Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
7470d5872f941b3b292b1680e6e15cb0.exe
Resource
win7-20231215-en
General
-
Target
7470d5872f941b3b292b1680e6e15cb0.exe
-
Size
60KB
-
MD5
7470d5872f941b3b292b1680e6e15cb0
-
SHA1
06965eadb79740cad6c93652df13b61b5e140dbd
-
SHA256
92c1632863faa07bba110f15ba81148d1b0835636c41037b41cdb75ddee33e47
-
SHA512
84e2d14824cdff08a0420be40800205f643c3db76ff89987fcf5ba5bdcfef8a4dec9ccc640055e000d21c64f3550fb94097acc266c59e91fc2bad336464e3eda
-
SSDEEP
1536:ooglLwBJgfDCW5TMavqjBKXi2le5CP60PwfMMPnouy8:oogx4JDWdMoqjV7AP6wg/fout
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-26653367" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-81532394" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-13037276" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-16350143" winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alogserv.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pspf.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tmntsrv.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zatutor.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taumon.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlh.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WINWORD.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_findviru.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agentsvr.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ahnsd.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\frw.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mrflux.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\neowatchlog.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwinst4.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qserver.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vfsetup.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fact.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HelpPane.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\trjscan.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HiJackThis.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ACCICONS.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aupdate.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navrunr.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavsched.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcfwallicon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\amon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\findviru.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vscan40.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgserv.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav7win.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Diskmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BullGuard.exe winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSQRY32.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkpop.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapsvc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rulaunch.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symtray.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-wrp-421-en-win.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ppvstop.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winmgm32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmias.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SmitfraudFix.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\padmin.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sbserv.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ave32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupd32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bs120.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fp-win_trial.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fssm32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lockdown2000.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tracert.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cclaw.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EXCELCNV.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nisum.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notstart.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwtool16.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsisetup.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\swxcacls.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe winlogon.exe -
