Analysis
-
max time kernel
151s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 08:25
Static task
static1
Behavioral task
behavioral1
Sample
6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe
Resource
win10v2004-20220812-en
General
-
Target
6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe
-
Size
212KB
-
MD5
a5848ff1c72dd9ceb3fd8cc5dfe7cd42
-
SHA1
c969575fee6acd2cf0bf2356932a104078f65327
-
SHA256
6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003
-
SHA512
6fbdb1fc0bf5adb14cb4a4c0a5c8bf92ceabadecf0d9c085e1ff9e15fafe5b2744913b680cd6591cb322827774ba01682fd943719fc49b5d039bfb3c975244b8
-
SSDEEP
3072:1+kZqVeInSk82TfatZ9mD5fvNj6kECsjZ:1jaSk8iCtPmD5Hl6ysN
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 14 IoCs
Processes:
winlogon.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-70554750" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-53342401" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-57951861" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-28956246" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" winlogon.exe -
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Disables taskbar notifications via registry modification
-
Drops file in Drivers directory 1 IoCs
Processes:
winlogon.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Executes dropped EXE 3 IoCs
Processes:
winlogon.exewinlogon.exewinlogon.exepid process 1380 winlogon.exe 944 winlogon.exe 1916 winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
Processes:
winlogon.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netcfg.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sysdoc32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntdetect.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pccpfw.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcip10117_0.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a2servic.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530wtbyb.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icssuppnt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavpers40eng.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsshld.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\acs.exe winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DWTRIG20.EXE winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpdclnt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jammer.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\trojantrap3.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ComboFix.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\minilog.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\schedapp.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmiav.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netarmor.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winmgm32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HJTInstall.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notstart.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\w9x.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wrctrl.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fa-setup.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FPAVServer.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nupdate.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winservices.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bidserver.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icloadnt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavpers40eng.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monsys32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mwatch.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfinet.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavcl.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\serv95.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vscan40.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sphinx.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\esafe.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nisum.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npfmessenger.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexplorerv1.0.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\proport.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcdsetup.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\penis32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autodown.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfinet32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ecmd.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\etrustcipe.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pccntmon.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WerFault.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpdclnt.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530stbyb.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfservice.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpftray.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsecomr.exe winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WXP.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\generics.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xpf202en.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleToolbarInstaller_download_signed.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieBITS.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WerFault.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe -
