Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
3ec279fc2a579ae0bdd2813cb5167cc3.exe
Resource
win7-20231129-en
General
-
Target
3ec279fc2a579ae0bdd2813cb5167cc3.exe
-
Size
857KB
-
MD5
3ec279fc2a579ae0bdd2813cb5167cc3
-
SHA1
496d3fa9266b08185f611b5ee7dd9736528d731e
-
SHA256
81c1907c84633a2113d33b543459669151d741ebe6b535e50677953b28bc31e6
-
SHA512
ae848b72ba3830958c5380fa9eb228b2f4620735b65bbf0660cce323c85f21fed968ae60f92442fb69f0205a5af59a66568239ad7e63416b1bb540f2202984d3
-
SSDEEP
3072:15yU9nkjkbumccSJ5l/LUkXTpkiOY0R3iLv:X
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-36496811" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-38194441" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-94397079" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-84457748" winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\periscope.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\programauditor.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\programauditor.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pspf.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rtvscn95.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sgssfw32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\expert.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsrte.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HostsChk.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spf.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vshwin32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ecmd.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\efpeadm.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\minilog.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winppr32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avscanavshadow.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkserv.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpm.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mxtask.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvarch16.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\portdetective.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieRpcSs.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkpop.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monitor.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfagent.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\earthagent.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avrescue.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lockdown.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\titanin.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winsfcm.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfind.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcciomon.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pingscan.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\portdetective.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-prot.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfservice.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\findviru.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luinit.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\neomonitor.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scrscan.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds-3.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wuauclt.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atcon.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsynmgr.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\persfw.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\watchdog.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccapp.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsgk32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pop3trap.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shn.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vptray.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpf.