Analysis
-
max time kernel
149s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 22:13
Behavioral task
behavioral1
Sample
fbfdbbc62b35284e7d5b75c32b7cda10.exe
Resource
win7-20231215-en
General
-
Target
fbfdbbc62b35284e7d5b75c32b7cda10.exe
-
Size
1.5MB
-
MD5
fbfdbbc62b35284e7d5b75c32b7cda10
-
SHA1
a6ba33b2c0ebc9d3618398b99b123c0a7310914b
-
SHA256
19c449ff446bfa5dbd227232b4a778bad834cb39ca5e4522ccdcedf3303b3b1d
-
SHA512
39204ff523aac565492c0ab9cf6ec5c77132f031cf6b5f75707cd3c36f52eae89d68e62c0aad2dc90c6d5aac6ea7d425da7763d22af666ecce910141e2ea0384
-
SSDEEP
3072:0Dy+IvWylpIB7lxjn7wq6xwL0outeL5ctut/UX7xEgrD1asomkXokpAo9Pnx0UPD:AevdI3x8q6KL0oSeL5tt/wdaN7Co70
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-86163496" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-55076950" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-37694626" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-21601974" winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iparmor.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcfwallicon.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symproxysvc.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwebloader.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsched32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drweb32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navstub.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpost.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rulaunch.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bootwarn.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cwntdwmo.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamserv.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieRpcSs.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bisp.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\panixk.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rescue32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\watchdog.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icmon.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spyxx.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tracerpt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monitor.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\update.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupd32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\doors.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winservices.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlh.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navsched.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perswf.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\w32dsm89.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\realmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zapro.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ndntspst.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccevtmgr.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfinet32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csinject.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlite40eng.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gpedit.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sd.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winrecon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sched.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconsol.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ping.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\proport.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vswinntse.