Processes:
resource yara_rule behavioral1/memory/1072-56-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1072-58-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1072-59-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1072-62-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1072-63-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1072-81-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/944-82-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/944-88-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/944-89-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1916-90-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1916-94-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1916-95-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1916-99-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1916-112-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Drops startup file 1 IoCs
Processes:
winlogon.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Anytime Upgrade.exe winlogon.exe -
Loads dropped DLL 2 IoCs
Processes:
6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exepid process 1072 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe 1072 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
winlogon.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\B9373D14A02BC13F1345A3F7BC53B8BCC98D3B04DD0CD9CF = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\E50B29BAACAA360FCC344254F83743208BA6735D23877EED = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exewinlogon.exewinlogon.exedescription pid process target process PID 1744 set thread context of 1072 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe PID 1380 set thread context of 944 1380 winlogon.exe winlogon.exe PID 944 set thread context of 1916 944 winlogon.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
Processes:
winlogon.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEwinlogon.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\buscaid.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Local Page = "http://16075656779op68.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Local Page = "http://2x54330on9b4q9u.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 600ff8120a00d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "1" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Download winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://w2531ida8251hvm.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://i6tl7q3cw00o5zs.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://67ox5h5d5tzcn6w.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://7w484ezge6ncv80.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger = "Yes" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46681E81-6BFD-11ED-8FA4-466E2F293893} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\buscaid.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://m4jc35d70a982r5.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f9d4be846b7f404b8be3794504543d8a00000000020000000000106600000001000020000000a7d4605bffda297284b35fdb2d134265a5612722dcc72d889e1b7466923dbc95000000000e8000000002000020000000b0670608ddbee79215ccf35d3b7066546a43c6fbd96e6b19211a3d316cce7fdb90000000a4416aee35fd3d7c1a36ae94858f0217dad46e6ba434c0653a42f6432dce159101ba873fe2c90ebe48dfc5735acd7d446cf02388e58f5bc7f8301164a079037b73026190ef207e7a09f3e536432d41ef32b13f4a406c54446ca3398a4c7027ca97b4ee2ddf50573058cfa9a56f4cfc71ca9f9a08e68caaaddcd7e640f0140693a21a9d1a5f93d33dbda32947ec64a2154000000050d0849af5e61113b7b4254e9f9ce909e20bb4aab4b3238ab969405d616aa4a1abb7ee019e5e7703c6f9c1f2f5dfb515e2a57d6e7902420125de5b3c901d3384 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376062100" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://oh1a7h5bs531jfw.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f9d4be846b7f404b8be3794504543d8a00000000020000000000106600000001000020000000898c518be594a843a731117023cf8398d140cc98badf145897839d880820a785000000000e8000000002000020000000040db0b40678141227a4a41878e00c7594f9a872a48c35f10953513563ec24fd2000000081505f63f8fc29ca8d7bfb051ef0294a118eea70b7b695caa02c5b1ce7c475eb40000000be18fc94f7df5925ea426adabba9375d291b4e8c8fdf3e87dbafeac228d7f59c8e21d97562c87fea2d0b044e158ee1f8e80f59ed384894a99c0ef380ebcdde83 iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
