Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 00:48
Static task
static1
Behavioral task
behavioral1
Sample
95c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37.exe
Resource
win7-20220812-en
General
-
Target
95c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37.exe
-
Size
229KB
-
MD5
6c7954215645d6137b9f94f26db92673
-
SHA1
3cfa469d13fa84d97e617bb39683f4257ee6add2
-
SHA256
95c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37
-
SHA512
1d514bfce6cc2f43e842204e9b584d2353e77ea655cbde4e1b1a37508bf1188671e9723d015a7961159e53e831ac82c04b4c10f9ca63318ba1a22e78b2e4aec9
-
SSDEEP
3072:XglLKFmWP9Uwim7ZnnFs8z5Qnbk11E9f3V9tout:UoS
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 18 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-64847641" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-97330062" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-37030136" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-84391950" winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Executes dropped EXE 2 IoCs
pid Process 2024 winlogon.exe 3060 winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fp-win_trial.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\penis32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\routemon.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spysweeper.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\EXCEL.EXE winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ibmasn.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npf40_tw_98_nt_me_2k.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\serv95.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fact.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcagent.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npssvc.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpostproinstall.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsecomr.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsscan40.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcuimgr.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MICROSOFTEDGEUPDATE.EXE winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvarch16.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpostinstall.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\persfw.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zapsetup3001.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fslaunch.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfind.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcmnhdlr.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tcm.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgemc.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsscan40.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blackice.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccsetmgr.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\claw95cf.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iomon98.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nc2000.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ppvstop.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fwinstall.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zatutorzauinst.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bipcpevalsetup.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfinet.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvsvc32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\trjscan.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IEDFix.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Diskmon.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avxmonitor9x.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\frw.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nisum.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fssm32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ComboFix.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fprot95.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pingscan.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shn.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgw.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csinsm32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msn.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapw32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vscan.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guardgui.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieDcomLaunch.exe winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSOSREC.EXE winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nupdate.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav8.0.0.357es.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avnt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avxmonitornt.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamapp.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavproxy.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe -