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieBITS.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieDcomLaunch.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSTORE.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sysdoc32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vet95.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\serv95.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbwinntw.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atro55en.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icsupp.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\neowatchlog.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pccmain.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ping.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Netscape.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cleaner3.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsma32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hacktracersetup.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe -
Executes dropped EXE 2 IoCs
pid Process 3020 winlogon.exe 1484 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 2132 fbfdbbc62b35284e7d5b75c32b7cda10.exe 2132 fbfdbbc62b35284e7d5b75c32b7cda10.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2132-0-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral1/files/0x000d0000000122dc-5.dat upx behavioral1/files/0x000d0000000122dc-12.dat upx behavioral1/memory/3020-14-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral1/memory/2132-17-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral1/memory/2132-11-0x00000000024C0000-0x0000000002508000-memory.dmp upx behavioral1/files/0x000d0000000122dc-9.dat upx behavioral1/files/0x000d0000000122dc-7.dat upx behavioral1/memory/3020-18-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral1/files/0x000d0000000122dc-72.dat upx behavioral1/memory/1484-73-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/1484-77-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/1484-76-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/files/0x000d0000000122dc-74.dat upx behavioral1/memory/1484-142-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/1484-167-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/1484-170-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/1484-249-0x0000000000400000-0x000000000043F000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\E4842444C4452485 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\E4842444C4452485 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3020 set thread context of 1484 3020 winlogon.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Download winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://6650k6ll7sdxl9v.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E5244CC1-AA49-11EE-994C-464D43A133DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://lok3say8032jlpm.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410456364" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Local Page = "http://s056c7ofkh1yx92.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://t21mze1bjqa1j68.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Local Page = "http://ez1mbc57q2clz9i.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "1" winlogon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://9d12est8b5sy1lg.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://vpcg2ol0q88olbg.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger = "Yes" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://e530i4fephs1345.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://u3p5489dx6u64t3.