Analysis
-
max time kernel
296s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/09/2023, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe
Resource
win10v2004-20230831-en
General
-
Target
526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe
-
Size
76KB
-
MD5
74fd302390dc8e8b5f49d2da186e3e8c
-
SHA1
63b7aedf094158e30980a46da8b8f4eaf88524e5
-
SHA256
526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725
-
SHA512
0cea34931b747c17e24c9e0947ca5862bdc19ede390e394697abce394047bc6117fdd93773de308cea7c3afbac00b303355e45a1be230f4c2baa7e04b3742b16
-
SSDEEP
1536:IduCq+ndmWKk9WudptcZhpjrNqZE3Qh3OyeEiw2SB3aiqSuTDjdIa3d:4lq+dTKk9t0LNweQEyeEiDStSJ/jKat
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
https://getsession.org
Signatures
-
Renames multiple (169) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe File opened (read-only) \??\Z: 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEAB8801-4D3C-11EE-A48A-5AE081D2F0B4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2812 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1936 vlc.exe 824 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1936 vlc.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2500 526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe Token: SeRestorePrivilege 1472 7zG.exe Token: 35 1472 7zG.exe Token: SeSecurityPrivilege 1472 7zG.exe Token: SeSecurityPrivilege 1472 7zG.exe Token: SeRestorePrivilege 1904 7zG.exe Token: 35 1904 7zG.exe Token: SeSecurityPrivilege 1904 7zG.exe Token: SeSecurityPrivilege 1904 7zG.exe Token: SeRestorePrivilege 1248 7zG.exe Token: 35 1248 7zG.exe Token: SeSecurityPrivilege 1248 7zG.exe Token: SeSecurityPrivilege 1248 7zG.exe Token: SeRestorePrivilege 1368 7zG.exe Token: 35 1368 7zG.exe Token: SeSecurityPrivilege 1368 7zG.exe Token: SeSecurityPrivilege 1368 7zG.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 1472 7zG.exe 2924 iexplore.exe 1904 7zG.exe 1056 iexplore.exe 1248 7zG.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1368 7zG.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe 1936 vlc.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 1844 IEXPLORE.EXE 1844 IEXPLORE.EXE 1844 IEXPLORE.EXE 1844 IEXPLORE.EXE 1056 iexplore.exe 1056 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 1936 vlc.exe 824 WINWORD.EXE 824 WINWORD.EXE 824 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1844 2924 iexplore.exe 37 PID 2924 wrote to memory of 1844 2924 iexplore.exe 37 PID 2924 wrote to memory of 1844 2924 iexplore.exe 37 PID 2924 wrote to memory of 1844 2924 iexplore.exe 37 PID 1056 wrote to memory of 2584 1056 iexplore.exe 42 PID 1056 wrote to memory of 2584 1056 iexplore.exe 42 PID 1056 wrote to memory of 2584 1056 iexplore.exe 42 PID 1056 wrote to memory of 2584 1056 iexplore.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe"C:\Users\Admin\AppData\Local\Temp\526488b37415ae2c692f7da97a18c337b0efd4675fd1ac31b4acaa55c63d2725.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap24211:210:7zEvent53491⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1472