Executes dropped EXE 2 IoCs
pid Process 2208 winlogon.exe 2868 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 2140 7470d5872f941b3b292b1680e6e15cb0.exe 2140 7470d5872f941b3b292b1680e6e15cb0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2868-19-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-22-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-24-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-1225-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-2040-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-2053-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-2067-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-2075-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-2097-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-2575-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-2577-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-2579-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-2597-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-2604-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-2608-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2868-2610-0x0000000000400000-0x000000000042B000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\cval = "1" winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\F454741525656435 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\F454741525656435 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2208 set thread context of 2868 2208 winlogon.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67B2E481-BB6B-11EE-88A2-EEC5CD00071E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412339915" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Local Page = "http://606m6mw0qbl9k89.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger = "Yes" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://rg235wn9pljc85l.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "25" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" winlogon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://7p21wgt9xq2nxw9.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://jo4e26g731p39k1.directorio-w.com" winlogon.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "1" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Local Page = "http://1zf367wox0l4m8z.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://8dh17306i3b96h8.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "25" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000000c509bfa97df98c45e1f308e55fa431489c42372abc6db2e985502f6a7487242000000000e8000000002000020000000aaacb43abecfde8ed7ea84ff5ee29f6eada8c96d4e68f0fcad45eda6e8f1944c200000006bafc20af2f92a5ef57b8f80852b3cfabe962f0e67a67e4ae12bf5c944398d5c400000006fc37e786da5dd8fd8d3b38a8814bd1b9dee08afcff766b5ee727d6a5ce3e0b04132a0f5753b301239f717d37f5bd0982b3be5c463c053eaa5c4b3f531d089d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://dm4y9en0w00ew2d.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://p6p993th95l8y8m.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Download winlogon.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0861a32784fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://7364bmg9ekdq9pa.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://hlq454959k9qb65.directorio-w.com" winlogon.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe 2868 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 2868 winlogon.