Processes:
winlogon.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://i984ftg9u4f27pp.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://i9kv9177z62c996.directorio-w.com" winlogon.exe -
Modifies registry class 24 IoCs
Processes:
winlogon.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
winlogon.exepid process 1916 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
winlogon.exedescription pid process Token: SeBackupPrivilege 1916 winlogon.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
iexplore.exepid process 756 iexplore.exe 756 iexplore.exe 756 iexplore.exe 756 iexplore.exe 756 iexplore.exe 756 iexplore.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
Processes:
6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exewinlogon.exewinlogon.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 1072 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe 944 winlogon.exe 1916 winlogon.exe 756 iexplore.exe 756 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 756 iexplore.exe 756 iexplore.exe 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 756 iexplore.exe 756 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 756 iexplore.exe 756 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 756 iexplore.exe 756 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 756 iexplore.exe 756 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 1916 winlogon.exe 1916 winlogon.exe -
Suspicious use of WriteProcessMemory 57 IoCs
Processes:
6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exewinlogon.exewinlogon.exeiexplore.exedescription pid process target process PID 1744 wrote to memory of 996 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe svchost.exe PID 1744 wrote to memory of 996 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe svchost.exe PID 1744 wrote to memory of 996 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe svchost.exe PID 1744 wrote to memory of 996 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe svchost.exe PID 1744 wrote to memory of 1072 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe PID 1744 wrote to memory of 1072 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe PID 1744 wrote to memory of 1072 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe PID 1744 wrote to memory of 1072 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe PID 1744 wrote to memory of 1072 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe PID 1744 wrote to memory of 1072 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe PID 1744 wrote to memory of 1072 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe PID 1744 wrote to memory of 1072 1744 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe PID 1072 wrote to memory of 1380 1072 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe winlogon.exe PID 1072 wrote to memory of 1380 1072 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe winlogon.exe PID 1072 wrote to memory of 1380 1072 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe winlogon.exe PID 1072 wrote to memory of 1380 1072 6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe winlogon.exe PID 1380 wrote to memory of 1224 1380 winlogon.exe svchost.exe PID 1380 wrote to memory of 1224 1380 winlogon.exe svchost.exe PID 1380 wrote to memory of 1224 1380 winlogon.exe svchost.exe PID 1380 wrote to memory of 1224 1380 winlogon.exe svchost.exe PID 1380 wrote to memory of 944 1380 winlogon.exe winlogon.exe PID 1380 wrote to memory of 944 1380 winlogon.exe winlogon.exe PID 1380 wrote to memory of 944 1380 winlogon.exe winlogon.exe PID 1380 wrote to memory of 944 1380 winlogon.exe winlogon.exe PID 1380 wrote to memory of 944 1380 winlogon.exe winlogon.exe PID 1380 wrote to memory of 944 1380 winlogon.exe winlogon.exe PID 1380 wrote to memory of 944 1380 winlogon.exe winlogon.exe PID 1380 wrote to memory of 944 1380 winlogon.exe winlogon.exe PID 944 wrote to memory of 1916 944 winlogon.exe winlogon.exe PID 944 wrote to memory of 1916 944 winlogon.exe winlogon.exe PID 944 wrote to memory of 1916 944 winlogon.exe winlogon.exe PID 944 wrote to memory of 1916 944 winlogon.exe winlogon.exe PID 944 wrote to memory of 1916 944 winlogon.exe winlogon.exe PID 944 wrote to memory of 1916 944 winlogon.exe winlogon.exe PID 944 wrote to memory of 1916 944 winlogon.exe winlogon.exe PID 944 wrote to memory of 1916 944 winlogon.exe winlogon.exe PID 944 wrote to memory of 1916 944 winlogon.exe winlogon.exe PID 756 wrote to memory of 1688 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1688 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1688 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1688 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1628 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1628 