resource yara_rule behavioral2/memory/3060-143-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3060-146-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3060-147-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3060-150-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3060-152-0x0000000000400000-0x0000000000430000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 95c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe winlogon.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C484957455D49594 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\C484957455D49594 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2024 set thread context of 3060 2024 winlogon.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "4479" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "6263" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "1119" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "4512" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "5355" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "7184" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://s71ck530g4wr6z1.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "115" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "121" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "4594" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "121" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808a947c10d6d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d79060000000002000000000010660000000100002000000030d0b2d7e328e7dc2d015e98ed73f763a277578283e4ffa03567acabc700809b000000000e80000000020000200000003f0266cd17ec40504d104da8458fc7370af0a44e9966b9398b94a83b1f1e2a1320000000b726dee21c75b5eb3dd8c3f4379c67977724acea270291e8a2282424c66c99134000000099872490e5dc0b15897a2610d532bb3d81793abaa2245d53246f6e493e8b33b28f02f97d62d69b1d9c39cc5b2ac4f33363ec56ab0a3aab62bf40cf6177686424 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "10086" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "9112" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "5355" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "6181" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "1966" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "2031" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://24x5b239zu1q6f4.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "197" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6181" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0eb0caf10d6d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "9086" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "10023" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6263" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d790600000000020000000000106600000001000020000000133b13508f1f90a688dd6d5646c80ed23806d92b23adcc7eeba50480afc91e9d000000000e8000000002000020000000e80730d39e52a6d2f7d21ae8dedf5ced4d437747298fe3e05d9647d97e5e72b0200000007b3a0806f3420574634f48fae958712aee194e8e408dc19c6345446ee4b39bbc40000000c34bfea62298e7e0fad1bb539b467c4234b9593282ad88e384a50aa7a0cfc193e5d06c7ddd33ec4783fef7c1f2fe85d2696353ddbcf5b4073928e6f2c82933c2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e030f29f10d6d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6269" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6148" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d790600000000020000000000106600000001000020000000062e3b52633114d1820bebe72785ae9e9078791308205ea1e0d1c80a99441fff000000000e8000000002000020000000b1eb453ea9e08fea3351b6c7578dc1f6edb6479d56ca1c3abf309347ea21f93b200000001e59edaac7a8cbe5cfdb675e0a9c57da7e4260ce309831019a635e1ea63dc7494000000040dd0736c2bfe0bb7a96067431783d5c4aea3acdb4cc3cda195db74fc9ec53cfb0968f848a69f8c47aa60a4e924caea3b62cba1df9027a313fef5fe4308be3c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\hugedomains.