Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 20:01
Behavioral task
behavioral1
Sample
22ed4c592e077c7fb0e633b835b6d36b.exe
Resource
win7-20231215-en
General
-
Target
22ed4c592e077c7fb0e633b835b6d36b.exe
-
Size
442KB
-
MD5
22ed4c592e077c7fb0e633b835b6d36b
-
SHA1
cf327a9c097793e82bb30e2fde1d1919fb81a859
-
SHA256
23a174535a6535cc7df487c687752e319a8641ac707e90e60741ff50f88e5a40
-
SHA512
ccc6615c733c603d856d2db4a32bec9a3e0da463a3f944d223217e6779d878f1073c5fcf994088f1a9ecd046a89367b5ba78e8dbcf2975b220a8e83f5065ec13
-
SSDEEP
1536:X2n2z/NfmeGrObqqvg5uJhy1haQ2R27sbXu7VUFm10IMSPzY2y76ldFkQZbe4fyQ:wKBmZGqqvgyhy1QRZaum1HBY2uKVDf
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-53342401" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-70554750" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-28956246" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-57951861" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Disables taskbar notifications via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FirewallSettings.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fssm32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbpoll.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mghtml.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ackwin32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fch32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icloadnt.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavpers40eng.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mghtml.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcscanpdsetup.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\claw95ct.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\claw95ct.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmon016.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fix-it.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guarddog.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nsched32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\swxcacls.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atupdater.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drweb32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dv95_o.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jedi.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\portmonitor.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tauscan.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vscan.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bs120.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsmb32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbmenu.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isrv95.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkservice.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avnt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cleanpc.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpd.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fssm32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qserver.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sweep.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sweepnet.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RDRCEF.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wink.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gpedit.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\titaninxp.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sbserv.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IEDFix.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldscan.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsstat.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\prckiller.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nav80try.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lucomserver.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netspyhunter-1.2.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pathping.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vptray.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firewall.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpdos32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npscheck.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pspf.