377867dd1e825cfe8253546e
SHA512085a6a9673cab5de4ac473d2db101e45f56154e9ea98b14e4d293ba4b0c5f72eff4a2c5c5ee8500ddbf713cb018ceb79ced901ef7704cf01797e865ee22de63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b0f1e3326e9382e1a2cd67d3548b068
SHA13f770cf718b1d18aebbe2b163ef7d943cf6051a8
SHA25606d0629c792f6b4c907dcdc74de8051208ae36c6f26121ff5ab236e998e5a15e
SHA512b7780da0a236a0ccbf83e18ce34424fc3c5f6d71e652ff71362559f33ad9fe7cc8a6d23e3f244de2355354e5b909c85312c4a94cc7d44070e05823e1cde816c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4fb40f5d2f2cd70163b4bea38d423d
SHA19c7048df8c134418f4eb01fe5ba1d5c8e9b6ed72
SHA2564c0808d1b0c8164d42425487629803b3dc54158b7d45e59c27ee864ab7109aca
SHA5125d9572304f96465b0bc6cd88f3ecddd6ea969dbd8a6502ae6fb263cf5f15988533188fa58708d3f70772f774a9abfa992a69fdb7707ffff2cc701124e11e664c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7c6ecbc506a4ecf17e1533a7715c65
SHA1e6960d98315676f8584df81ffc187abb7cc7a02e
SHA25667d34000bc636560f334c1147383a2b2709b4b113cc4bdb2cc5dc8424a7a8f71
SHA512c1609db792606a668349f862d2b0b477e36c0aa705f325b10349cf68837e0d036cce21f5706dc28e940b6e501b352b668362dea322208caae7e08aea4f67fc18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edb1781b71805e64908a8e4c1fd01505
SHA115ae1d66e51ba89971f835873748f39a3e17b6af
SHA256261889a398ba9bb91e1a39175bb4a362235f1e94fb31d574d0857cc6cbb3005b
SHA512850826dd51a2657dadaf0f00bef2caefd7afb670776542e8c457d346b943a8df18049dc9e344b5e0e6304e8380478c830475456d1109e960f0e21ecae89a2cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51901072ff212672aa2ebb918fb260755
SHA16505080f6b252a6bdf9e19e5aeb7ebfacee95b03
SHA2562fd31c16a014d814d2ff8a1cc8f86a4910128d1e0ae0d58ddaa6a574c4514df2
SHA5129f0ddfa8fea21c0453be63286e9c27e9508e72668d0e1bf5c4641853363423fa603b4943442108c894099490164fd1ec2e29593606354ae701d1f2d70047d9bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
Filesize470B
MD57a88ac0b9b07606a3ac075170b419584
SHA16ed8ee39f0429588ab0c66c89ce1927e229b24a9
SHA25635768e8a3dd033c9240c015c434352733d35a20c45e7d3e35194c3de5ad159d7
SHA51238b10dc89309524588f47183a426398ae3261f6d1007780275262c1a5fae3c1bfc3999941314e1d7a1e443c5c3816441b57166990690e4705c91c73c62024349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5ed6cf29c5f58a36b9ac5d47483225ca8
SHA1c33bdf8f7ded072daf086171662f645ffce01f48
SHA25648cc814b5ad7c093bdc68d2df356f2191585bd900b3987abe9b01cbba5622ed1
SHA512d541181e4d227ac5b5483493b00be3dba5f7b2955a8d17ed94ac0af436e8605c6fdf7622fc38a55e68f1826ded6cd116bc3d336bd7ddd2d5b0861263027c48d6
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
1KB
MD5674711e18418a9f92e529883cd06a7f9
SHA106f568c472c10c2d46202fa61f8c43eb0ef3fcc3
SHA2567ef6d97af25e3e791200760ec65918fc38f4d3a550a90e95531031a52dccb1b6
SHA512bd9fed3da1b33e0cd837a1344c00416fc9cdc94a1ca5c20615a3f810303e4677109190cade9739ab9988179a5f5da6e927473f29d65b99f523dad286fe6e6b34
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PULJ7CSW\caf[1].js
Filesize143KB
MD5db939a550dc25b51be452f1d53e68379