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://3l5oytq67p56o89.directorio-w.com" winlogon.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe 1484 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 1484 winlogon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2132 fbfdbbc62b35284e7d5b75c32b7cda10.exe 3020 winlogon.exe 1484 winlogon.exe 1904 iexplore.exe 1904 iexplore.exe 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2132 wrote to memory of 3020 2132 fbfdbbc62b35284e7d5b75c32b7cda10.exe 31 PID 2132 wrote to memory of 3020 2132 fbfdbbc62b35284e7d5b75c32b7cda10.exe 31 PID 2132 wrote to memory of 3020 2132 fbfdbbc62b35284e7d5b75c32b7cda10.exe 31 PID 2132 wrote to memory of 3020 2132 fbfdbbc62b35284e7d5b75c32b7cda10.exe 31 PID 3020 wrote to memory of 1484 3020 winlogon.exe 33 PID 3020 wrote to memory of 1484 3020 winlogon.exe 33 PID 3020 wrote to memory of 1484 3020 winlogon.exe 33 PID 3020 wrote to memory of 1484 3020 winlogon.exe 33 PID 3020 wrote to memory of 1484 3020 winlogon.exe 33 PID 3020 wrote to memory of 1484 3020 winlogon.exe 33 PID 3020 wrote to memory of 1484 3020 winlogon.exe 33 PID 3020 wrote to memory of 1484 3020 winlogon.exe 33 PID 3020 wrote to memory of 1484 3020 winlogon.exe 33 PID 1904 wrote to memory of 1100 1904 iexplore.exe 36 PID 1904 wrote to memory of 1100 1904 iexplore.exe 36 PID 1904 wrote to memory of 1100 1904 iexplore.exe 36 PID 1904 wrote to memory of 1100 1904 iexplore.exe 36 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbfdbbc62b35284e7d5b75c32b7cda10.exe"C:\Users\Admin\AppData\Local\Temp\fbfdbbc62b35284e7d5b75c32b7cda10.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\E696D64614\winlogon.exeError 4483⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1484
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1100
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c2d9523ef5f3f9a9749c9b2071ffa1d
SHA16792590dd41cc4c9ba91bfb9c25c266b6e7762af
SHA256517ec76b4a1572bf48e743fb6bd385c73acad149ff7388b66104572db213884c
SHA512bc0e84fedc46262f3e93e64326aa455cf94d230d1f69070f0befe27e192a67c69b67b4dd68c4e03a33f1b79b04d70ec2e320409086eccd79669974e0d280b4ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525b156cb0a9e43dc5725a793bc056195
SHA1438fbbd627d85079372b6f86c7fc223358fbbfdb
SHA256029b9613fae87932a1fcc87847c1f56bf950dcab934c01e7e92a24cbef2d4cf5
SHA512a2784da2a9b73c21de42b41df59f250c172a7fe06516cb11ab69b02b42f7fb2abb5e33ea4b5abf858edb47cd04920c878f52dccedc5aac7d038eeaf63ac57bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5864508cf89d785b460b2137ee4eb50ed
SHA10b650a0c3606c693243075f59a14e56f02472104
SHA2567cac568486729ad3dbb392169cd81261568d7eacfa493e810fc3ca9db7bf01df
SHA512579f8e90ffac4e5bc8d665500bb625aa42afc524fa5d56a679bbbc073192ce0b489241e5537ae8c909c29dbc0f1c56ea26e3e1d5b1071cb802e79f4be0f22109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550961a76ec14883da7609d2a1d02433e
SHA1128b9ff26882de0a672cbbcff17f133e272ac7d3
SHA256d43a9077b562adc04175e5bbbb7d06518c58b0383ef7ad711cdcd8d782672343
SHA51255e586b2c8b9bd26dbdb76df0125f90fb611130abd1e4added7bded8c4e4e543f82cac8af215d6a0aac8ddd6efd03ff958d21f0652690314338453b6720d3c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae938c0c035b2ff6091a9620fc8888d5
SHA15842029ce5b313551d2b7ab25cd6e2fd2968a09a
SHA2562435b4ae53233b2d6bd37764406d58a043ff30b4094f469428c03f5fa79e9a33
SHA5123244a0970935e916ce27e5b868475238ec4531a198d91d4b6c1d19ddffb1b64ea1c40066258d94468098627b01ed72be6d7c735c16254256cb1e6c8f3b5dd647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc0e3a75c5ad3e0b12dad081a6fff3c9
SHA13f5dbac45d56bc31b14f6d40e2ad0c45644a3a24