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\SaveUnpublish.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1844
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap17095:206:7zEvent217371⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1904
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\JoinSuspend.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap22093:204:7zEvent133111⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1248
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\DenyRevoke.mov"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1936
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2812
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap32168:202:7zEvent230671⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1368
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\JoinMove.dotx"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed56984baba12cb9bffcb5e8e33156e3
SHA1eeb82089e7edf7adfa8d8512b907cb8bb3bac9b9
SHA256a42ead25b28f0906ff4809490075ebeb16389ab7afba7f34ada69f56009ca3b9
SHA5129d3c69152956ada127f5530c07a6d6113bf91269037b2dfcfc2d715e5ec35df20baf11e866e52c42c36732d4f6e982ef4c4794508fbcdf77904555bf8ece3bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e802bdbf1e394c585d75a971346369f
SHA1e01cc43a2f193cc704d45036a098dedaa56e113d
SHA256f5ea6f64ea56cacf3f33e05c38c78a43e070f10251ed0cba1a8f5259520d3592
SHA512e9cd7cb1f64a7b799e67a346d97d859f38b3e93605f4ae4800b5e0820f90342d765520929f8f536d3b2b0c2d5a1cdafa312ba8cc67542d32ff55f5b244291f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d475209e6f0596e019e14c7c3403bd10
SHA1e92f09966300b41d9a3f78b25eaae244c60e69bf
SHA2565e2e37975a200d0b4fe12b6a472385363952b347a0457677f4bd2d2d6a889e5e
SHA512e27db50aa727f81efe27a347d34a4d75797efa696a95930b87f1e913e5b5661de33af57bd3b0566c68097c66bb409d39fe53a4505dd8cc4a2d1e20825a7315c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d88d7aa4ed51cd745848169e3e12fb9
SHA1bc91767c15f634ba5eebf5afcbb9fe4d39adf8cf
SHA256485d16794bd8af613b2a0c014694340328b7ade9403879260275d5ff14c8fd18
SHA512d5415d00c1428ca43024742c294cf4ab35be4a503dae38c3983d47248bd3daae1569027f47050806c97e7f640ee7189f5d219d1e540d5c698de14080050c51a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551d308b2364be94f7be2df43ad710cbb
SHA178e56b0a0ec3dc86db525a4587c2bd8061b400df
SHA2561180e60efdc061431af450fe18f7c3594004ef1e5cbb2bbb76ebb962ca885223
SHA512d0eadaeb8ff2ec004cc846a61640f91d73b705b5caaebc9aece788b54b325d9d4b4340fcd9d75b1cb07ac74ef9db5c024a8164b17c7b797af34d5710849e1281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599ebf2ab45324cbc2668e6b9c7b9311a
SHA16d1239011523801d70a5713663d50a94b82db6b2
SHA256008295f45d175ed651b0982b72aedac503f083c826b0056fa236d28add051a4e
SHA51217b8ac7ace08ea74032b6da902825ac44fb44285267a633add03d17d6f00ebdd5c02239d0eb87a07b392eab82465d4def506a6fc401796a1d781a1700437340a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b3b3632925911e42646e4f2708e996c
SHA1a267a98842a26b619d78e6c3658cf7386f8c6e8f