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "10080" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "1202" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "9169" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "197" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "7184" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "9875" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "6" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "255" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "9965" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "2922" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "3602" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "4600" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://j6iq58105u9er29.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://8626auvojtse835.directorio-w.com" winlogon.exe -
Modifies registry class 31 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-929662420-1054238289-2961194603-1000\{ECC9628F-00EA-439F-8DBF-A34C325DB100} IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-929662420-1054238289-2961194603-1000\{3051D5A9-A57A-46D2-B2A0-D515D8ED6201} IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-929662420-1054238289-2961194603-1000\{8A5A6531-7CEF-4A03-822C-96CBA1EBBA50} IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-929662420-1054238289-2961194603-1000\{52857BC1-983E-4C93-8931-A5B9382D05AE} IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-929662420-1054238289-2961194603-1000\{4B2C906D-6A03-483B-A454-86896FC1A518} IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-929662420-1054238289-2961194603-1000\{BB038900-3914-4210-989D-ABD5FCACD72C} IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe 3060 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 3060 winlogon.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4624 iexplore.exe 4624 iexplore.exe 4624 iexplore.exe 4624 iexplore.exe 4624 iexplore.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 4768 95c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37.exe 2024 winlogon.exe 3060 winlogon.exe 4624 iexplore.exe 4624 iexplore.exe 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 4624 iexplore.exe 4624 iexplore.exe 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 4624 iexplore.exe 4624 iexplore.exe 3376 IEXPLORE.EXE 3376 IEXPLORE.EXE 920 OpenWith.exe 4624 iexplore.exe 4624 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 4624 iexplore.exe 4624 iexplore.exe 5020 IEXPLORE.EXE 5020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4768 wrote to memory of 2024 4768 95c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37.exe 84 PID 4768 wrote to memory of 2024 4768 95c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37.exe 84 PID 4768 wrote to memory of 2024 4768 95c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37.exe 84 PID 2024 wrote to memory of 3060 2024 winlogon.exe 85 PID 2024 wrote to memory of 3060 2024 winlogon.exe 85 PID 2024 wrote to memory of 3060 2024 winlogon.exe 85 PID 2024 wrote to memory of 3060 2024 winlogon.exe 85 PID 2024 wrote to memory of 3060 2024 winlogon.exe 85 PID 2024 wrote to memory of 3060 2024 winlogon.exe 85 PID 2024 wrote to memory of 3060 2024 winlogon.exe 85 PID 2024 wrote to memory of 3060 2024 winlogon.exe 85 PID 4624 wrote to memory of 1788 4624 iexplore.exe 88 PID 4624 wrote to memory of 1788 4624 iexplore.exe 88 PID 4624 wrote to memory of 1788 4624 iexplore.exe 88 PID 4624 wrote to memory of 1660 4624 iexplore.exe 98 PID 4624 wrote to memory of 1660 4624 iexplore.exe 98 PID 4624 wrote to memory of 1660 4624 iexplore.exe 98 PID 4624 wrote to memory of 3376 4624 iexplore.exe 102 PID 4624 wrote to memory of 3376 4624 iexplore.exe 102 PID 4624 wrote to memory of 3376 4624 iexplore.exe 102 PID 4624 wrote to memory of 2144 4624 iexplore.exe 107 PID 4624 wrote to memory of 2144 4624 iexplore.exe 107 PID 4624 wrote to memory of 2144 4624 iexplore.exe 107 PID 4624 wrote to memory of 5020 4624 iexplore.exe 109 PID 4624 wrote to memory of 5020 4624 iexplore.exe 109 PID 4624 wrote to memory of 5020 4624 iexplore.exe 109 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\95c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37.exe"C:\Users\Admin\AppData\Local\Temp\95c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3060