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atguard.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpf.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jammer.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup_flowprotector_us.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsisetup.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avxquar.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530stbyb.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldnetmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 22ed4c592e077c7fb0e633b835b6d36b.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Anytime Upgrade.exe winlogon.exe -
Executes dropped EXE 5 IoCs
pid Process 5012 winlogon.exe 4748 winlogon.exe 4112 winlogon.exe 324 winlogon.exe 3128 winlogon.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3084-0-0x0000000000A60000-0x0000000000A9B000-memory.dmp upx behavioral2/memory/1696-1-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3084-3-0x0000000000A60000-0x0000000000A9B000-memory.dmp upx behavioral2/memory/1696-4-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1696-5-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/files/0x000700000002304b-12.dat upx behavioral2/memory/5012-15-0x0000000000260000-0x000000000029B000-memory.dmp upx behavioral2/memory/1696-17-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/5012-22-0x0000000000260000-0x000000000029B000-memory.dmp upx behavioral2/memory/3128-31-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/memory/3128-33-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/memory/3128-28-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/memory/324-25-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/324-24-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/324-106-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3128-152-0x0000000000400000-0x0000000000443000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\E50B29BAACAA360FCC344254F83743208BA6735D23877EED = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\B9373D14A02BC13F1345A3F7BC53B8BCC98D3B04DD0CD9CF = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3084 set thread context of 1696 3084 22ed4c592e077c7fb0e633b835b6d36b.exe 89 PID 5012 set thread context of 324 5012 winlogon.exe 97 PID 324 set thread context of 3128 324 winlogon.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2675579044" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2747705773" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\DOMStorage\buscaid.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2658704356" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2884512716" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "http://751i169prf17f58.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\DOMStorage\www6.buscaid.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cfa71eb1212ca24fab6a788c17de62210000000002000000000010660000000100002000000086b5505bb39ff04c29487bedddbd6cff73cafab7347a8a2c0a64eb0691fb9554000000000e8000000002000020000000a6fb24d8d7d01b73fd3f82a56359a679f29696d88bee91e9efb7e980a58ea84c20000000239532b73a14bf1838b1b91bdcb44f5f4a49f7d402f71ca3c6eb0203b7e448a440000000cd625bbc63046c6ae639ffbe81a672404962fc4c6754499004d66d4e6953d4bb28ac8dc38eeab7c726453ceaeece003899d2d2e23f7d1e59bbb5ba02ffe3a9e5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b5c693ed3cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "2310" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31079661" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cfa71eb1212ca24fab6a788c17de6221000000000200000000001066000000010000200000001561213eda407437360eeca4c8201daf5998a595ec530add62d75e6f113c09ec000000000e80000000020000200000006fd4ecf958ad7ad07845b73f100fae1acfff91e5a6072bf44a095f5f85c1a66f2000000011ff5d1c698847a497146bcf7b028c342d4e03580f17247267bbc8d7de5778e840000000af4f95df5b4147bede5af120b45b74a44bf01a6f1e105b53f7d05e48981d4c749b844b8fb1fe7bdd1cf04101af2e53b22cef5b9cfbe441d8f0f17abe94de25c3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Local Page = "http://c1133rx13xs0o62.