SHA2560e34314f3fe8cfa437a3b3326bfbf00912092714c52bc084f5fdff48830864b3
SHA512145e15ec2332528a7956d7ab5b6886f6c1dd6f158f1b9377527abda051cd9950110dc53702a46eb9af2898262bfcf859023c35d598d588d4573615d263c24cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c96dad68e8035ce5010c6c394753b7c
SHA16bbf2c7f8f5ba5de5804f429ccc86d66cc041abe
SHA2560ce898a2e6f19a378f0427ec53f5fbb9979e38936b06ffabb5a983176439b3f1
SHA512fe575e049f55426bb9e09e362bcac118ffd45f1fc2a15322e6aac3c3bfef93105a0e9460c868279eb0b064153e390177919343454ffada8f51d22586b36f302a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543e7f493776668f10ecc0cb3a361c70f
SHA14257c3f178886cfb511cac75f5075400bdb17dce
SHA256e4aa654d114fe55b41b9068c619ad96be2b287681030dcf1ff260ccd74670c7b
SHA51244a203815877dae46efaf6ef04e97924df4f3ce301fa24f80a426cd9e67ba9cb6719b95b2a127f14f001dfd41703ab46fb24ca7085554b6b3cb37e3495aed594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5008dc86f7d00abe4d2713a18d2550fb8
SHA11d799ceae253becfdc8d014ef24271b84ca413fa
SHA2568e2adda3a0e7ac00ccfd974e9b73bccd5738c19ce7859da49e7fec11a26a5e39
SHA512d2373173c56944da87241d47f66aa4b8b8cc5527dc3fb2d0fe73cd88934fe7efd568d7da6e79434c99ff2c2e86537f0297e75fa75f3d18b5139ee526a9e4613e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5517d2ae693f7ecd7e2d91574005c44a1
SHA1bad580fdf94ebcaf97b3af5821887e0a9b4e79eb
SHA2560dfb583907e456a621abd2a05ab79abb5be49a395ca620500b2f6723c71db142
SHA512e47902080ec004931cff8137e3cd3c08ae6f0bbe807d0d429e87c170221c4963e5488cd0803686aab8028a259b05844ca2c4337faca7b0a4d45a18ce4c516c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b48314ffbd589ed21dad97a2a6ea1998
SHA14e22cc3af682c41bf2c1e08b379b6e46b8a6c8b3
SHA256d2fac6b385c3fbac21e585f652ea4a024da64a7065ecd5ee8d4a5dcc0cdbde87
SHA512d0e360632b3220c71de5a5e951f3b30874730ffcd9081b27beed9b50194a608151491f49317d730fba28caf26c31d03f5a059af35c8113533e69d31c4846e552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7f14c631f9840a093740721ae42ca07
SHA1c849cee5e5f6d917d615257ea3120e227bbb3624
SHA256068cb5de2897eeeded087717133d341946754fc5a87fd35d4852167ceb25f146
SHA512b9a8e37ab3b51052d731632eba764b112c43d38187db490cb2ce8997658c6c2ce9a9ccb967a3cd0cbd4cff17c11b5ef4145dc320fd523b70a184f996e6a7cb38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51165fd20593a3c6ed970a99a33935841
SHA1ed82960a009d47dd270ae19f9ec586752c261f68
SHA256cb226c10927c6c70803ab271dfbde11d649ba82ad0afccdda82a2ca102ddc257
SHA512743fe09b88817344902a9653079adf114a596fa233c0aee68bb2d6b97bff2d89027669a07a0a87f77ffe6a0cc030ee71a7e4a2069e6b7fea0eaf1d452d665a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5481ad376a87c3c4940ef05f7bdc20d64
SHA1f063d66a4984b6ac6fc13d12ab523d150237fbf8
SHA256d52f90acee3a9952345a79954f9769d5a1e24b110450e330cef3348bb8e4549e
SHA5120cd02fc7b3de4adc01b3d1d45c7deb3e731ab48cbf60bac301af50296569a73adcec0fda6011df908d1dac823fbe5813548901c5d1ef7a9cc6308240b5c45472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fea721879eaa39df6e8d7abb3d83d0fc
SHA18d05d6cd6033627bf862f05621864d92cd55b1e6