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WORDCONV .EXE winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notstart.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpostinstall.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pccpfw.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav7.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbust.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Process.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atupdater.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwinst4.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfgwiz.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe -
Executes dropped EXE 2 IoCs
pid Process 2900 winlogon.exe 2732 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 1960 3ec279fc2a579ae0bdd2813cb5167cc3.exe 1960 3ec279fc2a579ae0bdd2813cb5167cc3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2732-77-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2732-80-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2732-81-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2732-140-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2732-238-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2732-692-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2732-3029-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2732-3066-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2732-3088-0x0000000000400000-0x000000000043F000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\4524252474643435 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\4524252474643435 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2900 set thread context of 2732 2900 winlogon.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://253ojjhj7o4756p.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0525F3B1-A65E-11EE-8A74-66F723737CE2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "115" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "307" IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Local Page = "http://6h2nk36901oa290.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "282" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://d061t8nt1q5n696.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "140" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://6851rrhm01e7pk2.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Download winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "121" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "222" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://9xo3bfa1527z65g.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000aea1ae480450e879a43a4646e2e1b4c383ff7644c77283d9d72d2ea387505210000000000e800000000200002000000048e701510602e52a785522275438e60f479fb8f9010d30e089cc2ae96ee43bd9200000009241656965e4a8cc9c96b9fc9e83ea59c402fd2712f59d70288c3190e8e1faef40000000a21a503195d33845ae9a6ddbc2a99d655f7c667bd57fed39be9cc88abac8b7d9fa2b1056d207fc8a14dbbca6359b2407cd7b916b330d1b3e2f40b2a69e85c7ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410025217" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "1" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\hugedomains.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "1938" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1963" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "1638" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d780000000002000000000010660000000100002000000028cc103cbaa28169262876fb7249f73efc65e69b3cb3de61416653e662c0f6ea000000000e800000000200002000000080130ec9311a00e7456b1c402c308a02e8bdc087d00ca2aba8ba315e78e07a539000000030bb340991f31f394edcf0212ff9f6f835bac82da2b0ce865a5164d64b5c0258c9b571fc5f1d68c54e8eccbc505c0b897ff582acc2051b377e00bd915bb30453e9f631ac77cf8855637eca37c64d1a85a76ef453c5f75ef6e593af3ca1269340d0f88456eec873e34c14c67ebf095f2da67db91f0cac560319b21162096ba9ea1d21ac88bd44f15d936fa7a0017c05c1400000000417c6c19207e22fdcdd726a086b31a59ec893ffa8af7992958296927a4cab080cb9e23c113ae84468530c1b3a25ae904aa6405cd4130ded50fc1f9284557516 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "25" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "146" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1663" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "1638" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://39hh6tnj0ti1600.