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C7E8807F-A8E0-11EE-9ECD-CA152A8DAB80} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cfa71eb1212ca24fab6a788c17de6221000000000200000000001066000000010000200000007bee53fc41f097ae8ea45e731494a2712a77fcb9839b4a0ea23a2a31048a800c000000000e8000000002000020000000448e8a1edaaf6dcbc7ec9e57c00a897cd06fbdb649ce4a341e06ef4d48e8c303200000000db98aadb69a29b1bd7fdad6e1657fd4dc3ae493ed71548554032ef97be98a2c400000002c055a047c575bdf2452714589590c6142507fd507bf572529ee290c3f685838ed894dbc0941806ae5858e19579f779e4026478296aedaa84cd2122d7a25344b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\buscaid.com\Total = "2310" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://l57z75lq5na7i92.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\buscaid.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0af3ab1ed3cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10ed2d92ed3cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2658704356" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31079661" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\DOMStorage\www6.buscaid.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31079661" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\buscaid.com\Total = "1155" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Local Page = "http://bz675x42qr6enjh.directorio-w.com" winlogon.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705d06a3ed3cda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2058c39aed3cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31079661" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "no" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://r1a7448v0qert5k.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cfa71eb1212ca24fab6a788c17de622100000000020000000000106600000001000020000000f86c3045c03fe7f964cd1354c0da88efa369d9f0dd8ce8c9dd82263eb190c14a000000000e8000000002000020000000e37318e4cb849aa9c5933424ef65893252700ea49faa5d12bab2be0a7a0da7be20000000173c96fd0e394adb1f12f52b35ca41d5398807a3195f9d42e7341398aea0258b40000000f323a8dd849504a1e956652b27f8236014fbc6dd62e01e690113db23102085d71761c56ae7cc77dae4c5e90beacc85020ac418edb489e9689076b0e9ccacd6fd iexplore.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cfa71eb1212ca24fab6a788c17de622100000000020000000000106600000001000020000000149249ffa1681f66b7a7363069f235de749a8e88fb4ff47523c6917564edcb60000000000e80000000020000200000003bf875321250f4dec2521d26ba1af8f9a3a0ff8e15d85748820a88f86fe2ee802000000046f74ef8d58daed461b1a41f55cfb69b7cd242d95785c23ec1feb87a7851b8a8400000005cdd95b84220b9bdb17cc02b6459b33a1e1aa0d1c1f325d23784f969401568fdafcbd6570046f36ac0a61d4f906d0a46522a5ff34cd598cc4d4fec0ad1902077 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206ec5a0ed3cda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60db05a9ed3cda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40024491ed3cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cfa71eb1212ca24fab6a788c17de6221000000000200000000001066000000010000200000005a560a681eed1e55f3e8fde33820684f5bee9696338ba60242878023f48e3dfe000000000e800000000200002000000012edd41acc0e5274d6f79d7b3ab0184705ec53229b665b36f6a07376f62ad1f3200000008778f027800db9f675ed10a46a34ac8afd033890946010365eeee4b0449a6147400000001a53fe9d27e85e485cd469ed7ef626b8c1ce2a938f1e9fde30756d66fae312da65ebb4255a4f9efb10eb4c10308db73b2b382987d2ed66bebd4292718c774b35 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cfa71eb1212ca24fab6a788c17de622100000000020000000000106600000001000020000000c4e7c7e8cdcd374d7d7587dccdea13202aa9206de6fdff21d2f0b869742ba2f1000000000e800000000200002000000079d5a687ba8971e9294b324d342393dd1841204ca6f1335cd5ac8b7fba8332492000000003002d86145372b4727a5d87e8998a33356a1a09d225a2a729e24b213706d559400000001ad120e0e483e4bec42e6ca83ad4ff003a1373e7f6c219f441d30ddae82c7fb4df7f355a809d80be67568d974d7c3af17ab8bab22934a51c5fe1f5d193ba84f2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cfa71eb1212ca24fab6a788c17de62210000000002000000000010660000000100002000000009643777de7472f007f6b77790ebf6ed5eded05a740f33ee613ed890fa6e3f15000000000e8000000002000020000000ba2fcc63709d980e6b0a6ed699b9d585f4a24c385d9be950b371f11c4dd00aad200000007e276ae9109246f0ba99479068f8d29d7a2535297aa36cf2e8c0641344e7e6a64000000086bb3d70d657bcb80e4c7d6d42b32263978d5788363b395e08477acf29ce4206c789be1f9fdddcc019b973ddf3ecb66d525e59f846922978fa414691071fad65 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "1" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\DOMStorage\www6.buscaid.