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4628
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4624 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4624 CREDAT:17416 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4624 CREDAT:17422 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3376
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4624 CREDAT:82956 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4624 CREDAT:82964 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5020
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5da04e7f3a2abffae30c2249110138683
SHA18d7f0f120f3d5f117d3e750918e65e259bc3eab5
SHA25682ecd308ad6605a9cc6b3873651f3a73feb6c89e32f5311131f813e4f432c360
SHA512d22e2b065f3a103982d8bac62dde5e6ea03bd571ff2c2f32185eee0944d2b5e34ef56b57ffd86959c330b4714261119f4a0b65cb7e1ca61e1b25b7ede22335c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_14F2E352CCFE495001982FFDAAC3BE84
Filesize471B
MD5eb2de1a6c4c76b62bd9b5844ac8f0711
SHA1205f8666f86cf5f699ed5c8252c46004492fa88e
SHA256d0f5a54640474e3d0383d5302a9899e8060456287379906d2359925c6d36c46b
SHA51273ee31557c3aeb79493ba51cba02823bbd9fa518c0e676c5b22398cd78149b9fb8c067069ce69d7738e63ee1792becff084bc759319e45404586b2a3100e7ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_1ACD2B4A039DF3260017F7BF28EE7323
Filesize471B
MD5ab779588f01243aca896d41395f8bd90
SHA1b8ef2d7cdc6366c283db0d608766a126dce37164
SHA2565531deca73d8380883740395d82457f4d39761134404876881242e2135b1546a
SHA51207491f64438cb412b98fc2255ff7f25de4ee4ba730d45116f9d136e4733ee48cb9e296758d4fd0aec71b8c5200fff3e5e493f79eeb76760b7688d5cb109e2397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD56699b92648930b72d3334324c6fdaab3
SHA18735957aba2a618fb73ed101e976f6e0e437563c
SHA256497220fa0f2e9b5cb01c76e3fa2df51e73aa5a79ccc22d4ba82bbbc4ac301764
SHA512c4fab20442a6c4f0b88150232342b1ca568d942198a158d91e33d1fa3325141e922f8ee01c68b1278378d0ced751bb6ebe1c193deef75830489ccc58bd84e2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_6C3CF1E05107F711011D20B3C3CC240B
Filesize471B
MD5acc6d30b2a700501317a6f710448c9c7
SHA136ed01969a43314f517bc70578bf626bb4ee690c
SHA256e6152d8d9bb2fd4c72cf23f38d9f7fb2f471f14a475ac459e84d49fc970f8353
SHA5120ab171c03327c943e68950cb3a86a0cb7276da28662103c47e91ad99d1c7d9aa64272c442e8ebf0860e027f8efbaeb75c2f44aa205fad540c6b8faf6065d3885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_F9FD6C5DCD91B9F3B4E38CA6D81CA790
Filesize472B
MD5965a43dfae645e95ef92ec6fa232661e
SHA1f4032a0c7ab75037730d8b8865e50788f353e971
SHA2568b456c52e93958769d377cc84748653ecc99726d5a9a5cf282c02133384f28bb
SHA512e5f6bbe5a998dd62a2e615b0ca6ec4d32dcde5b2010f6b4222d4020a1b6bfa6fe05f25b52c4c39f5d27b53c27d562c67c2527b56fa90d88b47685415ee46f0c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_ADE4E4D3A3BCBCA5C39C54D362D88565
Filesize471B
MD5d8011049eb378c35d9b281b7c7dddd99
SHA1d82d8d9b06f9972e3690ef6f02c8ba7eb8094dd0
SHA25654a7c32f637fc225492bf9476094cf588b33215e349a1f983a6c90c4890e26ac
SHA5124f11e36f49bf0702c640cddc1988ad794136d50576d5099338ba47444ce9751ca76e7791fa762744d0248170fb47a6dc14a55c068a7e54e23f1e81f324956e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD55a11c6099b9e5808dfb08c5c9570c92f
SHA1e5dc219641146d1839557973f348037fa589fd18
SHA25691291a5edc4e10a225d3c23265d236ecc74473d9893be5bd07e202d95b3fb172
SHA512c2435b6619464a14c65ab116ab83a6e0568bdf7abc5e5a5e19f3deaf56c70a46360965da8b60e1256e9c8656aef9751adb9e762731bb8dbab145f1c8224ac8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_871E11B76822F93FE2DBF907A5A1D9A8
Filesize472B
MD5ceb7f2392dd816131e0001a76cb54e19
SHA16416c2a788f016ff94f0a10616e443e47890e97f
SHA256517337577ada3f7f9e3da9c42ce722b5a760721d59a0404afdb2810fe252245e
SHA512765bd7e6da177e78016d7788231ba4d19f1fed3b7e86e6964abd3ed3358ba5ecd413a442043eee753a800c9784971186a5d2c707a71691b2d793c1640b8534c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_CD6513E45B8AAEA8DF3E8B0C926693B8
Filesize472B
MD5c57a62fb230234e53b81a5603d3dce29
SHA1b6646ed0fd7416598a3b4137a17af8380428d277
SHA256e411e0959fc27b02f074b3bd685a9cb507dceb7295258b05577f481b03d3d36c
SHA5129c38be22f859a63910bf01b0a8a7e862e16164979aef80e4b313b45ebc8ccf7d56999a7041ebfee7d11c29d2f97aeaf49b3a7c1849cd1372dfdc40f952f83dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_3FAEF9C2ED8948153EF5C4A9CFFD2F19