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\hugedomains.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "225" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://27t68aali522q61.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://vt7qh979dnag7us.directorio-w.com" winlogon.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe 2732 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 2732 winlogon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 812 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1960 3ec279fc2a579ae0bdd2813cb5167cc3.exe 2900 winlogon.exe 2732 winlogon.exe 812 iexplore.exe 812 iexplore.exe 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2900 1960 3ec279fc2a579ae0bdd2813cb5167cc3.exe 28 PID 1960 wrote to memory of 2900 1960 3ec279fc2a579ae0bdd2813cb5167cc3.exe 28 PID 1960 wrote to memory of 2900 1960 3ec279fc2a579ae0bdd2813cb5167cc3.exe 28 PID 1960 wrote to memory of 2900 1960 3ec279fc2a579ae0bdd2813cb5167cc3.exe 28 PID 2900 wrote to memory of 2732 2900 winlogon.exe 30 PID 2900 wrote to memory of 2732 2900 winlogon.exe 30 PID 2900 wrote to memory of 2732 2900 winlogon.exe 30 PID 2900 wrote to memory of 2732 2900 winlogon.exe 30 PID 2900 wrote to memory of 2732 2900 winlogon.exe 30 PID 2900 wrote to memory of 2732 2900 winlogon.exe 30 PID 2900 wrote to memory of 2732 2900 winlogon.exe 30 PID 2900 wrote to memory of 2732 2900 winlogon.exe 30 PID 2900 wrote to memory of 2732 2900 winlogon.exe 30 PID 812 wrote to memory of 1044 812 iexplore.exe 33 PID 812 wrote to memory of 1044 812 iexplore.exe 33 PID 812 wrote to memory of 1044 812 iexplore.exe 33 PID 812 wrote to memory of 1044 812 iexplore.exe 33 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ec279fc2a579ae0bdd2813cb5167cc3.exe"C:\Users\Admin\AppData\Local\Temp\3ec279fc2a579ae0bdd2813cb5167cc3.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2732
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5470fa1ebacbc3f47fa6731c47ac1b431
SHA133a46a3f62dd57d92b3791e178b61d2e0ffce84e
SHA2561ce473ab29b5663054358833b5231da71a172486426c8b68dfd865eca4efacf4
SHA512f9a5b589e8eaf0f091d5251f24dde633d03930ce1b84f021ecdba723401c1207fc3034c4730f095384aeb51fe9cd92fbc26de41a5dc8f8e8aeb37546f7e904c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8a0925ffb6756d8209acb7c871abdcd
SHA1d216d85800e142fef8c019042930b4feb9193fe1
SHA256f0e8ce69e43c1206908d56a6bbc60485517e6fa918cdd5e386feb83508b28b9e
SHA51258c47726e9fdb4b32a4f2222ef9a1081ff2f2512c666616523e8b2d010b2e58f54997b99d1b6548516945d65e3f23d459feee07e8f08b6826a941978219c0df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532d176042dc19031170572ff6ed984e1
SHA1b1da8de6531a9ff79b006873f735ccf4429fb2b8
SHA256c2a290a8bd31ed3a0285a0d5986455b16fa34fee3e83bb639ecb8ec7ef131372
SHA512d01f5446262250f548c15a57d7e4d35957d0736c38a51e2570b073a4bd21683b459f85c372c2f65ac464e0ac50f14cff4afc290b2891c61879202343d0d12090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3d00e94247b3f3d0b1c149b2ccc3f7a
SHA19bd08d710803f0d9e1e3700b7a5bcaebd8fef02a
SHA2563ae9fc6c98c1761a656bbd234e28b461272b6d04de3d9cbbbd6122578200839f
SHA512b1f1e1d65c4ea33f22b11c8cc6d51f60df1ea7a8cc7bc9e840ca41dd0efee0f47647e250550b3f10a5ace785f7ae335e0dc817c3a70761ea7dde45ee7a3091c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c5219154e2fb22f6dcc502584ce26a
SHA1d8eb5128c4995a524c99604f3110e7f334fe5498
SHA25601bb9fbbed3a494cf5a5608d8910210cb51ea23dfa44311a49c4311c8168694a
SHA512774983269aa2b4111e24ece4f7505acce16990199588023998c937842860927d0b1a98a2faedad02e04068935c1374bcfbf331d1f1ec2d32cc965acb7d2fc7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591640a1d9ad3ff45f3176c631ed8ea3a