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1628 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1628 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2260 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2260 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2260 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2260 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2528 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2528 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2528 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2528 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2968 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2968 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2968 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2968 756 iexplore.exe IEXPLORE.EXE -
System policy modification 1 TTPs 6 IoCs
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe"C:\Users\Admin\AppData\Local\Temp\6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\6a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003.exe
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:1224
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1916
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1504
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:930825 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275468 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:734230 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:1061913 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5c67ff5b00288b8dbd5cbe4299aeffe5b
SHA141bac29433be0040e52215f32f8d90786ca85ef9
SHA2561c7941605da29f4f02bccf89555ef8bc78d94bd57735daff74653bf54c8257f1
SHA5121c2c47e1ee5034c36f291472976aa416f72a2f7891e5d52532f804b579c6a5ed153ed25efb5249cbab2c5c755764dd94c8d28db3f78a210c81209c4ea81fbf1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD5f7801fe8b983652ae788bc952856c2ed
SHA1f3898da21792b146a9f856e87ed3520d76277fb8
SHA256faa1bc8a9887e2dc694ff645546ea16cb96ac4bd1b0c460aef95f2cced100d6b
SHA512ac642881315553a5a50ee7ab20015809f90c297cdf674f34a1e709859aa1b89fcb9caca242333e862b379cbd2b35991b6e54de56d2e643487f9aa4f984b93a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
Filesize1KB
MD57055fbc792b81e2fcdb72da9d3e6ad81
SHA1dec614359d5d9e76c20aadd3d467037e6a9665ff
SHA2560eb7311d9c9d181942fd9c9ff0217a360ae91829d0dd6df95a8247625eccae34
SHA512b1a94b289211cba78d11888c30d2e6b16fb21fc21476c69e8c9ae618f169ca02f6ddaeac72e1e8bce3a0ea9f4bfbd4e47005703963b6cdf46773d27c34e16f5d
-
Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
Filesize1KB
MD5ad6d84486c3194ab2f71ef94912fdddc
SHA189aeb9ea77a27510b11762db5acef5654b62ea4b
SHA256437fe72dd5a616c3db9a8e0c4823731abdd627641879ed511e9cf86994492789
SHA5120e37e80588d96a6fb9fe34c0d34d688bb64f3540185fa9e2cb1ed0504229003f3bc31be717a390d3acc668bbfb7a1645cc52bb9e4235afc85a23653ead8ad09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5edf6203fff785a12ca4d3f7c0827d32e
SHA16216473becb5ca95214d079103ff8bcf3ff84e85
SHA256fe90d94e3b4c4238515070e93a31534b141fbd4187a19665148c74fb31a9aa29
SHA51236446ab186114a3a4dd1567cfebe986bd18bcac2bcb7c74a939a627eff4438a0c337d39ce0651c0fca4f1f42c288c520891d1fd2060510d3702c239f3130a6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD5179e890227a52c6094cff0ee4c54da14
SHA1c6fc05c2bd60e894156651fe64cf731cf2f63f85
SHA2563326c529f59cedbdd4d4ed0a58e1a160d3c44e3c61a76fba96fd65ec215dcb6b
SHA512cbd9b945a500c701f15d2864ecf50ddd46bf3de027e04cb274472b93cc93cd42224f930cfbd8cda9c695e1923950370900fa7700e67ab1b43df03fb9b549bb36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
Filesize466B
MD5895076f34e799638b72cc96902f3813a
SHA18af34be1e275d97e0c515001cc595faf22c9c65c
SHA2567444bd71bb265cc320ae7855fb95b03c401b4612b986c424773ac9b1335d3c90
SHA5125a596790f98aebd076c68a993d22e2b6b2576fa2b65d36a550a04c4181b76e090552f4fee5ff3ca59313312ef3ea7556d85550909aee700539f034436ba46296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524bda1a3013a0cee26f9e74aa10d4814
SHA1e2fc53b1a0a6a7ce66f9c02692658aca96e1aa38
SHA25604875e1e10466c15810a64c2d250329accf260c9f2bec53e0700e1f4ae2649ab
SHA5127f358e0d3d6076b944819d70db7e4da3deb4f69f8a8aaea4d9af74717d711ae2e3fd42d19b059b8d422270c29ade4125fcb65cf330b2dd282e36f1c961af21d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b49fcade7ad882cc079e5b04f254851
SHA1d588a78c078966e42ba7912bef1d022da4617b0d
SHA256b80eadad2d001f6a75dfc3446892268bfd7e1f716f1a8a27331050d470f1f4b9
SHA5123c6b329cc21dfd6332d0aa98f0262a63267efeab94e62758ad8acd6a6675b3142d0a0807359b536331c97d732553958974cbddccbbef4210a0339496b9b589a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c33268ed95ba3aeae977d70235a6f9e
SHA1b6fcc614f1813fa0aa061f14efb5a7174cfcb998
SHA25664ddab6bdd49a033d640d0b7ed4a6066b8b6a3ebd0bab7ca0d1af6d4931f3b52