SHA256fc0cf4a534d351a10723e981838047a8b228c7364df41fab9eb30ac3c39c64c5
SHA5124820c229b116ebd5439d956fd2138c2470ebaebe1940814ac8f0f85f42cc246cdccb6d7ea47edb483c204c5e5e82874b2d69a08a4e9b1e9f2ed82349bf0cb837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543d8f12f29996fdb37474f35317f21f5
SHA1c811dc9d9b2c5df18703d7ba3437c62d3b2d4540
SHA256e65d5511309c6a340b8ad8607f75b203f65f32ded6ca4bbc723144b10b4c7e08
SHA512f0c8d503b080b822737e66bbd76d029479eff5db5a92efd38b4625ae74954c316e6f725ad0c469a77aef9098bdc308f8d06fdf8137b598727b016037b21bdaf1
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{DEAB8801-4D3C-11EE-A48A-5AE081D2F0B4}.dat
Filesize5KB
MD5a0950d4c374fffdd920c38b3519cacc8
SHA118cccab9a4dd6265a6f61a1d254c636876a245cd
SHA256dc28433be14e1781ff88d292d7165b96d29ee2bfb6547b02c21bf9d83398a60f
SHA51204485dda3ccd86e420e065c5a4580d289b0c3233f0ae00e42767b6afa1c225a98125c10039bc016068e9ceb7ef78b6e53cf82a29ffb3156875206affa7b246ed
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{13DEFA40-484A-11EE-B6A2-62B3D3F2749B}.dat
Filesize5KB
MD5209e0a3b60269415355225a7ce6b2f0d
SHA106486b52b3e16cf9e3c217e95b3cdb4595f11cd8
SHA256d1de1f94c958901167ac46236feb2a7a65822d1ad6bb575e2852a7130ead7c9d
SHA512e886eea1008e1b6a4b4496193003e7f324ce838552fffa6dffd2cc08785284a1a58f6073708032b568733ce8f3c17be0bfed2e570ef50cfcfe42d44935a62816
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{DEAB8805-4D3C-11EE-A48A-5AE081D2F0B4}.dat
Filesize4KB
MD5b092369d7d50dede10018a34fd811807
SHA159dbd316b57c22a2c7b0315ecbd8c911c2d6fab9
SHA256a7c7b4e3da8ae93095e57999d401cac8a692b03fb0079c190f3ae46dcdcca1a6
SHA5124a536eacd371390634fc1d15c24a18469aeb309f5f9484ff4e31527748cf575ef6cd69a5bdc371936d647bd6f2b16bc3e5f137cdcdd5b6d4f021d487fff881cb
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
16KB
MD54f502a7130942d8615b4d56b94323aae
SHA11670059f6a91817aeae8f1f56260fbc3aa4ff486
SHA256e9b777ca89c86ad44a65ec4dc931927be3d314ef6a4b32ce306c7c3fcc46ecaa
SHA512777f5dfd06d58b48d802ba6e380d8486dd339f158c0a4a9a0d01135a4dc2afbd71114176cc3bd08c93df1a8526a3f4fb30018ec2588cab2abce6e791f367e47f
-
Filesize
20KB
MD52f31c4a580eb39479e763b6702cbc99d
SHA16f8cf73db0a5325bf46420e3cf9b1e4a18d7916a
SHA256a1ffb848d62c3f1f20b24712d2fae451e98a0a3c2884a84bb7059afc327dea74
SHA51216cdfdfd499e179df37b4787b55b0674ea738d17eaa8f528d0b8547e8df6ba8a0898995e5988b16a15686aa0c2ce7e8bd899b35d804fbbb50692c9f4c997af65
-
Filesize
799KB
MD5ac7f6d2601c1db86bd2d93be93a8fc37
SHA1aea446fca86930653d0b160bd5594e11420aae98
SHA256f8126b7d5e55e559f24581f11e059b7334a4714e01d3a9e351fbba08421e99ed
SHA51296b9d036e789cdb1d8f53add3b03275b5ae91518ea221eb681e8bca243e7e1166a3654de224a23556ee7679118e8ed5a40bc72299b20335e14f1e99f9cf8c500
-
C:\Users\Admin\Desktop\DenyRevoke.mov.{BE887555-FC8C-CF87-2B13-9DA770161220}.Grounding Conductor.zip
Filesize802KB
MD56330abf164defeb1707683ceef31092c
SHA19187396a68386a1d0da53cfb2ff7aac2419e73c0
SHA256bbf55c17341f511711a43196c63b1f1f844f191fb8cf49f00f7ef46a26ec91d4