SHA1d46ff0a8b58bede1f5bea12520ddb4d0f2590312
SHA2561925ddc6f44f9b3e0e4bb4a1f86738059aab3c725d637508a5824244d733297d
SHA512ac1933a9bfdd5ba61527115b852289b544150270566b2646d97a28216633c9b5b69f4e63662b0951f35cdb34825a4a475ca0b716c50f1373a1e5f879585f3bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bd5654975115c9d442a133f78297d29
SHA1b07f82f84e9a09f69613c583ef7ca1d64be3470f
SHA2562e01b3c7a214fc44f6a70ca9325f91c5da770db57d09288c9c17450c374b18ff
SHA512df0f23f7b5aebca34d25166b1d71e3c05ff24d7f64ef96aac0a6778f1f92f1c5f36b0260fde08019ffb4c5534e72f63b025e3c1566fbc400fdd77e3ec00a75a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5637b74d8c2b1d0a093e01478083450dc
SHA19bef7c5dc9417753f20c327606018a3672cbc23a
SHA256bb8ea5d448b2e2917727292017a5a2d3fc0d192841e1ec9374d3044e56edfaed
SHA512bd095716e1430cd765a51308cb231ee3a2258aeef526f1a622a9878ff7def7bcbf8a1876cfa379ee5f62c16431d0e3e758d4fb94c0657c785f302c0e14be0448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c6e4732110514bb08dfce555be2d666
SHA178287df325b3a713d52fc2774bdaeb989ee0f35a
SHA2569c8b05ec59aeda5527c52559962e466efca5c1b1ea5c6bab10dbf37bd7cb3039
SHA5128c2cd9ed70aab7690038a70c645bda890d7f6fcdd3ddacdfd8b73af4daa65ad81aa8519b83a0430e429a4c9e896dcb90311458e70fd58155afb6ddf12ddf82c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b053b150dab07fc028455460218dbe44
SHA1ef82cff700756609064bbb8667bb0fc9ddb49b68
SHA2560b8a0d426420bd288cbe4c5b9ef7632a6e360de7ae7ab9222c223842ec32bb2f
SHA5127f7afd9d8a6c650111ce6b255a3f5a1392bc55c49adf27d955733ade2ed887be99a0f9bac5012293c6336235abeb4761dc1876251c9d351bb923c2c51726a284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578aa0b9e789a10a2bbe6ddd4361e771d
SHA122bc3fbbc96a2d3322cf3e88d6f3cbf9e1ac848c
SHA256102f29bba4ec2f137cc4a13665017ba52f8a895ebbd533371f436e02bd8e0774
SHA51244bfbb248a810f4a05daf541113f34f2d8c9733bc33bcac35e85a2696a4e00ae3ae8f60a372c3d35db5ee0883e6c41037288eba20a59257f46b7556a8f32bbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7804804d0fa5ab3b72e6e04d67ad111
SHA18825e8b7cefe4a1028d3661f065ceaad442b74a9
SHA256a0e1f207bf60597a0e5fb03472bc3ec33bff653d12ba221d7e12e266b9909160
SHA512c088177a903061b15772cb222ed9c08e03db0df6db39eb9ae918c6830ab10705f0246e32423056139c850c84859ae23952a25da45a9b1e0b488e5a414fe37a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c2c16deb658fd93bb52f3195d53fcd2
SHA1b633cf913cd9fe6c30dde5f54cde6f0fdb8f0e56
SHA256d4f0e7c6801201d3305f6a8bcdeabac69f541622689dd3cab8c6f3f2253a7c61
SHA512d178c0a30c64228d741545e33fd19fc90e3a1f44ea0ecf75132f382dc8f45ea813d1a54662b7431711e8c4e1460c088aae8a4647b6ad4d20e14d773af79f0f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f09118e680d0947e1197bc4c22bd6d4
SHA1866e6268f0879e53bcf2b564cb8d441555cd33dc
SHA256fe118b067946d3a713c6bc59b56a58c4018a734ca06d88c542d20dda57bcc5c1
SHA5128438c3f02cbeb019ca6807936ca80a9015dba61f7cb458f6d310c760cf79de043cb98dc65fde2e0d6fa917bef6d15542460eff0fb7ece8bcacd2d7ca9f4a998f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dea908725e40420d010eb01611b4e4c
SHA1f4fae92353fb0ddc775fc2bf96249b7f9391018b
SHA25631b122eed850b844dc8f0a687568218d9f8344475d90e54faa4cd2875a4f5daa
SHA512a73be7e3c71acabc1f1a70585f06e5de577145d0003b4866c43b7f90796aa4f76bc655bf9f6bf9beab2929e0c97dab98ead90b209deab737d88029acde0f7645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d99d724464c12fa013256b2a89b2ba6b
SHA126213974c9d487786b77f41e10409ceb51d6c091
SHA2563d19510eadec32691aff69d7d6bc76a39a5666bb5ccff9d8357b28710c9d191d
SHA5121c49e71ea1d4f9ae74a0a6977ad92405863fbcbed06a3467560f608e9be63b62ffe0b967b2d81b5ed02bd18f794a899792efe0fbb0448004c797bc00d4246e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50986932ee90df971e768579235406a51
SHA10e52ae32134138eee5f79dff51667c11897273d2
SHA256750dd22b2f07f2ffda70c9866eb43f62296e255c40108a1236f246009236de8e
SHA512a473b4903f04d6817879d76cf4b383057151ccff6d474c8905376b22e14ae81bd30961d3c3b1d9147c7781948d31cc6a7c268037de32b3fd3507d92cf84f620b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547bec4c225acae48d818632b3b6ed340