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2140 7470d5872f941b3b292b1680e6e15cb0.exe 2208 winlogon.exe 2868 winlogon.exe 2680 iexplore.exe 2680 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2680 iexplore.exe 2680 iexplore.exe 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2208 2140 7470d5872f941b3b292b1680e6e15cb0.exe 28 PID 2140 wrote to memory of 2208 2140 7470d5872f941b3b292b1680e6e15cb0.exe 28 PID 2140 wrote to memory of 2208 2140 7470d5872f941b3b292b1680e6e15cb0.exe 28 PID 2140 wrote to memory of 2208 2140 7470d5872f941b3b292b1680e6e15cb0.exe 28 PID 2208 wrote to memory of 2868 2208 winlogon.exe 30 PID 2208 wrote to memory of 2868 2208 winlogon.exe 30 PID 2208 wrote to memory of 2868 2208 winlogon.exe 30 PID 2208 wrote to memory of 2868 2208 winlogon.exe 30 PID 2208 wrote to memory of 2868 2208 winlogon.exe 30 PID 2208 wrote to memory of 2868 2208 winlogon.exe 30 PID 2208 wrote to memory of 2868 2208 winlogon.exe 30 PID 2208 wrote to memory of 2868 2208 winlogon.exe 30 PID 2208 wrote to memory of 2868 2208 winlogon.exe 30 PID 2680 wrote to memory of 2608 2680 iexplore.exe 32 PID 2680 wrote to memory of 2608 2680 iexplore.exe 32 PID 2680 wrote to memory of 2608 2680 iexplore.exe 32 PID 2680 wrote to memory of 2608 2680 iexplore.exe 32 PID 2680 wrote to memory of 1952 2680 iexplore.exe 39 PID 2680 wrote to memory of 1952 2680 iexplore.exe 39 PID 2680 wrote to memory of 1952 2680 iexplore.exe 39 PID 2680 wrote to memory of 1952 2680 iexplore.exe 39 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7470d5872f941b3b292b1680e6e15cb0.exe"C:\Users\Admin\AppData\Local\Temp\7470d5872f941b3b292b1680e6e15cb0.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2868
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:406553 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD54c8f0d1fd5142e86be7908a7e625b4d2
SHA1c446c20f4271b92c3bc60ed621cadeff27a67bf8
SHA256ec5a02fc5bf94261e5aff87b9c6c6cd7bd41b9d1b597550edeae52f83a821e32
SHA512aa81184f54e38982f28a53e3dfa82f9c880c6857faa709204a88f724369b8805adad50fd5913f011f91f2976620834ecc3e84dded0ef07aabd41563f0bb4e42a
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f8adabbdb5cf40b54fc48bbfc765ac47
SHA1cf44861b6a6c1b60fbfc2e22294c08f3b7636092
SHA2560045481c6e46d4e231effc0dcc68962f58642df5364fd410cd61b69f5dd47dd4
SHA512b1196944cb09e7e08b156e076f0e4d4c01dcd9d514df34f61083763930c75c4df5a49506e8fdb6b0fa3add37f09826134440e75ed74901306ed26227287e22b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD592940225ed867b7869da652592ac6f81
SHA158e59a07fa4d13626bec7e1215e8047901c4e847
SHA256d824652cf800512d3a5ab004aadbd9fd4e05b54dcbd1987417e2c977d4ea0e42
SHA5121003dcdeb32c11b9575194d88772df4d7ef77c14bc0633dc3142ea46a2b8736624d2058cb95e50ed411e30615e704c2edd85a58878e9d30e8fe2aed5867b4b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a590b2cf73455d31ec7da31be656168
SHA170b0c4b72ff77d3c622a33e35e417060977ab19b
SHA25618a8c7259b14b2c27f7d72c023d7ccd1d72ff46573f30da1704b3622d9c50399
SHA51200c828159b88893c20cb7006c03034834306bbd7bc1b93423a263c0513f01c9c09e5b768cbf2b7115e497403069da72a5da5ead77260036bcb2319cad0ab3d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6ab91154fc999ca876e3dc9baef6b97
SHA1ce1429ac6468c5512c003e941767e47bf13e5bb7
SHA25639a9841d2e4b65a3c454704ba0324b6553b5cceabebc137a1d8f247f204586b7
SHA512f5271c9d4101406ca443c9561dd5a6b56217ee475964dda47cf9aacda647e0470f93de9942ccea09bdf62c63851981506f3198c6abc04a773e2ffe64f152cc07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55baeded2fe760eac76816315694173db
SHA10d29067c9ce3f021e620efb7179c32d750a8b117
SHA256a327a992e6da4aea09510e4834186bee97f71059ae21cbb604c34e162b5e0a73
SHA512171535fc249d8d0a640a804e75e62febf07b4af31b08d5070cb8acf11eb745f77381db26e2b93877f5de882747c8f9193ff6009eb8e840cd37be6aceec752af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543b187bd8092d04996e46c5a5018aac5
SHA1481e1b1cfb91fe05ecf4eb04a0652d1f52cdb369
SHA256ee7102d449592a99938781037eebcd98fe7eeeed46f3bbc473e650cae3ce08c8
SHA5126e16b82c6346a9558af8b43971f98a6d5edb108f7295755cfe37a82d57f72f9fbf6ce8d3b6459305e8cc923a2688ad557b1bd647483cbf57adf64df2576c2b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f9fcd76a657bcda7ac2c2af55694491
SHA191e81d20abce822e93b3347d49a201e12039b163
SHA256ac6bc4e6685ecb075daffe83cd7c159905ec2806971d17cb36980888eb6b05f9
SHA51203228470b507681ede82a951d5736c428d4eae24af88cedb82781e854ab9e2e529ba5b85d871649e9b2cdf7470449fe08fe01829f3d011f0c1788dd88ab3c4d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b6985fdee56b184cc2a32118b37960d