Filesize471B
MD58dada68884138da54b838679e1559b90
SHA1b4c37df199a034046baea490613619805ebcdcfb
SHA2563afb9e1ef48ee709b19957dcb06c854a7161c82dd5f7331874f6ca38ad68f261
SHA512a775dc81319145156862620dfa519bdcab6b0be5bc5efcce0a19774fd204722b4d23b87d668ebffe174a2b81c177022be243e8bbf60e418aa407a31cacaa429b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_7F226C0974B745C5C054D4151A363D5C
Filesize472B
MD5c120ef4802f4eb64e93225496ba6944a
SHA1cdebb30349fa79f7ddb7d13aac47735565ac0ba2
SHA2561bcd7dc722018962f16783f0f888742a7926c0a7e466deef174f0f4fc5eb4a4e
SHA5125b8e0794569e0160999b6e846511288ffb5ae881d843e965ba84969fbff47dbde6e3adcbd42226a28efbfa16b62099c645898910c3078c1bdf514887015c6bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_D4DDF242A8972F898C0FE0D6EA6919E3
Filesize471B
MD583f9407574c75ca600c57af0637cb200
SHA14ebabbc1900b8f575e90186e2024e48097b0c8d2
SHA2561e166ac737e5c3c015e0dc0c68115ebc5eeb53958682a9b77928ddb647137ac1
SHA51220cb6c089707e4f96180da9372bc45a3f56928f46cc5c36df723e3b42c4cd6e0063bde7ff337f79f5d39d6ca0b109f77d58ac6910f61a44f37aaebcba074228f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_C89A7CE86B947A5BDDEC66331470004A
Filesize471B
MD5a2d3925dad8ae1248c7b5d96220bd00a
SHA18b6326da45860d5f480504e23864de0c28523b61
SHA256421d30a538dc347afc7fc8eee0fa6502aa65d789eb2353eb9c9f8bd0c5f3b3d5
SHA51218785c6472c386415fe73c6ff975797e0a0c652a7e46a899f1b3d06743d5239d74cfd7393d94f49ddf9782e11807de7523292cd02d7f957ba7cc94c1a30d6565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5d669e89166e436e1a4871b6c0bc820f9
SHA1fde3782dcd9f822b113477fb05f60dac01aab150
SHA256c66d85ee591170e6935da12d73e0fc54906f7ea9673eba10896464676217baa2
SHA512465c76767dc7eb098a77009a00d055d272ae0a91d413471773de53545d8915e8fd853bd2e7581d402249c7c93b32ea229968fb7261e9b1e54a510b2bd2738e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_14F2E352CCFE495001982FFDAAC3BE84
Filesize406B
MD502807642c5da2e33bca0f7229784b7ea
SHA17a7df7def309fde1009af01f3319c19dc4902cbf
SHA256aaba1385310d72dd7be788125beb97d61ba9841790a494d67a3f4057cca64730
SHA51257b15913e510d0fb2a2e6a827602a6565081b1029f74e07dafcf71a85a2ff91f023605b58a8a0afa4def8fd0342a5c3eca38eaa509d84559b2aa09ccab7bd9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_1ACD2B4A039DF3260017F7BF28EE7323
Filesize414B
MD52c18cf1a0710184bf09267fc59783409
SHA130085c2d96223c09c9f2c377550e2948c97b1c79
SHA256c35caee1321610c7606e5f3efef7efbe0efc1e6ee95cdaca597e39abe6411fbe
SHA512968b6537f4c83ab7cb615274e1867fed1b21c25cde1f3d43f899a678f41c494e0ce68ebbc091c8133b510ec192e6e61b3b4e9b6a14a79d23524732dabe8a9978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD5cff414d563ac9c7b458a3cee05a36e07
SHA1a57eaf71907920fc8305aa80e5c66c658b2f55dd
SHA25692c370fc98605e7e8fc551e7ff2da344e727ac0c7411dedfdd82713ec54ef867
SHA512f9f6a16b58c1731b7bba4f8f1d2a4cf07017b8a151d983ff47a346a15f38048a716f954374d0cf236264c369b4d1b746d58a25e57d41f5e03307373acc0495dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_6C3CF1E05107F711011D20B3C3CC240B
Filesize410B
MD5f471148e8e74b1f1447df064fb0ea55f
SHA1f1542b1a1785e75aebde71906010767fc51dc29f
SHA256d66ada0a8a9fde77a8e09f130a89f32b9afb0859af909cecd982f7d97adf077b
SHA512b8403424bbb6b7044510253aa1c3ae149458ea2587b09d80ad12e7a1b002520266a63f48fedef651e15e70f9fe155304238d4d7c893d9aa6c4bccb8056b7f6be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_F9FD6C5DCD91B9F3B4E38CA6D81CA790
Filesize402B
MD5976892bfaec548fb7c7a6190ef12a0ab
SHA1a05750fceba93ee803f919ba03bc0fc51a629ecb
SHA256a42300420b03ca816e5947617beb4540042cdc93c682d4678e3d8c6e6e410aa2
SHA5120d2ddd3a40f4979286861c4af13f21a31ba3fd2741cd6fdfef1587e2f5ffd4265df3e936afa3b71962bdbd61af6b9168f2c163288f0b2487179b295352b8faf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD593428f534c8bfb9430dccd57fcc3b3de
SHA1bb575660507b1e18ad74c85dd95c5a870480ae99
SHA256b15a902594641c0c1727f95b5fbf176417210f801683898b320cdad72ea0f4cf
SHA5120b6dae0aa68f01c89e847c2ec124f6c6e20443e2fb8b51733837c7d68dab7ed869d4d7011c325b4beec62e5b22084fcf08c48e96d148fae6daf47248c0ac8018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_ADE4E4D3A3BCBCA5C39C54D362D88565
Filesize404B
MD54d139ec5986967624c4888cd6176a5cb
SHA15dd1f8b3f2181d0046e0e7f44c9ae0860f9764c8
SHA25618845ebd8af245ddf02dab681f2a6f06c691d7b0c3d7a76d84a098f69defe33f