SHA512e52e4c3c0c691788f131ee43d1a87c3ba0d3b5100c50a114acccacd42c90d524543d3e6286b6705b8ccc80a2f71bda8fa18872e824efe2fad4d492cb17e43722
-
Filesize
444KB
MD501adbd2ddabae51a59b119b9c524b8d5
SHA1de11983ef8b76d86ac5812f065c87fbc8642a5fa
SHA2569be87870df45c571f5195957e87b116bbe070b5fa6217d01b0e73d761362277b
SHA512924305efead64ede7a63036b6739479e9e8f9908b6438a9045160bd93850eb9d9513111893e8552dabfb3dd822d5de2f97927ca4e5ed3685c4d9dd44967ca0a1
-
Filesize
447KB
MD5978f23dcfb0b9bb81576eba1e54e1a91
SHA162c091a359b9e39d107a4bf65aad252f6bb94c43
SHA25617cd6064063dade9aca5024eec34724bd08dd8d86cd40d1327e00c8212888fd9
SHA51248320c8ffd9340076cf55dfb992c3629c78dbcf42b8c4c1d8ef6989d0faba76c39d354fe099395384fbca1a349e169cf72e39847e8145b7feb30a1bf643e4bdf
-
Filesize
1.2MB
MD5b2bdc1cea6af06193b6cb1793fcc7a9c
SHA171be7c0173dad394548a865c227be78fec2a5b32
SHA25619b68f09a985819f9af16c84ef302b8f229a8f7d17ba408ca1b0526d877b9676
SHA5125d792b9ed3f196a79a367f4937e6e8f1126ea51967eefa2989cc68d217065640fe848fc0d6f6350527611239d4c7f4a5d62ca2f39ade0537c93dd92fa119835c
-
C:\Users\Admin\Desktop\JoinSuspend.htm.{BE887555-FC8C-CF87-2B13-9DA770161220}.Grounding Conductor.zip
Filesize1.2MB
MD5e8dbca54cbc050912238450806c63401
SHA1ad0cf98eb88d8238c9a87b6ddc330be2ff2c6caa
SHA25613d99e35de8e68ecffc3b486bec582c4423b2404605ff65f14fec57c41d75230
SHA512da45a17e44ab51ab3f0f75364aa51c2633c27c03c15cf53077edb3b444a362373664c153b85948070ca9d0fa512f47f653bb3db76efc06f9694b3182186544e5
-
Filesize
385KB
MD5ec36238c7c0daa310d68e7cef8163a35
SHA1b17a87a418a87ad837ecb3ad21eb6f5964cacdd2
SHA2568a8870338be0630ac086ed135a27716f4d53acad30bfcb2617fd98e435d82d00
SHA5123c7358f9ae2daeb4c6c7f975f9feeafb3c39080aca0420ae51c40f8d694b6475f076208275d4c3de3f644348e990728a8467945d2bbbac560107f2398d7f2cd5
-
C:\Users\Admin\Desktop\SaveUnpublish.gif.{BE887555-FC8C-CF87-2B13-9DA770161220}.Grounding Conductor.zip
Filesize388KB
MD5d465056343d42977a2f033b0c6a43f2f
SHA17c4c9034be0479eefae253335a10d65f329c1090
SHA256e76b5bfa0cd4701d7239f1882885cf61e60c9ff2484be9b0b743d0f634cec3e7
SHA512d49c7449e8b7bb6ef04560e080df3e76cbed22b61ebcd9eddc86875f5c7bd427c4878482e96cd9bf0962dded765b58e36584579220349a56097cff0af605bb7d
-
Filesize
2KB
MD514dda0411891bc8227d73c403c08f653
SHA1cf62d9e053bb3d456a39778bc351d42ffc06542b
SHA256525115ddb0f821c6db403ec86fc7971dcfd4a5bfbb61cde458351f7d8ad7edfd
SHA5122012bac488f1870a91ddfe89f14f259094e835a96c675279be23c833b3ca791f818ef5b55666448c80405398f4bd1c1a7a14c6b36c4bca72e6fde3e61a26af82
-
Filesize
2KB
MD514dda0411891bc8227d73c403c08f653
SHA1cf62d9e053bb3d456a39778bc351d42ffc06542b
SHA256525115ddb0f821c6db403ec86fc7971dcfd4a5bfbb61cde458351f7d8ad7edfd
SHA5122012bac488f1870a91ddfe89f14f259094e835a96c675279be23c833b3ca791f818ef5b55666448c80405398f4bd1c1a7a14c6b36c4bca72e6fde3e61a26af82
-
Filesize
2KB
MD514dda0411891bc8227d73c403c08f653
SHA1cf62d9e053bb3d456a39778bc351d42ffc06542b
SHA256525115ddb0f821c6db403ec86fc7971dcfd4a5bfbb61cde458351f7d8ad7edfd
SHA5122012bac488f1870a91ddfe89f14f259094e835a96c675279be23c833b3ca791f818ef5b55666448c80405398f4bd1c1a7a14c6b36c4bca72e6fde3e61a26af82