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31079661" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Download winlogon.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://fe43f01m6k886ha.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://ffzux4oj8q9r8p0.directorio-w.com" winlogon.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3128 winlogon.exe 3128 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 3128 winlogon.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3140 iexplore.exe 3140 iexplore.exe 3140 iexplore.exe 3140 iexplore.exe 3140 iexplore.exe 3140 iexplore.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
pid Process 1696 22ed4c592e077c7fb0e633b835b6d36b.exe 324 winlogon.exe 3128 winlogon.exe 3140 iexplore.exe 3140 iexplore.exe 396 IEXPLORE.EXE 396 IEXPLORE.EXE 3140 iexplore.exe 3140 iexplore.exe 4336 IEXPLORE.EXE 4336 IEXPLORE.EXE 3140 iexplore.exe 3140 iexplore.exe 4064 IEXPLORE.EXE 4064 IEXPLORE.EXE 3140 iexplore.exe 3140 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 3140 iexplore.exe 3140 iexplore.exe 4336 IEXPLORE.EXE 4336 IEXPLORE.EXE 3140 iexplore.exe 3140 iexplore.exe 4952 IEXPLORE.EXE 4952 IEXPLORE.EXE 3128 winlogon.exe 3128 winlogon.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3084 wrote to memory of 1852 3084 22ed4c592e077c7fb0e633b835b6d36b.exe 90 PID 3084 wrote to memory of 1852 3084 22ed4c592e077c7fb0e633b835b6d36b.exe 90 PID 3084 wrote to memory of 1852 3084 22ed4c592e077c7fb0e633b835b6d36b.exe 90 PID 3084 wrote to memory of 1696 3084 22ed4c592e077c7fb0e633b835b6d36b.exe 89 PID 3084 wrote to memory of 1696 3084 22ed4c592e077c7fb0e633b835b6d36b.exe 89 PID 3084 wrote to memory of 1696 3084 22ed4c592e077c7fb0e633b835b6d36b.exe 89 PID 3084 wrote to memory of 1696 3084 22ed4c592e077c7fb0e633b835b6d36b.exe 89 PID 3084 wrote to memory of 1696 3084 22ed4c592e077c7fb0e633b835b6d36b.exe 89 PID 3084 wrote to memory of 1696 3084 22ed4c592e077c7fb0e633b835b6d36b.exe 89 PID 3084 wrote to memory of 1696 3084 22ed4c592e077c7fb0e633b835b6d36b.exe 89 PID 3084 wrote to memory of 1696 3084 22ed4c592e077c7fb0e633b835b6d36b.exe 89 PID 1696 wrote to memory of 5012 1696 22ed4c592e077c7fb0e633b835b6d36b.exe 92 PID 1696 wrote to memory of 5012 1696 22ed4c592e077c7fb0e633b835b6d36b.exe 92 PID 1696 wrote to memory of 5012 1696 22ed4c592e077c7fb0e633b835b6d36b.exe 92 PID 5012 wrote to memory of 1532 5012 winlogon.exe 100 PID 5012 wrote to memory of 1532 5012 winlogon.exe 100 PID 5012 wrote to memory of 1532 5012 winlogon.exe 100 PID 5012 wrote to memory of 4748 5012 winlogon.exe 99 PID 5012 wrote to memory of 4748 5012 winlogon.exe 99 PID 5012 wrote to memory of 4748 5012 winlogon.exe 99 PID 5012 wrote to memory of 4112 5012 winlogon.exe 98 PID 5012 wrote to memory of 4112 5012 winlogon.exe 98 PID 5012 wrote to memory of 4112 5012 winlogon.exe 98 PID 5012 wrote to memory of 324 5012 winlogon.exe 97 PID 5012 wrote to memory of 324 5012 winlogon.exe 97 PID 5012 wrote to memory of 324 5012 winlogon.exe 97 PID 5012 wrote to memory of 324 5012 winlogon.exe 97 PID 5012 wrote to memory of 324 5012 winlogon.exe 97 PID 5012 wrote to memory of 324 5012 winlogon.exe 97 PID 5012 wrote to memory of 324 5012 winlogon.exe 97 PID 5012 wrote to memory of 324 5012 winlogon.exe 97 PID 324 wrote to memory of 3128 324 winlogon.exe 95 PID 324 wrote to memory of 3128 324 winlogon.exe 95 PID 324 wrote to memory of 3128 324 winlogon.exe 95 PID 324 wrote to memory of 3128 324 winlogon.exe 95 PID 324 wrote to memory of 3128 324 winlogon.exe 95 PID 324 wrote to memory of 3128 324 winlogon.exe 95 PID 324 wrote to memory of 3128 324 winlogon.exe 95 PID 324 wrote to memory of 3128 324 winlogon.exe 95 PID 3140 wrote to memory of 396 3140 iexplore.exe 106 PID 3140 wrote to memory of 396 3140 iexplore.exe 106 PID 3140 wrote to memory of 396 3140 iexplore.exe 106 PID 3140 wrote to memory of 4336 3140 iexplore.exe 111 PID 3140 wrote to memory of 4336 3140 iexplore.exe 111 PID 3140 wrote to memory of 4336 3140 iexplore.exe 111 PID 3140 wrote to memory of 4064 3140 iexplore.exe 114 PID 3140 wrote to memory of 4064 3140 iexplore.exe 114 PID 3140 wrote to memory of 4064 3140 iexplore.exe 114 PID 3140 wrote to memory of 2976 3140 iexplore.exe 117 PID 3140 wrote to memory of 2976 3140 iexplore.exe 117 PID 3140 wrote to memory of 2976 3140 iexplore.exe 117 PID 3140 wrote to memory of 4952 3140 iexplore.exe 118 PID 3140 wrote to memory of 4952 3140 iexplore.exe 118 PID 3140 wrote to memory of 4952 3140 iexplore.exe 118 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22ed4c592e077c7fb0e633b835b6d36b.exe"C:\Users\Admin\AppData\Local\Temp\22ed4c592e077c7fb0e633b835b6d36b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\22ed4c592e077c7fb0e633b835b6d36b.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:324