SHA16cc4ad4da3caad476b8dacd68723e0016aba28e0
SHA256d23a074deb69399d6e2cd5e798135fb544432dad0750979b87f655c2c3288b76
SHA5124d3fffe164c21d262519c5443c16974a7e34514049720015d1127713637697d708aa1adf39200d2e6c2d3fce11581da9e2cf86c9620c49d3aea63422d9b81176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5411862d14c7b19ac299974e8121224fe
SHA1e48eda9b56653a6f10994dc1e6864757165ddbdd
SHA256006e42c9ecc4cc864ff53671732e240d58d28f5387825549dff850afac4eb60b
SHA51218641f16edfe315a4aeba1e91d7d140a06d86ee5c262ad463e8ed2e09724cea4d17a09ea5f4867246c78d378789372fb4f18b7aa3a6ca9e17fbbd8e817a26b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d73b1ccb4ad33195822ef8ef2b1579
SHA1c89faf77b5d82155a3bbf9a58d52fe68f52ce9a3
SHA25604ca43a6259426689290b83385e6fe1b07f09385df3520f8a927207623118a47
SHA5120d48fec6f325035652be10d8573a421723e2884dcd26fa2a894329d355ff60a39e8e4e343544d84f8ea70562d4c22a6b5dfedd4dde8bebe3ca6208704c4af80f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511785a7907628c503ad1d00b3c705197
SHA18129c8ced9f69b063607a442822395fd7570d088
SHA25652e66c68377fcaf1482769176fb579049575b53e9c1d462f6f129693500fe8b8
SHA51248dcb0c16a626bc721ae5642ea0cec3de77389cfea074074c57993636c58d1215a6d1ed8dde3d8313e72ab79023a74e25366bf2db872aee97a79007f6bbd1e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ebc73ed32c02b302128d04f8e756005
SHA14929918aa6c90b9ec7e7b5cdb9e75fac1a357445
SHA256b588dd1884c9dba749d313e884b0acb582fb5df079f5df89698d2b5fef0549bb
SHA5124eb47119fccd562179867e8e5a008ddf24a14788f397f874fb2a212569d9d61082b9161f80fbe7360ed6f24a046c1e255c09a7639cde12a73f4030986356f345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abcb860b47ed979500455d0be300552e
SHA15308ef0a3fc5ed789231b16181087a75e265b73f
SHA2569e25abd542ff3086d0b3c442484ef5d21f11ca042fd78623fd51beea19851544
SHA51237ffeac3a042572994ab7fd3fb798344ec702b190009953f77020a63c429d607dd470c346b7e16671c76b28958feb1fe02316900fcf646c4b405114449bfed73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b744c7b426218b11b22443f7345f6ea1
SHA1e5f3102a274dae1b79e460c17c2fb78f6d93c114
SHA2564aac2f98e0ef48c4508ee7901cdc7adc3ca1de6eceb590901183a3377807d3f9
SHA51241cbd24054049a9954d7d911f0051535b5be86812b10cadebee360d0caea6fa5d5553299a9d3283c011e6822713193f000b9b13978fe331ec51bd33fb0ea2d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5994544e6b9da231ed7dc2bfbc28e9b3c
SHA1b1e3e1369dc0e31b5eb9480cb8e4c1c1667f9a42
SHA2561e01a58e58f9e6fcfa1b88578f492f550d79bf74499407ccbeb712266c905f0b
SHA512834a409bb68d44c6668af208767df90e5f6a4c9afa4b0514e5099d119f5659f4a208070e3042c70fa8baed5dae58358fbb9077373aa361ef401c3a9e92310974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b39739b0f6cc2cb8c83b6720f5c6d83e
SHA1a0e01648fa8f8b8dea9eb914ab5356000250e4ae
SHA256fd694f2e9c3f72e66d2dfa582bef738019cb22fcd3ef513f443370691a5d3cc9
SHA5127169d7ae08d26714e6ee95f659fc9aa860b35e9b7e78079ea58047e61bbea56d5d1c0e907c83e025b714447265580f7850e5c2bae900d6d203877e4aa8f6944e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbf0aa009ea8474d427cbc1c2a7d2141
SHA10e47227dd68ea9bbf914a9df4d81bc120cd31e14
SHA256405b2c4760773ae8cc4d375ce0f6a4354316c4108b43a7af2bbe4cdf83e2d2ac
SHA5125d598f8816b62b989f089288e637a2879bbe1619ca18518079fa32e3082f63e3661f81daedf1d755514ae5eac5620c49eadc1a5b9f5d10b03fc7cd7dc2ea4b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a704df42ae9e61da84322c69b3b842af
SHA1c603347d32ee70768161cfad634c2a1b70ccd181
SHA2564324326d3314f480b7f95e8716ca809cc2248c30bf7e2987bad5c8abb184e177
SHA512886d842c5ce36ae3e92b2526f1c74b72d6f4c404921e6f5a9918aba7cf4944e26cc606cf2aa9cda1ac3e1c1103dca1919fd25b1c23701272ada00d053383b4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d60c8de7c15874a4077a6d693ee99e5
SHA11a0b3501fa2e0e10b9e2d57718dbfdd00ed10411
SHA256732d4a71d52c177f1604f7b0176725ffe961ca2926d02e9693033eaf4e61e0ad
SHA512b9a39eaee74e0cd98a6957d286d90fb223a17a9e9456dba69fdcc61b287ebae26e66c8470b0b2b14c496841421d4e570e405412eac061615eccc2efbaefa5feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b0dd9bf81353f9f775aa4cdf8f95a9c
SHA15c53c1c121856d8e81466992d7b03e28e1318c00
SHA256bffb85ec449fb7b04cbc438062b9f1d206fcee7ae87bffadc6f275ecb48d000c