SHA512d0f35bfc6ff3641a988b99e624d38d55f3727950102ed3d908f118ad96ef584359507e75e7a845a1055b61b36b9d1544b5317d960a96b20cb5eda57b09f02677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5ce9e950fe057ec33b8e1e12e1e4ff4ea
SHA13eb94d5fe9d1f06be9fdffafee1df412b7aa36ff
SHA256f2b7e69b216284294ce6f196bdaccf6a5fef9d6e49fe63a5ff2eef547f0a2eb8
SHA5121cae1b8dc651b96e635d28b70f9bf498c2ab86c49e3a2b3cf296411e1e2da218327ded4862f5cb97d24ea36403218bb761d7840bfb6f927fbd21cb160ffda431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_871E11B76822F93FE2DBF907A5A1D9A8
Filesize402B
MD53a1034a86803ffafb3a5858a0e0c21e2
SHA192ed4f050ee96441f4b3c084420565ad608ddf0f
SHA256a8c9806c396e309622205616ac7f5825a9cc1093e356346dbe5521c7bf44361b
SHA5125810ae487c8ca63a2770245753a44a25b251f75878da80d5b0497cc481c3ab07b53035a79bcf89c62b26c177d427ae1aa033d178bf4be6d96bf154e512f0c497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_CD6513E45B8AAEA8DF3E8B0C926693B8
Filesize402B
MD55ed0888574c5129e747373181a7ccfd3
SHA144e3db621c5aaee9215fa4d3df06e0dc0a0c5014
SHA25608e708eac39aede00626b2c4d3887076a00042eaafbbffe81c10abded027be60
SHA5127df8c91cca1f374e917ead4707dcae96dab5b2df86027ee96aec695ae56856bb6a22491a2f4149e273d5084a103f17244df44033b542e95c0ef9c3132b418b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_3FAEF9C2ED8948153EF5C4A9CFFD2F19
Filesize410B
MD5b87736d8cdfdf63445859b9c57d38dde
SHA104bb90de534c25cea67482ffcbcb27d03a33adce
SHA2566da78a6df47b5fd577aa0eb17c27c95071987762c6d662b9765ca2e966ce4684
SHA5121c42618370cb9649734961217f8d234aefdd5105ccf2c531f780d95d58fc5d74ff81c2ea6125028b8cce0b3d2a1c8df04237a0807fa7921a5654d78e69c5eb2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_7F226C0974B745C5C054D4151A363D5C
Filesize406B
MD5db113e9afdf9edab9a8d6f8412f596ad
SHA13518badb873601ede44244518c31b53f1805ee4e
SHA256b5175aa865487692031c1474fad8361c342aaa1d95cfd2b9944e32c11d08484e
SHA512388c713c89032a7caac6cf9e3f73da2ba3f5d5330aa0953ed304ab27e9d98f2690084717d84475c5b63d1b9037b82612604c49206ca29c1a48b43bb0aacbc0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_D4DDF242A8972F898C0FE0D6EA6919E3
Filesize414B
MD50c6dd98604a1939ccdb4a5f88d8e94bf
SHA1864c795649e1ebcf991db0d1c9531eb3bd26e47a
SHA256728c43ef5af8f5fdcc9cc896ec74b91b20743f090f64a20f228e92ad8704f24a
SHA512955f6518fb5b37ece2ab8a168e8918f4805fe071282625fb62cfb65886862ca4ad7b4321c45cadc6e3259f64db146e9f7381f940d161c72527234ae777fc38f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_C89A7CE86B947A5BDDEC66331470004A
Filesize406B
MD53a3645e95745fe9e88649279487657ad
SHA12156aaec7a1d0195f021d7f5a28f77de54888084
SHA25644076e012a17c7dae7bc1d3d3aaf424a606725cb06ec0dab0dd673a13bbc92ff
SHA51267a42d9dcbc764c7d692cee51fa23c15d9a277de8cbdf66c563c4b1db909bd7bb41e515a66ab756ee8e56850531fdb17bc11c0e232fd5390b1d663fd68aeeb51
-
Filesize
7KB
MD56195fc4c2461ba405859dcd3219e9673
SHA10e10880fc9faf79f3454b976a4fe8ccc54c5016a
SHA256e2852ea469095ccd12591d6a305c71cdf5b9ec5807e7550f066c49072178fb90
SHA5120b1660d5a10fa840c9bdd8c53aa2d4484aa9205c25e76254c98344fa365a5f8804ce61fccde9c7523e80d17f7a69f50a451c36db9b3893cd823ee8875ce256a3
-
Filesize
9KB
MD50d8f857d24ef61d1d499e584e142877f
SHA1822d9a512cf5b3bb6274898514533e312a62b623
SHA256fd1d84564eeb2dbe2c9dd5d32eb9f477ef703e88f4a6981fa1c4c70c8538d8a9
SHA5126f62f12d64488d35679210e3d98dcd10dc90c42345ae5769aed559be611259cb0742ba58b14911acae19286c47e79a8851f66c659540c5a88a555181fbe346f0
-
Filesize
10KB
MD54a520585fb0fadacc736af96f841dde4
SHA18d609b9fb81e227af706dac28b277d06fb806d35
SHA256e108603b486fa08ead0c7dc7e97170371472494cf9ccde868a29e8af1d22b270
SHA5122952692631de791078fbe1183970ee604cb601a76ef223868b427e9b657c3bc2f1eb19218f72bb54eed9b5b1226af8937574a0485c13b463521e2b125e85451e
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
116B
MD52d177c9044045a02afd8e5aa801b7ee7
SHA1b7249bde14d10dd7da4d5921c443bc3ac9625edb
SHA256c5ba2d291023ccca7ac2be8eef71978ccfe2f1c19de8ff6ed9b98fda3bd6c32f
SHA512e4643dec086bf75d19f4574e27038e4b8cd8a25bd9953c71fe6291f7b6efe0d444255055f3965f038d14bf8f12321ba8d909889dcdd8d92851fa5d9192a9a66a
-
Filesize
116B
MD59a8e1c92d4ee735511145a87093bb778
SHA1fce5d876aebe2674d9d0331fc2a43f0452c0279b
SHA2565d9ddf2c9197915494808529ae549c4ba2b22f6ebe718fc0d4b24bda64b15e48
SHA5129ea0f99e08d2b775ee325f87610929bd47060b9d5cd889327c4c17be73f9b552442e65d5e59193a7a3e29b4d5311ef00e9a73af98d039cc6010c06f31ede3c4e