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
PID:4112
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
PID:4748
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:1532
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1852
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"1⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3128
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4316
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:3464
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3140 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:396
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3140 CREDAT:17422 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4336
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3140 CREDAT:17436 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4064
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3140 CREDAT:17448 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3140 CREDAT:17470 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4952
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize2KB
MD52fd20cf640f170f6f9e50b3f8764adf5
SHA17a717abad922ec81d8b1d7f521f09a364f991fef
SHA256100fd4fc0e225ac37caafbe3b62aa31457f7cbf0feda8eff8f2ba8260ca100f1
SHA5124e9b00aa591ebba91bdbb9cd6b4cc95200adfe3115f9e2f2e4f94a586668449196bafb3bab6eb1e05bc0f28e5d7365a937de7262648b68e7c799de3daaaaf5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5034ec3b760b9b922d37ec2d86820ebfa
SHA170ace12a56aa61e58f53ca2a3de71ff18966278d
SHA256015e7444eb0fdf2cae85aef5c1d3d1aee98ed7e692c848ea45bfec3a35ccd821
SHA5121257126cb3ffbe026affeb47918d546df4fd018b1ef53971bfa8ab53c67106d7dbbed03695340c8b5a446fec87ecd100f264966d934a0982586bc45a7c38188a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4194B9AE46C114BDDF294320C9A18080_841639E9A456E9B6065D38732CCDB60A
Filesize2KB
MD56f61c088c691e7400758b83d4542633c
SHA1e05ccea74f705a523a4c9a8ef7145ac3680243b8
SHA256439e80160a98c29ed2acb4ac2b7ee37db6f03030fc7ca458a48b014ed86d415c
SHA512404cda1440e1c42dcf85e095f7b75d332ddf720747d97b1fb666388bdd47a2f0a8d9a946be2dfd1b6f6160649477e1e60e6636eff3b46e9fc23e8d292cb3adbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4C63C631CB69C697A2A5285BA3E91193_7323C382CB7251028A352929BA71EA20
Filesize2KB
MD56d2df5f753256ecc785790e2d9e8c3e3
SHA198a9e08c18c0806486d44ea7d5696f8ff140073e
SHA2561221ac34e29cd130938afd95c134667636a72f827b07ae34e08e14ddf6826cf7
SHA51216d22596678a2987c98dd9ab8fbec673a6f745805d319db1cc2ffa5a98f300a0472c099d19bc108a2a7064e412d03ec75d2e8bb74019d352ce0a2bd3d2185223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
Filesize2KB
MD5786641eab5605c71acb1b0e965e24a52
SHA1352c68af00ac4612b9a4c843d3082c3b0b6283a4
SHA256239c8cf505083d95d0b618bc42e9bac2be3ac6722f4135ea5df8828e65fb5ae1
SHA5127c5c94a0adf932e26bca1c9b146207281a4dc88b3c78abf0b74e9951c4292f74c2834962d728c25cd5ad6f50cfd5773fe374891a8091a711a89de1cae3b8bb96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_BF65129E34A9A67CDB29CEA5E724F901
Filesize471B
MD52dfc345a589e768587b94840399e23cc
SHA1f644cd45f8926d1953d76c109e2aac7317e87c45
SHA2568c73357beda9f544b2f5629d9f25cdc8ba66844cd6a9635eacfd551bcb3a87f2
SHA51213da69ebd70ecf7e83c19c57962c365600c07165cddbfffba49bb9ddb98d74ece574b834af2b1ce7d580cd7e1491e3abbba3b8e4797c1816834fac9bcd942a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
Filesize2KB
MD511fbf26287a78e0341851f3ff34a6ded
SHA11a13e5430721e93b7f96a132bb9d28e86039498e
SHA256189af780aecdbc551af928656fcdce4eae516a6f706bd80d396a3bf56b0fd752
SHA51291481a0ad4fbb9316c37f4848a9ea1168d000f78d2a079c9d84a0cf414015714b67a045931e9b4aadbabf68f2436850f3880f176d46447014f33a02366501c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_92A59A0F4F7E0452583B0BE3284C67BD