SHA11b1c9a3e4acbb57b320cd406a9bddb5fe5294dfa
SHA256db21a922c25ea3759eb0b0d32a66ed9f9593467888d3bfefe1665c5b63c66fbe
SHA512cd0401295b7529430038b1c056426bcc4e092b906c8cdbcc56fc5d81eab1fc32386b099d4ee45d3aef472194a3bd85af18ebd2cef72b42b61736b99b0aeea8c9
-
Filesize
432B
MD5ae52105f3933c173f861f02b393850d0
SHA1195332ab8805fb2486c6714a403ff32e2e9d6e60
SHA256b8cf3038e74c81da65a08f1d39b20100b61a37ff671471f932743e4a9bff5dfc
SHA512cd28fdc04294f5cc5b1531ac2d80114c2d871a9806f1546921ff67d4428fcd49b549ef92a0e1012b3a458de0b7ade9f7118714dd6dda925a777a766f445d717d
-
Filesize
136B
MD5eb5e4be23802ad0742358aed2fbda92f
SHA17ff14b7ba26b2d4ee9a6f4a6f7ce2675d0f4c7b4
SHA25618182f7df9fbee43ba31ebb79c098d13fd6659e30cd00ec1363e121ab5ad2b5b
SHA5128a6ef0caafb58eccc02fc4389ee0c2357700b75228bc75249fa6e9516817f3e5f86f52684f5cc54d92f384ef741323c1df470319b015770c1b776f21824a1627
-
Filesize
111B
MD5d94309b001f9f159f002e1f49ca8ad41
SHA19cc4c5bf9234bc7fe66bb5d02870818f133844e9
SHA256f91fbcbde591e08edd40629655b4214c3dd79b4805565d0fe607d9b540bb139c
SHA512539e524f8ec47858c52e2408bd90a1d214d2e42498b6a8d767fd0b9d953753a1a9409606fefe05b19a60c2f10d62a5731f0f38e4cb38dc9d0d3c5272a64a204d
-
Filesize
109KB
MD5d3cf85e9e86cf715e17bebd2815293d1
SHA1b0fae70548f2e79ffc37b6d8cc2c86e548514fa9
SHA2560380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae
SHA5127c498a925b5337293fabf319645c117fb5160a935eb94a2b7babffa26e7d41a2c5024c1a1cf552962914dc82ccbc01ae19ee9592eabdb02bf6aa194fe6604952
-
Filesize
109KB
MD5d3cf85e9e86cf715e17bebd2815293d1
SHA1b0fae70548f2e79ffc37b6d8cc2c86e548514fa9
SHA2560380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae
SHA5127c498a925b5337293fabf319645c117fb5160a935eb94a2b7babffa26e7d41a2c5024c1a1cf552962914dc82ccbc01ae19ee9592eabdb02bf6aa194fe6604952
-
Filesize
109KB
MD5d3cf85e9e86cf715e17bebd2815293d1
SHA1b0fae70548f2e79ffc37b6d8cc2c86e548514fa9
SHA2560380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae
SHA5127c498a925b5337293fabf319645c117fb5160a935eb94a2b7babffa26e7d41a2c5024c1a1cf552962914dc82ccbc01ae19ee9592eabdb02bf6aa194fe6604952
-
Filesize
109KB
MD5d3cf85e9e86cf715e17bebd2815293d1
SHA1b0fae70548f2e79ffc37b6d8cc2c86e548514fa9
SHA2560380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae
SHA5127c498a925b5337293fabf319645c117fb5160a935eb94a2b7babffa26e7d41a2c5024c1a1cf552962914dc82ccbc01ae19ee9592eabdb02bf6aa194fe6604952
-
Filesize
109KB
MD5d3cf85e9e86cf715e17bebd2815293d1
SHA1b0fae70548f2e79ffc37b6d8cc2c86e548514fa9
SHA2560380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae
SHA5127c498a925b5337293fabf319645c117fb5160a935eb94a2b7babffa26e7d41a2c5024c1a1cf552962914dc82ccbc01ae19ee9592eabdb02bf6aa194fe6604952
-
Filesize
109KB
MD5d3cf85e9e86cf715e17bebd2815293d1
SHA1b0fae70548f2e79ffc37b6d8cc2c86e548514fa9
SHA2560380f87c00cf7560af3cf0516ce171ee33fa8f3d6b1b403e041320d5d70a0dae
SHA5127c498a925b5337293fabf319645c117fb5160a935eb94a2b7babffa26e7d41a2c5024c1a1cf552962914dc82ccbc01ae19ee9592eabdb02bf6aa194fe6604952