SHA12de861869e819c3e3f90aa8a87fcac9ebf8f4c80
SHA2565d774005543c19f3521c921c6608baa04142b7fe9af018e85f11e6c4a57a255a
SHA5129f4b9381bddb197907d5d75d0baaa801f9a1d9e34562f9541a9cae367d7bb3de674c9638ce91db897de23e7a6200a805795204dffad62cf45811700315bed0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533df00d2beea3d991f2562e58486a0cd
SHA1f1fcd70f3da09075e59c0aaf94131b5bfef4a569
SHA256b172ab1adde171dfa5d04dde6b0c589a53377c09ca8cbf7f5afe1443bec6a649
SHA512ae77faff38e316471c4e7bb4adbec599ab75c93c8748dd007fded9e34a41f827245680df4185966e26665ecbf600b0d0f9a748a8e751474e5086a8eefbd0451d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563bf3eca7cb84e56cf6b48ff0020d699
SHA111bd24fbc6a5a1a116a5eda70775119c870a7bce
SHA256a67e802ab9f430d76966cab804f1d4a8498ad32442426a14888acdd20c9f6cf3
SHA512c36e2bcbee994e1a4923d7f6f2d1f6862348bb6e7f7e12ead4d0474183a3b8fe0ca223ac002cdd0e573ce6d1d5aa1bc20e9949188e38b63b35771ab0b08b5054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5194d2b1ef893bc8d36696432cc05fcdf
SHA14fb3fe61fceed9690d0d0c96b5619d2eaa12b462
SHA256ad805e9840ba3c2bb84bb2fbf07a64b8058e7447bb58f1f928b10fc81daba338
SHA51226fc0de3a4d6ed663ad6d3ce6b31fc15ab635a9756f48e7f11b9ebceffac63a10fdc17128b0f8e60f478cb965934824a3d9185174eae7eeffb1646268701a58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9ab0ff6442bd33a5dd2b68a57682665
SHA116baa378a839aead1121ecb7581080e379289401
SHA256b4e039690be154a30030ba44b8dba6ddda539fc55de0575112ec1d6b5d5dda22
SHA512a516f5176e46be3007f4de5d78e26b7d2f057470acbfa9f80664b1d7868e2a1714e66fb09165486873662316793aa06e4962cdaf07eb0f54b5fea6321132c07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2c1a103214338aa45b52024f5df2df3
SHA197d754443c1da75b9477bce971d7949d3a6248b7
SHA256258e41f591c8f5fa0aacbc925310743e4eef81a5ae691e60fa82f66eaea52dac
SHA512ef91046d4f986a740afa34cd3e8ca08aa561bd09ff707b2be0d5ea1fb695703dd3533d7e2cbb3c54251e98832491ce3caf9e3a04105b260f6f6e623cb4e483f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553e8ece5b3472ce9741b1422989ca8ff
SHA12e089e4bec16cd36efc18741ca30e92d9e366cb5
SHA256360ea48bd2abdcc4f216982629193228bae0ab1c75ea0b8a01f27438b5d3ceb5
SHA512d7644dc7387bab0b5bc5e6d0baf3993735cc8a4bc94e89cba65c5c4ab1fa5be508d383677e8f31ecac45164abb40392cad9933d5252fde3b328d2e6753b8e643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524bbb755423db7d605e0f0d8e94b1da5
SHA113360b6ec6a58987b86221937004a4cb3126413b
SHA256f1800ad8f0c7073a4077a34a742b8b8a48440e72e84b6590221e96ce17760578
SHA512e90554521fec70ff38acb1efdb04e5ab1c01f119c32d1f77f5e0a46b1654f9b6b1ef20c655d1e60ae630032b3cfbf350ebe748e8bcb65643fa4ea8484a829763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d1ee2379df0aec88616d1885c953fa2
SHA18cad528643e78ed2e6b4d59d43ac508c136bf25b
SHA256f74b86b37d072b1245efbc660c6905a4a2994c2fb2b6e6e1f2dcd2050c9ae7f1
SHA512fe466b0746f8a993636c705867e9d007daf8634e8373e177c27597ac234a8210241a7be3c7b16cf130b71189d81b6f6ba12a9d945e56ebd63f15003a79f836aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d09292d319d5f619d34a26f8787e65a
SHA177d76b11d5d6b073c395fdd3e56b3d5cc055e894
SHA256d1f17d3f849ebb8fb9ee919ae6cc00e666d992bd695d7addd4b65128edf10173
SHA5127eb073c802cb16b2765d808673a814487ac9407a33ace35f0ed790d6bd86b471879e4c5468fcc872096336a160b4962847c21aa7fcff90b1be6b52f3f50c647a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c8ee127f1f1a0e6cce02bd4ffdc0cbb
SHA14058916358832bedf3a100b587d218f3d1aff87c
SHA256373355e17aba11eb31704c27977201c4244214109bbf569e1f75ba52636c89f7
SHA512ce67d243e60091183ed7d5c686b9cc255ef7a350363547b71c43e341a74310bc694d1a5d62a996ffa75e43f3060d31eb505484ce57d3e5918f5a45f778aba3eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5587843e2666835430f4ca9a0d575938d
SHA139cc0967575f133d8c82b9b31f3e634aa21e8f99
SHA25641b2369bf4b1a5a1967e763b8a4d6319ab33839af291d339cefa5dddce7f4d7c
SHA51247f2c51847a7fc4576cf24cd4f4e9a3a8651fe14c61d199e748e854366acaaba57b727a011db753773de33bf17b1fc0f54c9e25860dfbbeca9b87934604dce62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ee8660465167403c2bbb36044517a04