Filesize472B
MD5a3930db1f02262334959962811502a5d
SHA1fd246bb9bfd64c1631f90f1657d4bc5bfe259916
SHA256eb4e9c31284f20078691390b9edd574ad0a4388902ecd005f007851505d4c94c
SHA5129ae8f992c7c2eff8faaf7cce51c4b291411607f309ffbcf014d28f8975fb0af527a83d750c8255fa1aabbe50f0a5f9604edf793df8814bf34d4da3c4e21fe1db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_EC50BC49A28D68A36F5274F1BD1417C1
Filesize471B
MD5f9316828e653bc1dd791960b52d75869
SHA1a46c071480fec9b7b21a5497f66474457e86b3b8
SHA25632b8482bd5bca4d0df9617f026ec5ff2754e3a495c13fcd3b9f191363c195d5c
SHA512b17b038318bf5170e993353b51a02036b043114b973f51f33e9a7b5b008d86158edda60aa5e9b1efa174c1ba7e48eaf60cf0b9f0bd4a4f6fda3ecd468449d569
-
Filesize
503B
MD5771f935e63a869a4cc26b3aa21dc9e7a
SHA1c8803ddbc6e6c89d4a88a5da966d4f271c45256e
SHA256c091dc15515a4d62eb6f020c09422e10c53086d86b97b34a05d7215c4755ea9d
SHA512766cee34cbf39c2165d5e6aae6fb0469ec7092c11fafa78e6ac58d72b4eebbc66560020d3034213a43622eadebc8960c5d48778967f6f6f3d5a2a9597e70c877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD54c1bdd8e9cc8dd62c64d9270f87992b8
SHA196a86ca5c920dda4d4cbea7de40f0b0fff7caeb7
SHA25684e4009f193fdc1bb229ce162dd4d3c633de5b9b15c15dfee3d526a1c12310e6
SHA51284e45d5a17210be27b586ff08303229e6fd273173e6bbf926ca74abfcc12765ec159affde1a6a9cac7cf5a7628190b153754f03a65ee189d41303e18f6319520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5c962a405d87f2fe6485dc2ddcf240785
SHA1e43f16c558490081f652c5b81b0cc9ec264f7828
SHA256390b1452f2f49616564d7e5837e8c26a5a0a845d8f8cf3eb44269d24235fb73c
SHA5121f1de87f4abca77d3a271c8720fde27472755debd95da984c4b6a22776e90525b5e749659dc312fd42e0f73c725ae37ea3e605e3a7025b431d45f3edf3749e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize450B
MD501de41a1d3d75be1abad4b22f186815a
SHA13a8726e807d6b3eb078ee42666b5523adb8db3e6
SHA2562077bfdbe1111af2ee3fa0fb6513f3b800155a62a7499c774539c472dddd5157
SHA512347f0a34dc4971f3eae8a83992195a7f86f2e548e2441ea0dccd5b3f93c8b79f050ce74fac5639a04429f40aee86438cd495b17e4a062f77f4c15cdb4823d90e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD589e2b3da126ae1dde74751f4d4b2e4b1
SHA1035933491bd992efb4df16579f39653cd70d78a1
SHA256247459bd1c8169ee2b7b730921ca82b5dddda6a4f8b597a0fe4f8198de1e2dad
SHA512c85260e9265ecba8cfe61fc134d9bb8d1102383675bffd3ab7b134980c39d42a47e19808a4dfe9da8f7e0eca589badfc8f8d8f2d2bf0adfdaa8954dd79d8296c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4194B9AE46C114BDDF294320C9A18080_841639E9A456E9B6065D38732CCDB60A
Filesize474B
MD583561abaff351dce775590cf85905f30
SHA1e6ec5a40077405c6ef5dd8a375e3510613b788f6
SHA25655bfe6515f5adb2e7bd697be018a8decfb998f72c2bd3825639a4c6ba091df72
SHA512d8fc289ed07e98b2712715d70e4c3681e50c133319a19b5702eaa70343e3e3b63918b4cdbdec4ccbf2a94d3d65578d3d41de5b31a25d8d28b92c2cdd8914a514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4C63C631CB69C697A2A5285BA3E91193_7323C382CB7251028A352929BA71EA20
Filesize474B
MD5c2c0d3fc9265ff2ec11438ceb998c237
SHA1fff9359c8bd46c56a17dd0a5461828cef78d8eda
SHA256943eccee9f9ed0c6e7e9f127bd15c6936e8192ef830f36c2e07183e26b820519
SHA5126a10f6c9ccd6cc14e62d7009f2f7be39c3e41a6202ef752c18efd6172d098e07537fcef27daae64baf915790fb5ed446f7a0325fa5d78702028599aed97146e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
Filesize466B
MD5937941c6d8ca9460659be4d8aad466c4
SHA1bafc53628d95dd63fb3302405385a06ea7abd03c
SHA256e6273e2f4c9c24709abd631f95d9328ad613210695e977f20a17f5f1a303d223
SHA5127c69b8a4aadaf332007a3dfc96754dd363cc0021a2d0c30d6d4a9b3db0bebf8a128b0cdd38b28d40b6745e58a06c8e10ecca6882b89a8d1e360385e38f5e0978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_BF65129E34A9A67CDB29CEA5E724F901
Filesize414B
MD55ecfbe6ff14eccf3bbe040047f69bba1
SHA1725d73e65900ddeab6529948192493a4387286c9
SHA2562186e67bf167406831b4c28d8d65a5ee6ff75e90d6b67408d0f69d6a64481ba7
SHA512e624ba5a76010457be57011cf6bff4b4769930367b53a8007d060437a9cac71a6851c1aae820110b212e42ef68c7964cf165d9e48e758ae0215bd10cbb44b35a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
Filesize470B
MD59c5c10aed0400314467c9aca68d8dfec
SHA12c4b4579215d772ee2713d6f3a8b3ed3687073b1
SHA256c02dc3b78ed2f29281af5bd0b2cea7bbcedcde6d6fd9d5d42d6fd223b7f18421