SHA5122195632f94290aa853d14355d4dd346001829892b0734ffb6d6200e5d303f83f8e49a6aba89bcbfe020253abee4b8ba9ff14b327b96be98a20e7c41a303fd762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0fa11030c703503fb619b36d7bce856
SHA1e99dc13352be896a4121104711293c58162b5d4d
SHA2561d6e89133b2d6e692097b1f6aae2cfb597b159fec7cc4e0b666b1cdf5b2a43b3
SHA51236cec84ef3e218a7dc4b0bdc4f12f49d5e759c0041ac84ce0fe5950bc19b20dc4cbd81d8c713538ab553e01132cbfd5b0cf9080322712877aafaf805277770dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c03762c0710a78415369d13c69407683
SHA14af7646ef945a6928f15304b05edb2895bbe1023
SHA2569431803edb21423e2f4be1345112c35ce6f4c4085e474f2fe09ddf05c7f0647d
SHA51286d4cf2cc952eda574ed2c8d9712fee147d4baff445a2a622549e3343df819801ddb3bc6c76d02c05e454ef166a5319c05047b3f903ff41e38660af2ceff4955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b69a2be4d3fcfeb39dd4ce6c49a6eb0
SHA1e836fe8ad2169703d5efde5325585df9efcf2bcd
SHA25691d76765d967d40a7a77b18f0ed9ced9ed3de5b6914d4e27c6a29f18f9d70319
SHA5126254e52319a35f5471b55f2c17d8398707915766a7ade3bd78959fe79becda6320368c8dfc83ee476a3e8862e61444f8dadd9b74f2b32029f6224b854a33ece5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517f422f21e657786074418a559fcb024
SHA10285494c594b5d75ea11cecfa835deb168009560
SHA256fbfbdf437f05de8a4e1380bf4b846b87b50b3aa591d77ec7023cc6387cf8be7b
SHA512f8e47e385460137109d05a295dac97eb2f9dcac4847bea78edf20c892483476743b2e86cd9ea5c1184ff44dc289f7aaf226ab6fb31787241325d80b56d50e0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d44b0844323865c0e3495330b12aa48
SHA1446bbaf54a4aaa054a8588808d5cc1f8fd6d09c9
SHA256232f7f51a507816361d0aed108ecf4179392429c95131354152e7ad8ae10366e
SHA512ddb89aeee0a62d248d7557ccd9c51196fe5cd1df29652f1837d2e039b8a991f76f5013a43d857a9daba9ca588bafcc86baed595acb3fd7a6ed1a38fe3e704828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584ee8ad7e908d7b67053fdb853d63e60
SHA1abc15ebe1f61f89c7785b8e37fb286c2f0a036a2
SHA2560c3d20bad1e5d42932604887df0bbb36e8ef4be67460c31a474917d7a4911be9
SHA51285675896e2fefee6e36d5adc9773def27e276e7f7c1a3d1f9b584831a56b74a9b31e7af8979fa538d4323afdfab055295a5414ec7ccd8d0cf659b69720934f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5405631925951f6854e17bcb402f3d4d4
SHA11f74e1ffbb315ade7d3b492366fed0c61ce75789
SHA256a83d1efaece09e41190f8a3f828a4e5a4dec6ebd698021b33dc58662392b60ad
SHA512d42b2e94958628e3ca14e13b706a23f5170d845ef7bb4aceca02719f10b29e827d5a64a179ceb40c2b3be00492f3b0a18981ddd01b3a5cb279d3d7fff79323d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c88ac1ab57b81c562caefa78447f9cbc
SHA12ec80856a6e4137798066a97664fa7513c27c93c
SHA25662046b812b8d9b46a0bf7165973a814775092225b9c5ad8eb325dd211ce9d126
SHA512bed589e39ab644dd96ac76cd471226130fdecca37046392774f687e387d2b763e0b3d54bf1c371a1546dc5fd314a8fa3963efcb166af5beb5d4694f8b5fb0786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565a64490f8798e1f786f10ec6641a87d
SHA1f1fe2076094dcdc63e0fa1c16f1dafca07ce1eb6
SHA2562e373a2d3b29ad86c044835639f40ffb9d2faf11a2f8c36bc6ed4109519cd0d2
SHA512b979fee593910191372b84b80af23462ad972f7013639866579e70426cefb4d114a3ed647908ffc5074c3a874f2c2977c90e382d35cd0ac6b77f659d1a29e25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f2d62102e7ef8cc8f795668c0cefa9d
SHA15d2c9d8423d7cee1b5a1b60d254a0d4baf76a70a
SHA256684ef45012edb1cb426744d1649f9217de40ff402231aa44da0c7842bf715726
SHA512d5ac3c8f20068895d010f04ad38f35cc968af020a9982558229c5ce6456b93b44c2080fa20b637d4bcdcba2f514406204a87672c6e8f7bf42852ec8e71713ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da5e42e5491d76a30a7a498bf2474322
SHA1cea128f2b1b2bfe21075c37db483b50f5549ad83
SHA256c6ae90066123ba2a409ae1eabcdf07be23ecb34ae9914774dd0e6d94a40024f4
SHA512d45382421a0c310061e65e9804bc7337ec2e2f8978c9271835b6e878edcc72756779e3a76f8789c511b814c01660dfbc032bedcba5202b3635ffffd70367a6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f69f7b9641f0a7201deed05a7d9679b3
SHA1afe73eff104e12d06515d68916532da91c4a350f
SHA256304d59f429f052b7a652ab495baf0d626d84767d700c99236b6485926cfca9a8