SHA25674aa7101ed8c9715d81795d8d5e50b00d2009dbee21edf39aadb98a3e4b020f7
SHA5126bef6f584169c78285667102f0ace6f4cd1e416a8ceb120115660c4bd48194d3cdbb8e93308eff976f7967215f2a1f76d507265fd5ba8b01210c4ff26b450bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5202fd4ce10a2b76e4c9e078a6497c598
SHA1bceb19fe971e3956da93deae6b3575142f463191
SHA25671fbf0a2e0128bb6d47df0933ee781a14b461e3fd3a9e05ca81e8f6849a41e5a
SHA51255ee62402cc6882501697cde4c9fda2d4f769711d0725e1762bc91529ccc7eebca68d644438e933462d972deb8d193cefdd0914a5627ed8294a40a231c593be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505b54043b9f428fb63cf82469e54517b
SHA1f2a44b066d1192cf8286c39eb09bd0c1317a2534
SHA2568e4530a8d19a8a795b965818156e78d04868cc8e6a29622af95833a65e28da88
SHA512e3a9faab332a199daab874c916a1a063d71b7031349ee910271de74f5f63b70e9737f549f7071aefc21f995200138ebe31274c911461161b2dd1dbdf45d847e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5516c8256c878a3459034771ec63adf63
SHA1d933bbc93ee32f48777f5467ed2bcec2824e2207
SHA256cd80499b9683128a20bc00c16c2296100216dc888ab4b49126ac0c90b64b0be3
SHA51205a65c800d495f1f250662a97d902689318d02a729ede90e973f442ad3bef502f97bf40d748829eac91d672aec490c1b37c9f9d29123648f26359c617fe44074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5290383b76cbdaac1956082932ae82b77
SHA1ef59d4094d6ffe80159094b2b49ec0eabbae575c
SHA2561e5ee3c38dc4a62cd94a23edb0afd793a953f29253c4547c2f4f562d8bbc180f
SHA5120dbe1d57cd117fbfc8c0483e498f8905b2b34d8b98f973edb7f4887b2280cb2d4d1d81652ed4b3e79f8c0788a6ea18e22664bc2dfa03a3811ad1de5d40634c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504ffff90efb27f27b4c03470c30c67bd
SHA1c8118f06379daaa02f4978833bd336e991368854
SHA256e5ecfdca92075ad378667042dee9fd8c13e116477a1492c8f0b48ecdd4699be8
SHA5123e39929729e6a606b0b36420ffef7d904ed116654a9ccebd930facd08780feb9a4697a4ebd8c12ff690e078aa4d3f7f687ead8a45db06ec88d3d739b50ce7ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5686b0f27b25d1e6e9ca05bd41c233ca2
SHA1d7eb57f5ca4979beab71c5a79fe1f4e8074685ca
SHA2564c1446e2ad76c5b67b629249bb000b5a2859f0e40c8e10df8dba2bf283003045
SHA512fcdfd2f2f8000e5fc9ceeb7cf84470d44fa8822f85372f348499b6a0e45763179092cad78b818556d44b53849dfb963ab1e7bea7d4ab275505481b480fd09cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556a1c3ce2179fffb03db170452b27a7b
SHA15a9cd2c9ef978c4d133f1255533ffc29a2be6b93
SHA25617cfe8368e240922d758aaee4262c1d28ce5d0df8b551c171003d84cea0efbe0
SHA51251a954c4e80d5f77156dc8053ab416602ecdbff6bf4d088afc547854f991d597e086f93d1b4101921f633e47ff5dd0532c5bec210a2d97de95bf1c65193ef375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5178e715bf8db47c0a6b8a551a56c5336
SHA161c014139436eab3b6cff5a457b2402d46f278a8
SHA256c049553df402b0bac1f255c833ce3e38e1958d011c92650f6f9a2b58794de170
SHA5128b1d3201fd753a4fd805ffc88252a3addd65815782f50f2f60619cc2456e70137eb4c3cf35f40188eb4a1315b4f22f1aa0e6103434fd85c6c399dcae9697758b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5402a18bbf2983aacfd931790da7f0213
SHA169fef98f5feeb794d3ed4836de1aa453f6262c32
SHA2565a56712bba14a50932b1c77616ded88f752a1f8641883ac01b31658ad9ac5af6
SHA5127e4b5091c1be6707b80de557b909d345332e1a0760650cbabe0e735b2552f49da1239332eeece324bb8a93b0cd3ee2a9a23d6361b8977465e6b5190c299d4a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c185e0e3b98d38ef8d3a2cffb5443a87
SHA1bdff389debe0d69521c672333426300bf83fa75f
SHA2565cc143e2c376810ab7cc553df72f9330d6af494657d26218ced2c508c5438131
SHA512a207a1e83a6547e9c36dba89446c4614a6f90f85ec420b3b1e323c1e7626140ed76cc82ac3ac1217ed41ddb15c08d4ed69174159893fe8980c4167c62d95f85d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565499c897a7b3995b701899add31c68b