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
42KB
MD5366890db672c87ff79dd22a7534643d2
SHA1e7b0da6b49f35363f125deb595ff67ccb0dc222c
SHA25638773f599cca495f0904c3d5a9981fc081b743a8d9aa106ed17e0d9b03ae6598
SHA512b05c6558ad9c1a71c3551f780a58f8f9e9d944ec1ac62713619707ee53f91b1fb1343a67fecffad3295aa859392e86f71a91d618f699db10c4a1c9c269b9e990
-
Filesize
1KB
MD5e527bd653c6ab12a65243ea7b6090d60
SHA16f4cecd8c8d38e340a81295606d4faa28d34d0a7
SHA256397380d4c94183937f67dc28fc89697fadef075f66e637080ec71545b07d65f1
SHA5129896c83694472a6bfa82c34c637c59db24d04591027df55416bd070b223230976d129d12b1d69618b6039a3b4e25a8cc9f79ad27652ec079ac80801eb7a596cd
-
Filesize
106KB
MD57e813d78fb915e8ab5f0c4837164dca2
SHA168fd838f1827a6ba808bce34aecb31857cdd5495
SHA2568cb7cda29076aedb46957f2db9767ec4a1330706896dd2dea3fdb4ce7c5e4d23
SHA512ad2f22d9fdb244069576681347ed0c98ae73e1abf4fdbb605f41b930359b01b3479cf635498dd7624f811caa39da1e153d7da7a61cc29b83ec0706439b4647e4
-
Filesize
389KB
MD5f35658481ed15bc5f9e381e5babb040b
SHA16ac7505ec9c522b239aeefed9ff6c1ff4d7c98e5
SHA256bec7e5a49219ef10544321dbd44f27849644f20623c16f05baeeeaa73e3b9332
SHA512a889492f0c7030fe1e31b79439aa5d262e14c3dd5b9eec039dc61948b563dc1e94bbb9de3b6eaf6ce22d91744fd92a249c7fbe3374f584d074849e688b6423f7
-
Filesize
63KB
MD571c2751b4fc2bdd14c9ddb960f45a3f1
SHA12ff12cf4611d1dd6b3b9a1260900a5c2f88eb472
SHA2560fb69e11495d2244539725a723358bd6aa59d242986f8b6aaefff070b698dc40
SHA5121eac711937cbc3629a280de0290f270102ca22f3d897c328fd410ee7e8134e2a10647681bbd6e8f6ce5a8c1000093b0ca4420f56c9018d79c80232b699ce1c05
-
Filesize
9KB
MD596e78f8efefc9f0db74492b73a6b861a
SHA1cca818efb118edc2545512d5aed4f890d924e0f5
SHA2563a79919561d849e65b816d41a13d9f3c0db23d5242384333e2ad509db3b16721
SHA51293a393ed64a85b3e99ce5da26765dbc2f25aa5fc455f6bd16e1e821b00ef7c187d1c043b9c998735da2e5ea6c0f524e9198e2d163b62f4aac586ac9292592ce0
-
Filesize
850B
MD5671d51c8f7b6f6920c23e7092f2e07f4
SHA1f9c0ccad26b1524c2f0438657c0ce4b82960cdd3
SHA25691b729f00e7b893e0b8158d9d786315ed01b763e6b1053d72e2d6abbb906f70e
SHA5128c88f109f9c7cd10c636615d9cc7e2e316a45ecd23d5e817ccb7ad5257011ff4749d00fe4bf8f10ed9c7ac933d777d03e7f4f615322cbae49bf82e1c6cb26d38
-
Filesize
23KB
MD5ef76c804c0bc0cb9a96e9b3200b50da5
SHA1efadb4f24bc5ba2d66c9bf4d76ef71b1b0fde954
SHA25630024e76936a08c73e918f80e327fff82ee1bd1a25f31f9fce88b4b4d546055d
SHA512735b6470e4639e2d13d6b8247e948dbd6082650902a9441b439ceacc4dfce12cd6c9840ee4c4dcb8a8f1e22adb80968f63ace0c0051811a8d6d1afb2b3c68d74
-
Filesize
7KB
MD562f2f6ad613066cf5fe2bdcc62f0a171
SHA12e2c11383ed78b3d8461dd7702fea6d4f4f8d22c
SHA256b1edcfc077a1205299509119769540f66ac10e8ff6b9e0cafa91903e57c21bc2
SHA5121d94d6499cb08d0ecc88882392670e5bf92ee7442eb9e49412c7899f4701b17f33b4048b678cf25895ce1e2def110551e9d1af2778453fef6b3aaf9636b5b84a
-
Filesize
2KB
MD51aceace0b63ef3e4cf3a349b83f5725b
SHA1fede44a511cbb7a94be77c6a3fbaf05c0ac735e9
SHA2567185ad18f6d3ea3d12c0a64a084a4bc570ba2e79ed46a1fb3427a4c29ca9bb20
SHA5126f1c7357b7cca38c3fa5fa6cc8ab4171d9b8522eb77c9ac814102a2b4711f021a6387706ec8f4da8d5c199498c4695e7289ce647373451b4d60b755fd8af1ba0
-
Filesize
37KB
MD5d97533361b6d78137ded7e6771f515b6
SHA1329895385ca3079ab503155c8a69a5a2abb83b8d
SHA2564726e4c160d779ca4f2551a93734e4dd389f79d4accd221d6cef691ed78aace2
SHA512b9b9aa95bb38a7db3f6d42494931b1720b4b42ad877f1eb9f6b56d8ac75120a0bdbf4e6d8288f1a96ab92272af5968b5de2ffa53a5cffdddd802b5f70e69a294
-
Filesize
4KB
MD5c6585d35dbe66427d2971405193e3420
SHA188f0c9cc830f31e475aa5040a44c959b6e5b309a
SHA256b7538e415e50685e667d23705f5513c5770ae627e849bd1ea3c98f5abaf336c8
SHA5120042ffe3ee3c8b62a7f9c58de72f8c27730a993f423a9daa32864102f8621ff52111a8b8f55b5e882c6e338ce3da7a4c1a46ac9f621b53c8aef95bc7e0d881e5
-
Filesize
1KB
MD59da2b20534822547ab99086173be8d5b
SHA105f729ccc7ed1b283a4996a95dc60b3b83d9fea0
SHA25611b275304b1ae874dd2e20e2cb779e798a5a665728b15e0f9af120729bf2e214
SHA5125ba9c0c0b44bb7fc5765cff051cc3d5b5d42e1ebef6a0bbb7f279d42b10850b26ea96b02c25eb13fe27943e8550ccff842db8bbf9090a947e26680056815a186
-
Filesize
416B
MD5f7864e2a2a7d53417a589ce5a6abf257
SHA1a4c9534e3d07b53b51d5e4ebee3974cc718f857d
SHA25687a6fb17dd49a08690a2e56d7089a9091ca23c501000c0826298d9dae7a863f3
SHA512dd53378a595c04dfb4ecc0203a9b3e4b776ef4df68329ea6c075907e28010ca670f1d643c37eb0f0ba7ab91455f5f9e7a61b91a1127e7d8cdcc4dcd4c002395a
-
Filesize
84KB
MD5c9f5aeeca3ad37bf2aa006139b935f0a