SHA121baa94af7a061ee63b4bdbd6e060c3e52dc48ad
SHA256a6ae07eec7b64d8f129707cf347bed90c83f995aaac1faf8d9adfce4e67683c2
SHA512d32d1ac10d25df963e5feebfb6dc874eb66c5f8d5c5a578cac146a977ce419b52f91e06405360f79bd30c5132b96d85837c92fc4e38a1a0bd0e30a19549c4b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5651ce67dd0af357936934165e309484d
SHA1dbe3274ca5b20885a06249d2f267ce5ae90006bd
SHA2568ee03cec3b633efb2fcba21b537a7a12795be2203653537dc353fcccd2c41258
SHA512120550dee647b69bb7f68f0e7773c1208823283b482f33a439efac70282888940b7d183b0c2e89e7c5b71dfccece4cc0952abe42caeb344faf94540fa847b744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e9d7ead7736be174dfd0743acb66e07
SHA1be0193d47993a3e76439e36c149ce78a6cf07155
SHA2567f1f6a3a75eb6ff67ab9a647824fa2e8bd23dcf09d41e52374acaf40450ad47e
SHA512bc0ec894199247770955d76d42f36f8df91fc413bba9b2c0c89b1c5fadcbccf8afb8a7608a320050a94d8dd59b49ed72bed669791235635517ed2b0e9398b4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a803b1e41cd370e94082f2ffe493faca
SHA1bf360596cd8ab4b51031ecf1abfad018206da5e9
SHA256b59569aa0ce7211f47e8920c42a1b88382fa9e07f94e31045096dd3b433591ee
SHA5128346df317efbd5dbb0ad3659a8247103c113ec92c58f21bb62093d5eb8b8b6e6f0b3f67f4fe331fa800ee688c8c7d1bd838ff5955fbd0141ecc0dbe8e658e6d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be28dff3e2a22f179cf53b4cc7201778
SHA117c245c4b3b7ca97b2dee3d7baca239ba5e7084d
SHA256cb13a4615588fd3656e2299f1a95ffe3398460094545b1dd12cd84b28a9f9426
SHA512ab2f3019deca8e1608ccdd5405a9abc21373238fc542b356a497f6c6cf9e5e59b47b9766251d58511157bea9b957c531a9a91c7ba792e4aaf95caa0e1f636908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c8521fd31ebcd0facf2f2d5377e319a
SHA13cc7d4ef5d165fbcca8bb508d216a8e3040a4830
SHA256125c711705e8b1811674be34f5895dc411e5eb3b4e176150f7b38cfc0386b2cd
SHA512c81a07a305eb1aaba8a97568b59b71a8391db7fc5874ac9d07c8bbed4cac635bb537aefdff8de26b5d922f55be33121196d951d2b45007bad2566ced616b5dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534b7d5ac0c05aa3340dc4456a1a16be9
SHA1d0830c39c8f86595ba93341a75cfe4e219bb0145
SHA2561c2c3193864f7f822a92f93ac12479052be29a0adc43f1cf35d1c63471c19a0c
SHA51289ce4b7514442194af8d657bf7412a141d86cc288a5cde4c0291f315ca6ef1dbd96fac8500395393eaad93a992a9a5033b57ec4baba7df797f74f97f11d82e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fca3ca7953f24a097b0acbd7636b2131
SHA1af49d5a58f66b030877c50ee77aefbc6b6696085
SHA25624dfecd52abc768176165702bdccb53273b87cb99ce18a0b7455846f62345ad6
SHA512bc19e9672b1d82e467a71c1b2521d78d33025aee498f96458776b57adaa36dd689bd4f8a4881f22b304d9f66c80c5f4ca2e0ac875977df6c906c0bf3de919d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fea9ff83f8f327e6b069ddc85b2ef8b2
SHA16fa5828af3f544b4dd98a21ca9e9e6aaf4120a06
SHA256b25985d7c9d55b5e5da6537c055371e9347aba33adc87676a7116e1e313a2930
SHA51202a0c6d64a220b17b52bcf501bd891273fb7d6484139d26c5886e712928c921fd99fceaf0b78bc82d79f800add18447e7036e6d9bca9e5529cdb02798d4881d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565886d93a437f0d36d3861be0db598d0
SHA12c66f57bcc4ccbb67663d16a098b9769827b49ba
SHA25605cc501ad12fbe794fa4a939dd21a7befa59231666f84b0045ee00e1f5660e26
SHA512834357f14ff3eae20be16e3df6848dfe6b442d7eadb90065e1134b5d45943f593b21b00305e5634812562b0b8eb56e43fe1b72559a72cd758fa485a41af8b7cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efcf77a5440f1419b0b6ac9e6402fa33
SHA1a06565b427cea36135dbf72465d4f478706db1cf
SHA256b55e6e78bf3038d7020ccebade2a6c97c39cc40db279bd5bfe74552309872791
SHA5122c27199879920bf9c528d8537f15281acc7f4740b94a97878ae131be1751f2895fe425d81ce8a009e0d47e6f2de497bf7afabe6c1a56d2aacb6f45bb00853576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55041f29798aa739920766183b1e25f92
SHA1882b6696e3d1b78ba90b045451ce8d9c1ffa22a9
SHA256e4b0b8089205ab7ecb8a8d880e7fd1b2503d67e047f3c8f8901ab0b1819a1ca9