SHA51216cb661f9613344deb0fb03037edef5fbebeb0c3741cf5962e8c410ece8cd744a0dbc7ff7c208cffcc874d03a07f5943399f82dd7eeaede5c6a5066669d7594c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ef88c04b85d02a7f572345fa2ec5022
SHA17d83eebf52a5ebd38f85783a5b969aa90334c92a
SHA25604db4615db1f03f590ec542e2db5a33471d6d25375a076dbe8757b00aac1abd3
SHA5120a06a8ebd7ceca575e319f0a985304ca8c122d7bdad45fe95166a3f5af9a846a4ae9fae035949f574fed27f808e04649209c05a600e1dfc72270390ad7664e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4c4d6bbc84332267721fbf9ab6778b
SHA11e4f10a331983e01bbe6162d335a164a17a7cd3d
SHA256c61336d71d32cea1a5938cee4774ec0d9cde8a8e122d2dfe64d8e968a9322cd5
SHA512c0236db7fe446d2fab6d80dc215f4f0f4a5243c8441dc35441cb9f6d6618cfd76a324599f589af97a0a9a5b17d68cd6ea303d0afd4f44edb6beb6e7cfa2becfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa12976bd64fb14927ba70397d0af00
SHA1e40529e334228f6ae3c8a894d2580b35b5b0d0f2
SHA2564756074db9aecc4c73435469bd7cfa8733639559635cf46f54d6a2444e9c9c94
SHA512f1635447b4f40fd51cd9c0cc32ceb19c06ede1370cd8049f5fd6a34f464211bbc2a17e8c0ba27569eadedd17ab1b1cd38b62890beddb458d704271b79d9bc404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835b8ea13a25947f912228c2f993840a
SHA19d88105f42c0d5f6ae530ce61556256ddbad9f5f
SHA2564b9bc635fc328b4a5a7b819cebe4ba7e04680cd684507dfbf86bd3d1141999ca
SHA5126674895fa333cc248ff187edb5f40c509427be09a728b56782c5190c905f0133b5a1d40b5d31759d2b1d36ae1db36ed261af3a7be3eebd5b5f792d6a12781f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835b8ea13a25947f912228c2f993840a
SHA19d88105f42c0d5f6ae530ce61556256ddbad9f5f
SHA2564b9bc635fc328b4a5a7b819cebe4ba7e04680cd684507dfbf86bd3d1141999ca
SHA5126674895fa333cc248ff187edb5f40c509427be09a728b56782c5190c905f0133b5a1d40b5d31759d2b1d36ae1db36ed261af3a7be3eebd5b5f792d6a12781f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
Filesize470B
MD570edc9e9f0bba2415e94c4107f59e149
SHA14e299941b535cb3fb9a15231a583103686f4b04f
SHA256d3611c1bb8bafcc47341181237c4ed8580240e23b11685798520c360919476b9
SHA5124f8d748269f4c69521e7f50cc1d402cc341f9832a3dec835661a50d11092719f99b96e1409390c5703657d1839789480888814726cd0f9c0c5437376a65d698a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD561b695ca5446c11d6dfa69bd6bc03c01
SHA196e455e15b7c2df3e884e0a7b6d1d6c21c0d9eb9
SHA256513b4ad01e11e917e4315a4f9727450cdacf63666022e1d012800ce42aa8be1f
SHA5129242cec759038264f099bc8030854baf6762c87bbde9488cc2b5be323929f94d8377bd300e7a5fa81ff2d2633e34a6481298c228fa3f107aad00989a13ccd969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5acf938e7cab936ea6ea4bdbcd4c1a7d4
SHA1448e3d9decd7e102a332bb74fcdd3e5a532ca3d3
SHA256d24df6e86be6cd8fd361d740f7ca5496dc77605916a8240fdb9b338d3b08da36
SHA5124bb8fc144d07c427673f9a6e2a7a3e7528f50b103a2a53df151400bc7e1cfac3566c670e6d575b26c05884f6c1b0869cb9100028c4c7bd649afe5539fc92b7c7
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
601B
MD506c05dd6ae8621a7dbd321b7e98d40ff
SHA1377a1d55adadfc95cbc6dbaed4ca367caa623b38
SHA2566ecb331ff6dba46f702f28995947661b36d018cae9723eecd69d967869f6d41e
SHA512d3fb25b180e0de8eaceabe7873d8ec52250cd3ff20fa11aaac08a12a93498c2d2e6abd78707c940858862bd93beccf5d9e79e92e7780f1ce7b3394a7df9382f8
-
Filesize
212KB
MD5a5848ff1c72dd9ceb3fd8cc5dfe7cd42
SHA1c969575fee6acd2cf0bf2356932a104078f65327
SHA2566a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003
SHA5126fbdb1fc0bf5adb14cb4a4c0a5c8bf92ceabadecf0d9c085e1ff9e15fafe5b2744913b680cd6591cb322827774ba01682fd943719fc49b5d039bfb3c975244b8
-
Filesize
212KB
MD5a5848ff1c72dd9ceb3fd8cc5dfe7cd42
SHA1c969575fee6acd2cf0bf2356932a104078f65327
SHA2566a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003
SHA5126fbdb1fc0bf5adb14cb4a4c0a5c8bf92ceabadecf0d9c085e1ff9e15fafe5b2744913b680cd6591cb322827774ba01682fd943719fc49b5d039bfb3c975244b8
-
Filesize
212KB
MD5a5848ff1c72dd9ceb3fd8cc5dfe7cd42
SHA1c969575fee6acd2cf0bf2356932a104078f65327
SHA2566a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003
SHA5126fbdb1fc0bf5adb14cb4a4c0a5c8bf92ceabadecf0d9c085e1ff9e15fafe5b2744913b680cd6591cb322827774ba01682fd943719fc49b5d039bfb3c975244b8
-
Filesize
212KB
MD5a5848ff1c72dd9ceb3fd8cc5dfe7cd42
SHA1c969575fee6acd2cf0bf2356932a104078f65327
SHA2566a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003
SHA5126fbdb1fc0bf5adb14cb4a4c0a5c8bf92ceabadecf0d9c085e1ff9e15fafe5b2744913b680cd6591cb322827774ba01682fd943719fc49b5d039bfb3c975244b8
-
Filesize
212KB
MD5a5848ff1c72dd9ceb3fd8cc5dfe7cd42
SHA1c969575fee6acd2cf0bf2356932a104078f65327
SHA2566a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003
SHA5126fbdb1fc0bf5adb14cb4a4c0a5c8bf92ceabadecf0d9c085e1ff9e15fafe5b2744913b680cd6591cb322827774ba01682fd943719fc49b5d039bfb3c975244b8
-
Filesize
212KB
MD5a5848ff1c72dd9ceb3fd8cc5dfe7cd42
SHA1c969575fee6acd2cf0bf2356932a104078f65327
SHA2566a4a0a26a1f21fc9490e5da5cc5cfc71d86a8b2d47c98cdf6326375f71ad4003
SHA5126fbdb1fc0bf5adb14cb4a4c0a5c8bf92ceabadecf0d9c085e1ff9e15fafe5b2744913b680cd6591cb322827774ba01682fd943719fc49b5d039bfb3c975244b8