SHA512410ce4a16e8475a90bbde1778c27d05fef6c3b0d6f1d69b5d7cb9d551bea8edb58abbd17a2f15dd1a2032bcfc02b7881c18ea2b04966abc15e9dd552330f3405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD567c1cdc2a5a75d187e2c61e643e49aa6
SHA12e84c36100beac2d97cf3827b7f45cfa71c192dc
SHA256c7c13a79d3e0a9f62dcdf3e695cd9404eea867862b42b606f80a6003806afe4d
SHA512d13e991ebc351319bdb63c68cb1859d43e82df01cc7d56a59abdb020a773161ce85fa2d7bcd5883cf2c99d89c7f62a55a8603ca74d24a0c9ce51c3a384aa06e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_92A59A0F4F7E0452583B0BE3284C67BD
Filesize402B
MD5e9d10755e7201add4697c57830cb2c81
SHA12b9e217d28384372bab9af0de6d1c4c14de9db4c
SHA256087d68813f7170e84915d0fe59f4612b0769505112448f98a3949917616ae8cb
SHA5124c362c252f9fd02d8a52f0c7666c99af65ac514e735fef578f15e4379627e55c80c36b0b728c13c40a47526311af7cfefcdc98514241022927180a3d141aed48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_92A59A0F4F7E0452583B0BE3284C67BD
Filesize402B
MD558bef9c14ef4ed3e8fccabac39ecbfd1
SHA11a82d6f5873c9dc5ea6db8cc6531efb61997a626
SHA256737143b2d2f780c98ef5a3396bda311fe6e3d38d4382940190cd272f6586f8e5
SHA512c3f2fcf4c9ae73a211c881cdc604e2c01b0a3ad658532b432277607401e2b6d261a33305f6b4d378518a6cae6fa190e100e7ec96802fb980eb88543ce289f442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_EC50BC49A28D68A36F5274F1BD1417C1
Filesize406B
MD58810079de45e98ceb9139c5921a6443f
SHA1f5610f497778948ded8f1172385ec803aa8a6a67
SHA256fb59f6b377cb70d7787d40d3684094144edbf26f120f95dc88d4b9e657d0161c
SHA512b94db38c94df42c60b1f92e900dd15e24365a4061b1d9297bf3a81cb2987dd430a5955ff88f405d8e7f6b462736c1a994302af23e04e6cecbb5da39193b78ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F99C0D51EDF8C3A2E41E08D1D1F9F528
Filesize556B
MD5cb2023eef3582e3ee45e0b3b089b9726
SHA1c43402522a723f1b7634ef0f534dca8a8383486b
SHA256445a92d3ecab66d866b16f24977c0d44fba7b3ed820f3b54fab9a4589003e3c7
SHA51282e562b660ecefc60ebe358b590aad095c335d7b568b54c0c908f5b56a3967ff24b45ae63820929a55def47fb053085694ecffadfda2f95f79b926932f00a157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F99C0D51EDF8C3A2E41E08D1D1F9F528
Filesize556B
MD59a27d94f203e5b68f17df6c06c5b1ebd
SHA1d9e21e384fc766470e9bc94ba76f4979545c1bd2
SHA2566626ff58593f54cde3f691e7295ad6043c89d6154ed910f36f418e60f17a5aaa
SHA51261f86d88957355a45aeacdef2ca612f97e44eb4e95ec72d09846d5555a737eefdc88d2df7de67d4904c92e15a2e26192008b37897fc7f55d7e4b91b94091bf81
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
1KB
MD572ecab3fd9a3a1786fdbbd40e63dcf4e
SHA1d5740e604040584cb38765edb54158ef8c768727
SHA2569f57b9683a4d28566cd44e450cd1ee0469cd50f16612396c64a2d70bd89f8e4e
SHA51244bb93ae0dafff9d8b68a18031b8594b38fe0334f6fbf050fa0bb4a16d2242993a1a061e89b660b82ef496586449b9272d57c757fffdb8e4cfbef1927610ca69
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
145KB
MD502e1d7d22ce77a26db2d31e0ea226c4d
SHA1589e90664548afbd0a6bd50624e06511989ffc27
SHA256b8c187466021871117db097cde92e79d559f9c28804015bef784dac6c6d4e8df
SHA51294ebdcf9e9d2f13676ef2b997e5a6b6b27b9bbdeb71c207b8269ac629a7d08b3503774f05123e30d0b9aa823660a6c02cffe7dd11fc39b3d0e7e253e3c8950fe
-
Filesize
4KB
MD5d65ec06f21c379c87040b83cc1abac6b
SHA1208d0a0bb775661758394be7e4afb18357e46c8b
SHA256a1270e90cea31b46432ec44731bf4400d22b38eb2855326bf934fe8f1b169a4f
SHA5128a166d26b49a5d95aea49bc649e5ea58786a2191f4d2adac6f5fbb7523940ce4482d6a2502aa870a931224f215cb2010a8c9b99a2c1820150e4d365cab28299e
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
872B
MD5b9f896d1e894ea8c4cf775ea3c9d80c7
SHA10d95b32f92fc7ec274cd9303433cd6e5e8fe45d0
SHA2567d78c60684e133cfc188ab2bcf99d53854ca904a0fa07d7327dfbbbfc51b559d
SHA5123c4345bb4d61a5923aa5a97d1489e1f4191a46e73d99f130bc6445c16ef6124857aabda49ff16a93ac9c1ba4c89df2ec88dd01978749ccfee97d6fd42401c235
-
Filesize
872B
MD5002ba394f6f2d7cba085007f3c454618
SHA156c0371365dcd982362c3d6978c603adcbb35589
SHA2566eac15db9b012605414453c215f79e7b57dd369af8014b22c4886bce8c61609a
SHA512cdc9d2aef700c55434920d44867555d28f680eff26d60f491596f0a3443d80cca1872b61c369bc5bd709dac3c971e88033e9fe5eacc825d4d6814e0395feac53
-
Filesize
872B
MD57ac0a52352e273a7b40c0b916a2e11f9
SHA1ffa28dcc8043fdc7cc7e87978edb95a8c6d201f7
SHA2567cb492d6992e21532a98da0f888aab055ce6a63996f7f5117f87a23f90c427e9
SHA5126579df5d8d9d4bfa52a18f46420ab068f3e95eaa2da417c9b18a0e3f2b8b3b75f7563d3806c8451674d901a72072a5c589c20aee6ee638c438c92493bfcfd256