SHA512c436a0bbc24937f4821457ac1de6213f93436fcc6e0220fc9cd79b2c9561f29a647c4c55141348807ed4c7c81cd42798433690c6640140166d98b6e50c5c3578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec2800b3bbde2c20b4f6c648af44849c
SHA1c57f6de8e0d3f764772bff190ecb8dcf77518ae1
SHA2565b5945e2ebc9c2c0191fcb1741eecdd78a3dcee4934b31e8a8a25491fd0197b4
SHA5129bbb2bfb751fce23d3668998f393ded47b01d2fe7761a0159de756e4d6e20fab0cb50bda567ba86cd68e6b37aab835086d7b27f9d58bd2fcec9b4ca98e5c31e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580bc9d887f0e00bc741e228a4c78aea3
SHA1c7ac9194db3cc8931c7b81b137da30e3c5eac560
SHA256730edbe66a80f5ccd70240b2114b9f3d4e9832909fdb5973a9726ad88402cef7
SHA512b6419ce6e7a8cdeafac58a3447c3a6fbb159089d3772090a4c50a8fcd6ec15854a19431cd38d472fc3684a2f5f2862240ea6f226d8f5ed184fea224dea1eae31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e3d2f0cc9ab07a8e751c4871f141d50
SHA185af9b647d0b1743782e9532eb8661d5c3286b5f
SHA2565be2582214a9e56194c76b34083cbd33323c1f99cac3bf0837b9e4249c107d65
SHA51254ba50e43ef4eb1cb04b33a9ef3e9b543ef691a72d6ef4cacc085786c0637b02b383bb8cdab4f055099a22bac1c936503143a34cb512dc413d66c87568d4b3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a45cdde78ee32b1cab610e3c98e667f
SHA1fa368106592676deb6bc078faafe8314ce666ee4
SHA256d8d2752d2ea19456eeb3367e2b67a97f94a8e81187c4493c6355af4d424e8ed2
SHA51222ca5baa82aa1d5f606da45ad084a14eb814446eff294b690feeef63bd20fba6ac44fb758a61d6e8796af47c72ad78137f3c9b1b51f33cf8658173577b1ba15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5225bd627cc149831599637aa4e59fd09
SHA177883d36bbb72756927df7df63c724db918bf7aa
SHA256ed70d401858989dcf466ea294bf328f3ceef392a90191ede98c813ae1574e4f4
SHA512edda5dd4f9c0a6a525f919c03025de4503974a72bfff08e6d6b60ec13ce232d6c5a6d344ea288193a082a7b643526c203f50d9fab7a584559801d278e8f11fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50425ac90348adea34e2685a670432579
SHA16b47d24198343ca03ea933ced2d2a60c23590b8f
SHA2560e9f17831c4afcf26c16371bec3e96775476582d1a6594ec44ea825940a5160e
SHA5124505c088c234be0b8b0c707d0de6a87cdcbb32263b8c0ad1cf3c9b05645383cbd91d25d54941538437ee990a7f728dc14704e4101410e46768ad55333660b50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50466e6f562b2957a11e52d608dc1c579
SHA109c58e136cc829624ff5d950ea35ddc5582c403a
SHA256332f4578121f25310115143f4fb8683ede01ac91afc3305ca405e75cd0dc3b7b
SHA5124ffcc33c4a66a8b74ee6375b382ebe6cd5c8e7ca3f4c03f963a063fa9ecf72f692aa354b449813cff90bb4c0cb77d00c7f4cd98ec793182a355690f55995a628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7f75e3fca15b0ea689a95ea6d52f083
SHA191f92d492e4ab8ac64a0b0fbea9d58dbad72b52e
SHA2562573c90c4852372668cee63044aa3fe0a6ce5faed9fd69a5322f5e1acf2aaa75
SHA512ea10f0a65e86d4abbc47d6bad30ca36b9aca4481bab77e5821830a75db9b8ddb7c673bd20bf5eed490d76f9e1b72424d7e5b0ea0aebe85d6ff7ee5d8692f8d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e30b8506e2676f6e178f6af4fcd919f6
SHA1aa6d224fc725e41e57cd23cc34954b352239899b
SHA256df0fa026a60d54b656eaee0f06c02cee87bfba94f5647c121bc0d55d7cb92868
SHA512f30ac8f0cd3f88ba0465830fd0fc81385b50c9e7d888d70e5f995519620dc05ced6fb8b8ea74111632e191280fd7903506c331618b52a3d93fb8c1283f92fb0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c71abde2728d1d920ecfb03d4f920fa
SHA1aaa3b86dd50cc44fce64aab08429cfa55d7e20a7
SHA25693e8c37255414d74fdafb7d6d00a01e9229f513fb24d19799bf44e46ec007d1d
SHA51260a300d1afe58de4f423d89f249c982f8019106702c109db0f26c042abbdac42e124a70763347c36578395030568b9f9395077dd1af7eb09e52552ff7032f42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0c62fccba2726d8b7315472eef495f2
SHA12d21ab843ae75d7096021d018e1101eec1d35f9c
SHA2569b1b8f0f8b760cb1f7061dc3516085f373947e13ed562296fee3203f5c52afb3
SHA5128052b49eef9ea32108502a87e393033d300baabb808c56de9e3100e8f564c8c1d633632c8f4826682365f94bd6dbe6136bfa5c46bb94d20d259d030aa96b1d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fe3212047661d68cc23dd7d8eec9338
SHA12557336dec1980f330015f8d72e62bb45a465823
SHA256843bf3ff27b339461e7ce35ef05bca385ea11a8eadf1bfe8cf0bf191d1f377c2
SHA512a2145721d0c0a83bf420f7061ad87bc28bf23fdec9549d73cdfecf84c1b3b97bfe426027626a1cfb0227dc963563f0d7678786124e083e534e0fa0f6a0cc8178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4398b92eb2c1150d96f206d9784ff48