SHA15ec52f5ee1873ed6f134a384fc99e1fb4b5ca44c
SHA256ef90e3b7014f1937cd107b4a36e21785e68d7af9e818faeff23c0a7c5d9a811a
SHA5125619534e75dc127a0b031ea23776b7357cebba5de3a6fa0794390592d7b0d9fb27f9cf39621606e894cc49ca72a7b4eea93b4c4b809f82134bbdfdb76e778518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593b2382506983d9d1ce68af7e70856de
SHA1ad94583732d8bddda2702caea19b978177437177
SHA25648851ff6080797231bbacd0f1d2104ffc7e28ad293387fb63a9982ac0112e4b7
SHA512a0423ae04cf324637694c95c108531ef140c03652731d5e0f37ab17d509364f419aa2c6611e97a191c3e3bfe524df6257609447f17b9700201c36db7f107b618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6f526978cac77d446d6989288deeead
SHA1c12def6c2e0e74537dee69a65b04d393aea225cb
SHA2564cd37685a314d1c4b5382f9fef1d6eedc299db72b134782beee2880a899adff5
SHA512b9bed4bd7b29cf4bc56a105c656f878959f3319f30687c5149e7aef923f56c7379b97a8e597e6b711a147dcafb46d40d257e73057884f020a8b6e2f87e623877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c7e7186de39617e192ce0465a98905b
SHA1e54d8bbdfce822a1f7100db53727ad71f193a4e4
SHA256607b0dbf5dc4e92d08b7e915b1fd41ddaadb0a8229102d629ec12ef96827a3ca
SHA5120a98403bc55ca97fe80cefd77b92c0e29838005c03eb58873eb35f885b189eb9d55d88e0c08e1075e80bd8aece7b82e08a726d5ad8604c47ec78fe1299bcd64f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef1824010420bb4b04993b75172a8f40
SHA14c63e42dbe080bdbbb20a23f5780b745450a0972
SHA256eb1feed4502f62cf8b0eab606a93b5c321cd646e9c5b37b2ba5c0f788db29ffa
SHA51299854708b219316d3fbb843e009faf26d4da034b4e33264cd60cfdfdab60d2a558e4ec55774cf37c4c5f05dff8cc080d6403cd254b64ad13680f17d71cdcc64b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e828c8035780ca0c2b3f2da2ba16ac97
SHA1137e0d9e48224dc9fd3b84bd0a81a11c45ad135b
SHA256defdbe3f0c499efbe59e97384517b755cc036538b25810e19c355c9ed3ab84cb
SHA51290cd646842e91abbe9c2cdf6adb35ee1150387191e6de4330c51035ff836abce261078a2898c7aca79e073391822c7a5c4fb6e2bc3e289db36bc177ecfea80f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c588ae93dffb38bb99c99069b7f9b003
SHA13f4c6a0cfb7b05b9cd5d399723f8f247a554276f
SHA256202ee8ba6ad2b56595576dc2e123c2ce00a142a16233864e143548c9f06f9103
SHA512926afe083991ad9ee1e309707e31add8a9e2a3da92990898f2c860923cc06c87981801bd735fef89066583d2382cab77577967d3425da442f1db10d2a89c4471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8986fd296204b8d4b7c7331ed653390
SHA11a5230e5fbe30dc5651de6a2013d28f7054e1622
SHA2561a33476979a34d14adf5066b68081d859220e97fbe31ec1ced7d28036e5af084
SHA5124ffa0fc65555794a68825bc1f89e98c881de2d025702a83c582cf11cd1f4e37d76568e3cfd18054c72f232f6fa78bcea7aaa8119a075c17a9fe52fc2a4edeb9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a3512f9556293283e44235f6d7a0745
SHA15cde285039f53233dfe70abd39daf060ab659cb6
SHA256c373e27589697e0a5106c29a2121e15e08f775a9b0a092ba34f39e93d45a791b
SHA512672c4903f7541a4b3752f0f60576502496ab4447e0de4a3aec7c65f12668aa07009b8d7f9c19e71655244c3cdd91f22c1f7e7be3f4e3e95668d7f475a6bbc0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd7e74a3318b360932eb859656b7b0a4
SHA1b391715bfda368c917d145049dc94dfc4f8924f0
SHA25679f0df40bb4dc494d6a02344a9e32dd4901c5da05ea9988aa0fb2ec1f52a15d3
SHA512b0647df2b6efd60dc87b957559fcee51cf8931057801c0b811a485bc8e29f3c2dc85487e9b74bbee2f0291b7ef0df07eb11616f4c11c92ddf4534a6e8891128f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54495bb24f7cf681922c9453f83ea6d72
SHA1f08fe44d359ec968e3e567c0915382ff9d8c84d0
SHA25627a526576789971446203f1aa4d30e9e4c5a3e6d5580d201c8167d50b9739894