SHA5126a5080ec9d07e70e815fdb648632824dba1b760982b80798f1ed290ab22543fd58486e4c7c90e86b8005c836eb95468b14d741ef91604c07d1fad023124748eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa9335a8f57760540d8493a06dcadc90
SHA10ba4eb87190182af3a4b5403c2f81bd577fd407e
SHA256611a6376765530e4a85dda0dbb3e20aac0adf8ac7a9d6a88fe7f2b56c05b4908
SHA512978d9292d321173133af85e053a1fccbc2a0aa1b6ffbcac6061dffd5467fc41d494b811b5d2d61a867ada6ac67ac2a370dab657027e76ab2ce1b359161e51171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532dd1aad10d4bd3055e9b1956ecb700e
SHA1c40b524db13f712bd8fbee25588dce9068e290b4
SHA25652e7efd4c6ee713630f96fbc7a1b5e13ec5117af8182d9333dd80b284b99b7c4
SHA5120d40d5457b67a4dd7210d1fbfff1d1d1befe1f7284a9ac83ff0df20f3d77f8d1bd4a67b788ce4cf903fc459c9fb38a43fbf6b01c445378683ceb8171cb1fa614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d892afbaaac820641b6a5cc48866d3b6
SHA1d61add40b78711f00cfb8789f12d21bc4360bfc5
SHA256577c95cb020b0ff945d93fe2c9cebc5f009893194d298186789e1baa33972681
SHA512f526d412cc611c2987601febdfe7c969ca0f3ccd9fea6887af6110508add9c410118d3e5c90d6ea27e07cb8318eb80c433223bc762eae1519f374006a258339c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516f355f5dd01205e71b26452e0314f4b
SHA155cf5861347555ab16fe4c534f3f65a8086b64be
SHA25615a39ae892df41a407e871fdcd6a98d32a8f31c4a012dee0aaee3ef596f0436e
SHA512513024e881217e9987568fc9f74f6bd66708378432f238af89db7e9d62f9e7a5e82756c7bdaf9e7a58f878c78314abee404c0f0c40eec020923ab117eaa02bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c80c6d4d7fbbbbfb9005c4ab1e019cfc
SHA16bac5a0fa80722dc3d62655b1c4b57e03be5f6dc
SHA25698044a203ca775ee4fdf75c62e9fc1961ec4b9d1823ad55173559541ce1e8e9a
SHA5121d86255c9c331258789dec78b9eeca1d3e9d1f1efd27aacc1a19071fd88c37b35c9dd3a7565c02a3782631632ce5a593aea4eefae8faebb4c9d493f3d4dcdde5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1bfef4ffba2001f1fcda881c532209c
SHA1f3382e186bd163109428bbe8ca5e2370b127e8e1
SHA2567c44445c761c393f22be28e3a5d1afa3983a852ed4265cea29c01047a909d5b6
SHA512ae42b09cf7f1c7807e88b551cf3b42144a6fa4b2692b146c2c45f141de2fa5ce00ee3592e076a443fa7099c5a6e4ca517dc45076adfe452525e3c6dec5126a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2b1662608dc98bcabf13d1090a5deda
SHA158d589fcece01c6b66f16f7808df8f2cf8b76c12
SHA2565a90c4d9dbfe2c9230df20e1813725dad41800ae5e56883daf32dcff3ee24b42
SHA5129ea447bc0f37850354047ca84331010791f30b103ede6f39469c9ce4f88eb064450f54755836fcf3f948667ed45ee556577062bf76e0994b3a8f2eddaf05a75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bea37cb9731a6405cac1cc4431b12bb0
SHA104b5c327a0782f52bb2239d22de2bd2e8bd3a4f6
SHA2568387847fdf19bdf8fa3e4d529dd8bf2c731898cc69306ecb52b485c31af7873e
SHA5122c5fc8714fe77376b026899a71a45b6e433ba50580c5b59c0a9dec17f12e3af1fba9146940a1c69c5126eb5c07b0f6bb4fb99b370e895377bc238f8422ce52d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaa94257de53c86a0286be28cadad75b
SHA1cc2c820390df5072847706b4443b1771a991935c
SHA256b0904d443f3ee5a43bf953f87ccf759056bfeaa7b6b39ad4a82d52394e4b8479
SHA5128b21a4989b27a6fdb9c94f9032c58db86c9a05a9e40be5e3c5c667dbdf7a1d07ce35ee23d0da66bc346e9682e69fd705f2d6bc878d2a89f4980dd94ed12a1df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f42744154093182aa8aa80eca6f2c380
SHA1dab9b548212f3d44e9b4c6a7e8ec5255edae2fc0
SHA256d724617c36e355d9d476d5777410e836a869c409b1aa17a6e5fee5ca589797af
SHA5129ca6befe7acb081dd7d40e3ef226f64c65a2c07fb97b3d57de97915c0fc4c52bf2c668e1d7f3846553bcacde47028157742dd2bcb791e6981b71e713e339f3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5327b21a6e1395d7bc2ff8e333a9cac46
SHA1803c27c71c3f3e792ce9af8db5e9c8e23d3a8fed
SHA256cc37203e29b36203dfe992545264227a4888eb33dbd462e10466821e9d0f293e
SHA512e4b9bff8c2ed4e385a6da8083c9afc16d21a1335d2102db3a1537f63b01bf0f3d7300cc008556c88adeb66ae5d2b1caaaff023a4f9b920a5d0d9b2900f106894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fec02b5cc70a3c48066f96a9e83c34b
SHA1d74be9a5085ee77799b59cd18611823d1ee45580
SHA2561eadff0de2727215c80aeac34fc86acd555cfcb1eb7fd83563b47e51dd0221e3