SHA12d5e91d407bc0ed5bc338b46830babe5136e2afe
SHA2563660deafafee83be5932f0ce4fd67605b426790f50acd725966bdd538feb0846
SHA5124ba3efa6a8d4cc0fcc8ac595b7cbdf89022e2ab1436a00b036a5f8b5595964aed75b31bf649c4594e232efe15f7b61c92f2649d7915db57eda45c5bc12e22555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8e87bd4832613ce3d497f3ce3a19ae6
SHA1086e9db5188ce93b889f40fa089934f68cae835e
SHA25692e5ff7440addfc10475e19cf0a3c54489ce25d26fda75024f64c5a446ff7bd3
SHA512cc2d7ede03792aa5f8ca134d7a90358d12ce0759089e06f11afd2b6ebc7ee73879db19e813d2eb1b2ca568fe6fb0bceef4f16e6a9b6a08879518b35d78286efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e765cb75ee3dd831e91a77ec1e8eca9d
SHA1ab48325d0150ed113073aed12553c0ad09680f8f
SHA25653213e505ba1077ad2cb0d7fba9d04de3c111730eab09cf0f0a6fcecb7a2d88b
SHA512022061eb6073b87f0e3e421d3d987c27d30c1136e82109d7e3e5ecb1fc5798d7ce50778e457b5ba0e382afc1fe13c26a373efde3c2bff6cd7025cbe3eb8ba12a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c8490521b86a9b3bd5be2926181ee47
SHA1b8ecd18fe571d8fd0cba219e1cb3e4425b2896b2
SHA25641c2d9ef17d367a536427d00b69e57589068d8bca106213deafde3232f9de70d
SHA512ba457c4e73974c0d2aab41476cc8d14092c8b9d3892c470eb531cbe76495de890e707342f510d67bd1ecede8f8ff202910d32f85ffeedb39029669fd0707d1a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b841d6f0bbd36622716a51780fa07c04
SHA1b3580597587df8746486731a6f970ec2f8bae482
SHA25644a630cb5555d6f3544a54f19daaa47fe843765a3c551ac17e0546cd3c9b62d5
SHA5128f89332ad7b3cd5d51f158b38255dd0abc81815feea3a5021d1537f9264974fe6654db93c12523d55066e94e0993902fce0fdfa841fa943c7560e60ab3d2a5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ba1f5d3776e5f077d4f2653540905aa
SHA10536e51bafac46c41ec9c37daccccb962ed01351
SHA25652e7d6e3fe3bbde138f775d92a005975293b0c18cab717743ab9e336051a7dc9
SHA512ae6cb1e208f3c341760a9359a86f5c966f321c112593362b408d24ff9421141faebb8f64388b888c50935fff55d2b0db4aa882735c9bd1300c95461f48eed515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bcf46321530327710b8fe2acda6df4c
SHA1c3a5951ea739ba7c335f5f2cdba4c5f7e7098a73
SHA2560e044514ad4c1843c3a6294cb0f15562c33984a8322da9174466986c511992fe
SHA512aad58bddec75c706a0fe973f06c744274f07ebc2e39325c0699cc4699b737805e635b541c5bd87188bb6c1bdfc37199d054e8e8a13e20708f20bbf88f721d498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be2393b03a3ec5fc45b6fe2eae3b45df
SHA191987095ce1c36a32935dedcb618b0cf897969f1
SHA256f76201827a3e0624f88caa32bf287fedaa6293a15df322f8037e86e13268d72a
SHA512cb2c9b08370131f7ac3fc3e5458b8820f4c5989a67acfada2be7f9f1e46018c2e58d2ffe5aa6b01301be7a67769c97117024949e23ea4d29d4bb44f8e2e14968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549cd84b85c4edb6555af2e2740cc8742
SHA1d5ee1b32f3456808498c5bc6e73420b253abf623
SHA256b1587a05adbdd92a2ff80be3575bcb9df3a0b799fc31a3c6292b4971a43fe316
SHA5124b5fb73d7c7a50534990537f1c805d7a30d947d68115739fb97846a7691a219d47533314ad07dbdc8fe13ca4cbe67a068e8a7e061450cbcb53b356de944b8ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523525a5c080cd5fb310e98b5930075fd
SHA197ec210302ebdbba07ecfba198fe44f1dc086e63
SHA25698fa0c45469792b7ff1e0ef4bcd51993d9d4b8335272fbda86e72d8b50ec330b
SHA5121e11332e2f537722de34c22f96f4c181eac61a5e6bbb954466ac13700a1d9f85ef79ca2df102c90c346c24157a2cd5b59978e4ddad61697738d84d95b573ba5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579ec8b373df68559f20e185fc2f72ff3
SHA18613552bc015915866c7fce52791bcf0ef40f91d
SHA256724b22b4b54e9d824dbcecda5fc2f02957c8adebac8f5bf2f2b8bf730b979e51
SHA51263e75c6b7f7b0e08af01874c18c62496df38875862c7ac9482eb8585d068d4e85f2b8e817d2f375277332932425347ca2a1d9792960acef9babff966c071fba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5771149113fe71ff96138c5a45f83f986
SHA117e55853986c81d91495552864a4275d1c34d8f7
SHA256d5384a8bedcd59ce2ebac2bd3abaa26febcde2e0e411923596b35ed2acf80656
SHA512e7da39ed3b707c4210a8514bc66e9b371cefcee5f883a4c2bf176d9f93a1caf073a96794f6987587ded96433d260a73ad21053de7727f70c6514c0d642c80604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53d9b249c094aa905578959df6169f269
SHA1f859f6787c61eb6507b284c3a1b430717a8e7e3c