SHA5125caf9d7832ae661fa11c3aefb53a1dacb674aeabbb40bf6e876ac5d062ef7af869ed4f618c521d284114986fee502cc85ef1a38e80fbb73ef95d359fa0ec260a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586e5a4beae09c545ce611883b941346a
SHA1c59b89b1d6a9f59957f4bcf9ade5c2d2bee59b38
SHA256cb03eaebf97de6f25814b6d7a6db0f7196a4c469e4b3b8a4f5e02a0123ee655f
SHA5127b3fac52dcb244a07ca051d7eb925fafba48803961706fa32a8a529a1cde0eee81e422bcfa0f23b7ae0d2e2f2def50f025840c300b942224061fc70c9d34ecbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506df60239e7f1d67579359b0a94ed917
SHA1cf342a73052500d2eb7a168ed0bac0fbd67aacc7
SHA25661a57884931e4729e92bcb1adb0f629b91dfa4c20f052f4d9a40ac1da52c41dc
SHA51235b0a4952c95503311081b7b84aa4afdd9433571de3616c50050f445edbcaa447814fd094c24a52b5d4ad03318e7b7d3e459dfb93b181ca31f9a10d94bfe8b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0b32f35ba65f0746feed25f9a3d1d9e
SHA15d45939537a252dace9166d5d9b46637253a77dd
SHA2567dbac854d46d4bc31bd259ccd975091763eda1ecefda4cde1b02ca681484ba96
SHA512d5edd74c002822ca99405a44134f63c4e38a99798acf2d1658d8b9a7e07c47c92ffb49a3a50300369d5b073f4b3f343eb7ba11fad29bec3c127b1f3483351626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551a39584227f1e93b6d9b3f87db8d827
SHA145195d99913c3168a7d565d52dedfb017c68846d
SHA256188445e48824f836471a193a5e36da33373998951d1d9d8523f1a8cc3be00b36
SHA51286b821824b96b5303126b196cffe74f5787325900717ff16e1e9e3c37786293852ecfa43701a2e573a618ae7cd45e25df3ca753aca28f520845d1dcf3bec1fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595affda71812ddcd9bc8f8ae291636ca
SHA1b3e5651f3632c5c113d9639988311f7422a4130f
SHA256070151a92a2f56101ddd0bc87eabde6b29c8bf471b8f25e37f9e311f57839ff0
SHA512092134379eb9b1ff5678e7cfcfb2a1b52ac55274320774e437e0915db44e4998b2d27c0242ead5f87e479b3029f7383c868a2009811c39a6379d648d5b2a0c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD58e2d8ad87f3a5f982232023adabab784
SHA158c6ad803a197a39d4e003831ead40da83bf8dcb
SHA256a576ce94c48878df5f7c613bb9227d3e08d19b78b2b8920588c05634de3afc3c
SHA512c86629aed1b63b8d2ce2753f70fae8f900efe8d4ba55bb74fc2efae81c2e1472aaeac45a2a869aaaa472360df1254d0fc34cb4491c2c79aee6bc09274d7e46f0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
64KB
MD51b38560f9e3c9aae766942e9f844c25f
SHA137c45e8b91b085cdf7f78101609d29ad008b2887
SHA2564daf49ba53d9891a1c3a6f540da497e2bc72be11557a77f68de2314dff96a6db
SHA51276461efd33ec8f3eb71adc13c2eeaaddbc853f6e56f7655c2bfd3522c8cb2301c7cf5a70a43c5f53335e2a96d153a52ede00c82a3e605e7462345c9415f6d1bd
-
Filesize
347KB
MD5e317f5bac5229dcf773220472463b5cb
SHA17b2913fe13778d3de6cbb5bf71afd846628ac93d
SHA256d0712090b2ea6759bb74e2c9305a8ba19ec8e514af7d725f4128c3a6342faf4a
SHA512049dd6d5412d58ba9ecbcb23cb890f0a4a92f819128ca139c620591238f1471b399e80b1c65651aadc2149f489d47d1b9ce7589a683b1fa5151d41dcf87e8b78
-
Filesize
1.1MB
MD5b222b0dc956f8ed698ffa9666b0dff40
SHA1fe64b9f55e76e285d6eeaa04f0317df4e05078d5
SHA256311812acce52d493e2dc4cd9f0fcf286389e84df24ce379d646d0c4d9200b19f
SHA512da7818601edb8e4900571e7c480401840efe38a88c02f07be7082f70a651a41e7e89a82415b5a509f3476bd66f1938746b0037ef007ce250446057dbdd0699e1
-
Filesize
65KB
MD5f9af5b430dea196491bcaf92a973a414
SHA1fbea4d2f26c02f2e58f1581b581c593928361021
SHA256ea1d4175fa60eade14fdf41988e4e5a31b5839c0e1457a3f8f399fb96a2a1b8a
SHA512f946be16433d4e9f6db90b14c661087085728c3eba341c8b257ff6f107a3736e7ce7d838a91fd9d6f7763005c063f15e8740cf2147fbe8842212f9f54022dddf
-
Filesize
1.1MB
MD56089b7947be4385f94a5f8db58601f6f
SHA1b433a5e9d69ed681d4eed30eea313f42ea1443e5
SHA2560db275655c4a00ee9481c419566dcd4d312b47e73a43420407eb1a43f8bf4e8b
SHA512b487ccaf61cfc1b5ea8e4a2722847ab2d9211f1d93effa6ea8d9e20d631950bd3545c800a6c86638462132999f9155e274a2ba8e8970f07c86e639281e02a48b