SHA5123c0ce0fe1b4d6f078ee9e085811b23bac0251cbb94723a3705a8037c51e18ffc32ddcf3d51bc79a38f8fdf7407be24815d8c6f9d3aa452f4f5ab1aadf03586d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b1d90259573572cb11d5cc3c0aaa2b
SHA164d8f5d40b71ea0008b99885b21a39daee45c8df
SHA2569c6984208a1507b4c061d897bf684e2f87f288a48cfdc09ef7845f0b0b03cec7
SHA5125ca0083af9cb1a1143201a09183b8fee32e529cae79f258b19a85c66d419397f135aa62c6c3a57e2cd41c18928b08e1dce8a9afd962b855bd64350b8ec087f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5bf3f972a0fd433e78738d40cc2fb2541
SHA148f2a6eda491fc0406161b488f72310f482a41d9
SHA256792fc7d981f5bc818bd91e949d7656f913a9f52c81576d5790481237b0fb3c66
SHA5124ce7bbeae8407524527f4549b7c8ce5c4d9e9e85c5730a22bda078ffe71ab320567d4f15dc4c8b938c7f497bbd74d32730109218a65051d5665020b8f4d91d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD532ecec1ba69b11c962d9e7a568eb6981
SHA1b3880d4e13741213dd7df5ab8da8434f5e1043a3
SHA256b984cc6a60c9c2e6f776bb226cab97b5ac0a49343db853386f366aa63419188e
SHA512a1e02d9d18c82ba43eae00d49fe79ab38144634e69ab99147e37d81081b29a80391aa9a167b14ecab74c3694436a658edcb7c4c4c09f84cb960954c1cf95046d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
229B
MD57a3a08590db6746090defc506de9a5d0
SHA154483d74d125903b37ea1f7290b2df5b155fa849
SHA256b432559f6f96a1dd423ced5f320f0459216282c83a76c3a979f46229715e70b7
SHA512afac71c66ed00b15ad7a40de4081f949682eefef0c9937cd1737a9701ac60ccbda67c3df9e4dc91bcc233f26bb3422bd10572c15996deae22a74f3ce59de6dc0
-
Filesize
2KB
MD5bb3557c8566bb40a9083dee2b9c0cbb6
SHA1378e3fb2f74a1978d55d62d03c70e883a72705d6
SHA256a6018777901fc4380d4ac82977e67176fff4c8a03b174674b4b2853cc2909b40
SHA5127e155655224a466405ef58390238332ae996ce4f07f6996f92450672daa5260af5df98ed099532f062de668b99b7b107c0766bacc86c80e073a70c1be8f4aead
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\60WXA9VP\browser-bar[1].png
Filesize715B
MD5226dcb8f6144bdaafdfbd8f2f354be64
SHA13785cc5b3bf52f8e398177b0ff1020b24aa86b8c
SHA2568c873472f4925d5d47521db4d52532d2983e9cb1bde8b43143a6cc6db56c35db
SHA512ed898b12c4895f7aceaab443c1071e6376db71b4dfdbd769f5f3be71d562438a18b5e5dc36dd7cc610926e380603a894b2e81df4302680c736a412bfd3360d3a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\60WXA9VP\recaptcha__en[1].js
Filesize502KB
MD537c6af40dd48a63fcc1be84eaaf44f05
SHA11d708ace806d9e78a21f2a5f89424372e249f718
SHA256daf20b4dbc2ee9cc700e99c7be570105ecaf649d9c044adb62a2098cf4662d24
SHA512a159bf35fc7f6efdbe911b2f24019dca5907db8cf9ba516bf18e3a228009055bcd9b26a3486823d56eacc391a3e0cc4ae917607bd95a3ad2f02676430de03e07
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PV6WXU5J\cf.errors[1].css
Filesize23KB
MD5a1cedc21f16b5a97114857154fab35e9
SHA195e9890a15a4f7f94f7f19d2c297e4b07503c526
SHA2561103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
SHA51200e857331dce66901120b042a254e5af5135364f718da56110a4744f3e64f9b61ba0b877013af8398a0f865c7bde6ad2f87b3c9d2d828651806409cba57aa34e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PV6WXU5J\domain_profile[1].htm
Filesize41KB
MD5c27eaf66833377c9913dbd5027a1e447
SHA117927f691270553918c51d89db42263a251dce34
SHA25609b935878f3345f1f6ffa5ffc57ae4d0bf41753a7d3f6c45f114d30fd212ff3e
SHA51213322ab84e7f821f6d243e3e51171c86b290457691e442a16e54e1681f03f349150579f385fa709f80b0ba0795c9327e2c93096f51ca5333da4f5d2ec3d42dc1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X7R3AAPF\cf-no-screenshot-error[1].png
Filesize3KB
MD50d768cbc261841d3affc933b9ac3130e
SHA1aff136a4c761e1df1ada7e5d9a6ed0ebea74a4b7
SHA2561c53772285052e52bb7c12ad46a85a55747ed7bf66963fe1993fcef91ff5b0d0
SHA512ce5b1bbb8cf6b0c3d1fa146d1700db2300abd6f2bdbe43ecaac6aebc911be6e1bcd2f8c6704a2cfa67bbb45598793ddec017e05c2c37ce387293aae08e7c342f
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
857KB
MD53ec279fc2a579ae0bdd2813cb5167cc3
SHA1496d3fa9266b08185f611b5ee7dd9736528d731e
SHA25681c1907c84633a2113d33b543459669151d741ebe6b535e50677953b28bc31e6
SHA512ae848b72ba3830958c5380fa9eb228b2f4620735b65bbf0660cce323c85f21fed968ae60f92442fb69f0205a5af59a66568239ad7e63416b1bb540f2202984d3