-
Filesize
1KB
MD50b1cd114b167a6c0cd7d896ee0fc0233
SHA105d94767c1502e39461cb33b2888a0d8163684f7
SHA256a67219b74655e4fa4cc0afe9b039133647dee6a0ead0436b18c4b19d8a5a9f5c
SHA512e7ef02fd69e370457071201e74b859ff5702e36382660a1cc5b20f34674a29d76d0e2be478cd248105b03f522e1ec8fa847b022074e81518ed9bbf91b74cbb6d
-
Filesize
872B
MD5efb6a32ce7fcdbf87f656cfb1d75e04f
SHA1f44de31cac8c7c812e0eed2f30a8cde0d3e49eb6
SHA25683842371dcfe17593c167edc08c63383e105967450cb15dc489a118791ac1733
SHA512b0075e8e37039062317367b260420d83772f0a8b67794df3bd6f1e8824a074883a143f9d00e78fb4968b39f8d2a5b9115c4397c6f3280d820e92dd4939f517ab
-
Filesize
146KB
MD5d3799d79e6fab08455cd6ba8a7ae71ef
SHA1a1def8b8dbf5a89700ac0c316b0b919a4b773309
SHA2564bf9c54918782690aa666357beab40c94fc009460b0aa5a95e182db59ace5d89
SHA51283921d1c7cf5a52d205f454c6bb3c60d6c30785f08843f922ba429df71f88e9dfa1bd7d0bcc40ff5d9865e45bc175b63717c72bba4bd5e82c9467606f4ce4beb
-
Filesize
6KB
MD592ab50175c4b03970f264c637c78febe
SHA1b00fbe1169da972ba4a4a84871af9eca7479000a
SHA2563926c545ae82fc264c98d6c229a8a0999e2b59ed2bb736f1bda9e2f89e0eeac8
SHA5123311f118963ad1eaf1b9c7fb10b67280aae1ab38358aed77c10f2587100427af58c7d008abb46ad0f59880ac51e50b5a53fc2c2a96d70f5ece4578ab72382b7a
-
Filesize
9KB
MD502d22d2dd35cf95e10e23f125eaa7b95
SHA1091e8a4af64d8b3cbc5585d06bada5f68533aa6a
SHA25640aa985fff517e7a05ee929863678f6ead2ea89c96240f378f643cbe205158a6
SHA51263a5a38a5acf0da233910ffcd796b36c8bd0209a2a479a8f76311e0132f54608af24230d42421aca1bb5d4d42d7e78b6bad1fad84560285c8bf35a1c81636b4f
-
Filesize
2KB
MD5f4fe1cb77e758e1ba56b8a8ec20417c5
SHA1f4eda06901edb98633a686b11d02f4925f827bf0
SHA2568d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f
SHA51262514ab345b6648c5442200a8e9530dfb88a0355e262069e0a694289c39a4a1c06c6143e5961074bfac219949102a416c09733f24e8468984b96843dc222b436
-
Filesize
146KB
MD50b5819b903639cc259c92636799d165a
SHA1550782cda3c88170ba2ffaf93383216608b6b583
SHA256c1ac1d06d35bfdf8b8db5d44948f808101fbb2a428e4308710987615c94fe775
SHA51233a16095781247ab52bbe3c9aa5cd9edd1095d4e5a6420f13e23c47ede633fbff903b2ed0c12a9bd2d67c91c9d37591c600fef5e6bf8644afd3a4f0144b454fa
-
Filesize
476B
MD5d2183968f9080b37babfeba3ccf10df2
SHA124b9cf589ee6789e567fac3ae5acfc25826d00c6
SHA2564d9b83714539f82372e1e0177924bcb5180b75148e22d6725468fd2fb6f96bcc
SHA5120e16d127a199a4238138eb99a461adf2665cee4f803d63874b4bcef52301d0ecd1d2eb71af3f77187916fe04c5f9b152c51171131c2380f31ca267a0a46d2a42
-
Filesize
872B
MD5327bc880d9e0be0ee53eab194f717873
SHA16d8c06764d001e37aefc6ba62590e9c79ec8e702
SHA25670dec4e02421438401f5bf01dc3ac1530b58dc43171a97a0fcd59ccb880b4288
SHA512d8f901c1f4a0e0e8574155f90b4b4175e894ad751bafd9fc459b4023b695a1e6565cab340675bd54e7071064042ae060d9deeda9dfd3e00a6c933a8eea06edf5
-
Filesize
145KB
MD5abafa0849308459af6d9407e8113b991
SHA1ce0b4e1c84fdae81f302e3944ffabe95922cdba6
SHA256dba14e89fd4e3f93c81704e1dba22cb195387a59c91392a36e47a4dbbe75d798
SHA5120715074eba2f8809b473189d6b941d54bc0a84796af7dac6cf029c48e911d75f74f7b0669e79902002b448511ffbee7ea53cce68fd8ad9c4af522dddeaad2709
-
Filesize
145KB
MD57c3436a58816542d224f1fbac2613c76
SHA19c25441ae757323a10826012edb2d934acd84acc
SHA256897afc7294feac4b7766c68620463889f318dfd538197a8f35d0f475ea05adff
SHA51283e3209819fb7c37fdcd3aafb4107207059f8bcfe3165022ac6a4f897dcece076fd1f098d283dd6f66a87bd49446e645dfafae7f08a6183211e1b261aa9eefbb
-
Filesize
11KB
MD59234071287e637f85d721463c488704c
SHA1cca09b1e0fba38ba29d3972ed8dcecefdef8c152
SHA25665cc039890c7ceb927ce40f6f199d74e49b8058c3f8a6e22e8f916ad90ea8649
SHA51287d691987e7a2f69ad8605f35f94241ab7e68ad4f55ad384f1f0d40dc59ffd1432c758123661ee39443d624c881b01dcd228a67afb8700fe5e66fc794a6c0384
-
Filesize
712KB
MD5ba416ea9ffb635cbb81483ae66bf2406
SHA162c44ffcb7e0cb6a32c4875330ccf2838ac436cb
SHA256a252d63df7948cabaf1ff46f713dd01958c73805e42a3ce8bceeb741cf25a97d
SHA512488871af0f38e6039dcf3a9ea0ee6eccf69d7acd9787bc7923ff87a15295c905e0b00afa68f23d0562ccb4eae307f4de620ab84f06e3eb8cf443f0f6ea24f3ab
-
Filesize
442KB
MD522ed4c592e077c7fb0e633b835b6d36b
SHA1cf327a9c097793e82bb30e2fde1d1919fb81a859
SHA25623a174535a6535cc7df487c687752e319a8641ac707e90e60741ff50f88e5a40
SHA512ccc6615c733c603d856d2db4a32bec9a3e0da463a3f944d223217e6779d878f1073c5fcf994088f1a9ecd046a89367b5ba78e8dbcf2975b220a8e83f5065ec13