SHA256d8902523dccf0bf2ecbcb0b694e4f8179012b7988fbb6653e2ac3ba5e499f5e0
SHA512d4048cc7f3d590eebcd30ab44633c97f4675613bad5946f3b09bd95a7eae5f75bbc861c1afff914182ed184f7acb71238d098b1ef22c885865b5c7db22004c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD52ac5b4c8345e1b3877c69139a0283184
SHA17840ef0002a048e7c2e44199df34aeea955fb539
SHA2566a13b737433417137501a4266d433f4a79daedcb6b61623b9aa3f2e7fb9af0b3
SHA512ce2b38445b606d47821776ab1a1453e9371af38db109f0b29f9879a69e1cf9e8af9a0d2792a6a74b92b2486a6392c0225b3c923aa731ced8a57ac1d7045bb2e8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E3F2LH07\browser-bar[1].png
Filesize715B
MD5226dcb8f6144bdaafdfbd8f2f354be64
SHA13785cc5b3bf52f8e398177b0ff1020b24aa86b8c
SHA2568c873472f4925d5d47521db4d52532d2983e9cb1bde8b43143a6cc6db56c35db
SHA512ed898b12c4895f7aceaab443c1071e6376db71b4dfdbd769f5f3be71d562438a18b5e5dc36dd7cc610926e380603a894b2e81df4302680c736a412bfd3360d3a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E3F2LH07\cf-no-screenshot-error[1].png
Filesize3KB
MD50d768cbc261841d3affc933b9ac3130e
SHA1aff136a4c761e1df1ada7e5d9a6ed0ebea74a4b7
SHA2561c53772285052e52bb7c12ad46a85a55747ed7bf66963fe1993fcef91ff5b0d0
SHA512ce5b1bbb8cf6b0c3d1fa146d1700db2300abd6f2bdbe43ecaac6aebc911be6e1bcd2f8c6704a2cfa67bbb45598793ddec017e05c2c37ce387293aae08e7c342f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E3F2LH07\styles__ltr[1].css
Filesize55KB
MD5eb4bc511f79f7a1573b45f5775b3a99b
SHA1d910fb51ad7316aa54f055079374574698e74b35
SHA2567859a62e04b0acb06516eb12454de6673883ecfaeaed6c254659bca7cd59c050
SHA512ec9bdf1c91b6262b183fd23f640eac22016d1f42db631380676ed34b962e01badda91f9cbdfa189b42fe3182a992f1b95a7353af41e41b2d6e1dab17e87637a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HVBRC7A9\cf.errors[1].css
Filesize23KB
MD5a1cedc21f16b5a97114857154fab35e9
SHA195e9890a15a4f7f94f7f19d2c297e4b07503c526
SHA2561103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
SHA51200e857331dce66901120b042a254e5af5135364f718da56110a4744f3e64f9b61ba0b877013af8398a0f865c7bde6ad2f87b3c9d2d828651806409cba57aa34e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HVBRC7A9\domain_profile[1].htm
Filesize6KB
MD5552213b6b71a0e96d7ef9df04ee4b944
SHA1b656ca5a673c9316ceeeaff72e9ba53a9e4b5e0e
SHA2563cc8ead624581ff558ad2e07e4207bef9c6658d17b9273756588f97ebffc01ff
SHA512630270f28640343d033f7bb42ab1d239a69f7879847eb7c49fc3382525cbeea8ef87e6500de3ec83a8982cd0866d4d79c18482a2e07a678f97c64795226acd7d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HVBRC7A9\recaptcha__en[1].js
Filesize481KB
MD52b4a2c0d107bc671d4b39568a47aad66
SHA1779b0775413e557f972fb43d07c4e1a09d2dbf01
SHA256cccbd316b2e050d41ebf62c8c613d5bfae33cd43104ac3b772c9e10950a3dbd2
SHA51226d41601eabd090a6f6fb2e99d270f1631e2a4ecbade927705cc1ade3495757b097f0832a8a1f915688fb6072322b10071c93bf81d4304863ed53ec41c71fbd6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
615B
MD542c0f1d2546b1efec4bb50d54a8deaee
SHA15d80c5c183071cf85ed575ab4ac601fb1939a00a
SHA256f9e8cff946f1b7a8d326ffb1a74775394d57b57176b9d0274a6f6b0bf73b2a82
SHA51291fe69dbe3123cb8b4ae82f38898fe95d74d2f3d78fa8d83093dee5340635feaa474160e641800b825af1788c2ba19aed63d7639deaeb604acb6dda50685b060
-
Filesize
175B
MD532db26ae34c0867021147071859157bf
SHA1d5e8a00fd456e4946b25b9d6c9563081733779da
SHA2566061723b539e645fcc0f2da403d24ae12f9c9867411e2c8c3857a2486adefe29
SHA512cd8e9acb4544dcd652c183d1476faf60e3a03969e02bbe18a607e468dfdd1a0a7843463eaa1ff985a6996426435ab6aada1c0d32784bf4275122b66c039dd0c7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8DRJFG93ZV3LKELD4LH4.temp
Filesize3KB
MD532430687703f535bdd1c455b8f9e5ed6
SHA192792cfd649ff3808ebee2e393ed85d913f55cb2
SHA25665db7229f223b89551ff8995d24a96f22de3a5aae23fa66248ff69f28b6ca9bf
SHA512f05bdf489b96eb6f88004aff25d84e1b33bf81ffc64b35930bb2427149c2e355bd5a08a96b16c9d0c22c225a0dc68bbe92d017000fb89a8e9518162e8a986112
-
Filesize
60KB
MD57470d5872f941b3b292b1680e6e15cb0
SHA106965eadb79740cad6c93652df13b61b5e140dbd
SHA25692c1632863faa07bba110f15ba81148d1b0835636c41037b41cdb75ddee33e47
SHA51284e2d14824cdff08a0420be40800205f643c3db76ff89987fcf5ba5bdcfef8a4dec9ccc640055e000d21c64f3550fb94097acc266c59e91fc2bad336464e3eda