SHA11055018c28ab41087ef9ccefe411606893dabea2
SHA25687083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
SHA512dcff2b5c2b8625d3593a7531ff4ddcd633939cc9f7acfeb79c18a9e6038fdaa99487960075502f159d44f902d965b0b5aed32b41bfa66a1dc07d85b5d5152b58
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PREIF6EH\o-0IIpQlx3QUlC5A4PNr5TRG[1].woff
Filesize16KB
MD579db7338c58d45690d0c52191565f282
SHA1be752feda754b6a064fa01c7345d42c731937975
SHA2562c97a299469742468c68766ff4cc4756329adf6e1849f040e0e0ca69c94bf84f
SHA51217b1752b8b8cd08c603ce0b31dd9f7a4896c43ba179a982a2ca55954e711e429fee919a0ac24852ae64efc375568f7ed8f89110ba473f9f3661b41e723edcdcd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PREIF6EH\o-0NIpQlx3QUlC5A4PNjXhFVZNyH[1].woff
Filesize15KB
MD58b4d99e44a4941049ba8745dac9a02b9
SHA14a8f19832a2ebdf5fe6d908548131629bac0a3c2
SHA2562f78f2a61dff8a8178f50fae71a82d32bf9b33602300f1f495bbd547ddc5939a
SHA512a5e1a9f6250f647b3caf0a63b176692a2f8067093ca76c39e9c9810ce8aac12847a0132df44e4c346f3d69b5aeb653afd5bce399aac13fdfaf5523d400a7b3f1
-
Filesize
743B
MD5bd361461dbc83db995e644e42e59dca9
SHA17d3d5350646382e10d1fd84a3489d2eec7f1c651
SHA2564e5d6e60573346e0eb3e8368ca629af38d0d59f4e51f750724e7f95f8be5917e
SHA5128b09cd2f95cd9e50a04aca3a57942e565556cefd65d6c903321a45bf4d746f48ca3e0785f2330483a0ed52437631d9bb086e958368c3da44b4bcf3314bfd0f5d
-
Filesize
3KB
MD5220e4dc01283a9e9c5c146f984eb8934
SHA1990f408175caef6b397c247f3aa614692211c5b4
SHA256740458b82de9774c1affb4781e4b7fb11db37cb1c281b9d5010dac3f084d7b40
SHA512094deb9ec05b7c0be1ca0130ad5118482888ac9061d293c751a0dc9919b36711e536306540c47e44ec152d6c23c3395fc08962472a1d5cf5fb321ca02408a683
-
Filesize
48KB
MD599ba52a15d2da967b023016d1af58cbd
SHA15c2246049c43834d17113877b4731bd4f9803d55
SHA2569e25469f734732205f33dd80ff8ca12080406c18d2fa99a1f368103e51f7999f
SHA512d274e02cc486783eec8887e6bad67b409afd22e6d73b9ed67af88c0aa7145863df9675347a78526a8eaee68b1880240f0d938e49a3abc640d170291195c0c56d
-
Filesize
708B
MD53ceb91c3c875ca5750c7aadf7e4ece6c
SHA1041a428a64ee9d32d6da4befacf6d8e5e3f5e436
SHA2563ec2212fc76e58ec342024869548e63c5a954162535572610a184aa0690577c8
SHA5122638d74954ce8fe60b66fb9b6222b41660014426b0ff41accd110191e206764e0967a253d348a9a24417eefa6240ab2d3c50eebbeccb1ce484f359be484518c3
-
Filesize
2KB
MD55e3fff838a9aa2ef46e2e4d9fe13ab85
SHA1a6ea4b142dd129e28d02ecc0dc59edade1976376
SHA256bbb3555394a1e45cb61c59281716bf177f29a026efef4750eed9c8a21b838765
SHA512af1bf6100980f0af9243c24802fa904350193e9f31d5f43cab779e17f03fe2214cc32a6621a1b5110108131d7a6aea5d68c4c6d7f04ddee278ff9da026d2f3fd
-
Filesize
12KB
MD5a2d42584292f64c5827e8b67b1b38726
SHA11be9b79be02a1cfc5d96c4a5e0feb8f472babd95
SHA2565736e3eec0c34bfc288854b7b8d2a8f1e22e9e2e7dae3c8d1ad5dfb2d4734ad0
SHA5121fd8eb6628a8a5476c2e983de00df7dc47ee9a0501a4ef4c75bc52b5d7884e8f8a10831a35f1cdbf0ca38c325bf8444f6914ba0e9c9194a6ef3d46ac348b51cb
-
Filesize
5B
MD583d24d4b43cc7eef2b61e66c95f3d158
SHA1f0cafc285ee23bb6c28c5166f305493c4331c84d
SHA2561c0ff118a4290c99f39c90abb38703a866e47251b23cca20266c69c812ccafeb
SHA512e6e84563d3a55767f8e5f36c4e217a0768120d6e15ce4d01aa63d36af7ec8d20b600ce96dcc56de91ec7e55e83a8267baddd68b61447069b82abdb2e92c6acb6
-
Filesize
158KB
MD59b02e62faf032ecb47560c0944d2044b
SHA15c2283710f83026d0117c1d31567926c991e3c70
SHA25659190ed4208b5f4bdceb308020c144225d80d82c6436d7b9afd920c87c3315ef
SHA512c0ba9272e90b46fc9b66f747c4c49860e255f454604e7ee4b7cca4a9e29a801b0e85fb12086ce9b9dd5fe710960ac6ae023e1587c3d5ab6c31d1cf5f124becb6
-
Filesize
229KB
MD56c7954215645d6137b9f94f26db92673
SHA13cfa469d13fa84d97e617bb39683f4257ee6add2
SHA25695c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37
SHA5121d514bfce6cc2f43e842204e9b584d2353e77ea655cbde4e1b1a37508bf1188671e9723d015a7961159e53e831ac82c04b4c10f9ca63318ba1a22e78b2e4aec9
-
Filesize
229KB
MD56c7954215645d6137b9f94f26db92673
SHA13cfa469d13fa84d97e617bb39683f4257ee6add2
SHA25695c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37
SHA5121d514bfce6cc2f43e842204e9b584d2353e77ea655cbde4e1b1a37508bf1188671e9723d015a7961159e53e831ac82c04b4c10f9ca63318ba1a22e78b2e4aec9
-
Filesize
229KB
MD56c7954215645d6137b9f94f26db92673
SHA13cfa469d13fa84d97e617bb39683f4257ee6add2
SHA25695c4037d17ce1b7b134ed8e97cc39c9d263ac866bec9ff7fdfcf36e49704ee37
SHA5121d514bfce6cc2f43e842204e9b584d2353e77ea655cbde4e1b1a37508bf1188671e9723d015a7961159e53e831ac82c04b4c10f9ca63318ba1a22e78b2e4aec9