Analysis
-
max time kernel
155s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0.exe
Resource
win7-20220812-en
General
-
Target
aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0.exe
-
Size
228KB
-
MD5
925e67d8b0fb0ab91fc17be72fff8dec
-
SHA1
defc546b9cf066dbec5afb4a5d4212506ff49759
-
SHA256
aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0
-
SHA512
51282afe448ed81c82adb3763b3ea2873dcc3548e9886fc98408a3630a73a07d8cfeddc68238ec042e6da5e719baf1f1a95aee79c40b541ff7d6181bbcf46843
-
SSDEEP
3072:bsWRPxlwus4+jhr2Cvt5miRWJgQP8w+xDOEfout:bjPxeFfoS
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-9149336" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-38044845" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-25866013" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-12095993" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Executes dropped EXE 2 IoCs
pid Process 2468 winlogon.exe 3848 winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fssm32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav7.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpcmap.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ave32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530stbyb.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pf2.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monitor.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navlu32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ecmd.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\offguard.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavcl.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pingscan.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\portmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoupdate.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccpxysvc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tauscan.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpc32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monsysnt.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npssvc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpost.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atwatch.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ecls.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\swreg.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bipcpevalsetup.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccapp.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav7win.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\update.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wyvernworksfirewall.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xscan.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bisp.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvsvc32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symtray.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vcleaner.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wradmin.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dumphive.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgemc.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avptc32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbpoll.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sharedaccess.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vscan.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmias.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vmsrvc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwin95.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\n32scanw.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfinet32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\popscan.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rulaunch.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tftpd.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsecomr.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\w9x.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Process.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamstats.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvc95.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tmlisten.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpfw30s.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nmain.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\padmin.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avxw.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\callmsi.exe winlogon.exe -
resource yara_rule behavioral2/memory/3848-143-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3848-146-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3848-147-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3848-150-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3848-151-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3848-153-0x0000000000400000-0x000000000042B000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe winlogon.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\44651464F494A585 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\44651464F494A585 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2468 set thread context of 3848 2468 winlogon.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "11495" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "3614" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "1022" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "1022" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0eab68388ecd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "2657" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "4586" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "4471" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "5396" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "5544" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "288" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "5544" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "5544" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "5364" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "167" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "14640" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "940" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6369" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "2722" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "6253" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30993544" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d9120000000000200000000001066000000010000200000005cee10725957449d4207501bc941597d6efa2806fba245f9ed9bf491c3336d17000000000e800000000200002000000079b85a4227adedc24cadcccc943dbad7073c44c8821b9d021039219d5d406d7f20000000b633b6f66d5a1213f28763b16e7723036a062c0066011b1125b227e310acc7ca40000000dbaafc0998de7d9af726230aac184c6a6aa042a52e168838645152b331dccb3c5cc9a4573d05a4df509fb2bdf5c3c733b39715ac02d266a911d9b83c3caec287 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "5485" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "2805" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\photos.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "6221" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6253" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\photos.google.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "940" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "2689" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "197" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607b6d9488ecd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "5479" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "197" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "12388" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373917331" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "12388" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "12388" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "282" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "288" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "2689" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d912000000000020000000000106600000001000020000000a74dc84b8de26009a4f2aa9240e92f4d5c3cd1fc259b8bb8533f5f69ac9f2c85000000000e800000000200002000000082cdeb3db914fccc02e3ce243ff182b51e769a694f107953ae3bb2e5dcfc342720000000dc660c9d576933ae9023fb2f5fb4bda2d5f30f139891a26655b8c38583a2f2f240000000e14e8d4887164eb73ea7f3e8c73ceac0ee2ee3bb16bb8a02637e5927eba6413f2ec281b97ad78f2336449baa0a3be7b9671a7114003787b7295659716402d1fc iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "4503" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "115" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "3703" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "3703" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "2804" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "2805" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d912000000000020000000000106600000001000020000000979c0374c15f98fc0714e01d825244cf2f14e3b50b9bd1ad799bc6b3003fe856000000000e80000000020000200000008f873f4dd2acabf0db5ff7b24a65c997bd3ab31c9ba2bbc85556aa2af324bf072000000050dec0e7d819d6a441bd1a62aafb7a253de3efa5a507b87f00cecaf004ad3cf840000000dfb78ad643e8fd85a5137fb5df8d6df6d44978adf4d002a6bae0579ce5e952a4c6903eb613707fd0734914999f6f9d691c622330a784daabaee5062840db1021 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1797" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hugedomains.com IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://9a6p0mlt1f22gki.directorio-w.com" winlogon.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://981z2s9vk013213.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://mw09r6qjfzx3j1z.directorio-w.com" winlogon.exe -
Modifies registry class 32 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{D60497D8-B7BC-4CD8-8E78-C087B24C7C7E} IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{306CEF58-D314-4B88-8A58-759E88C1AAF8} IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{DDC3C0F7-335F-4C12-962C-9AFE447E1EB0} IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{3556B11A-F23A-4636-A2A5-A6871C0A5BD6} IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{F6B004BC-3B6F-4CC7-B2BD-0EB59DC4B3BF} IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{561826DC-3B64-4898-B6EB-E0DC0690A1DA} IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{63D43ECA-5864-4A72-BCAA-0F8DDE036E85} IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{90496CFA-ACD8-49B7-A1C8-7C6023412DE7} IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe 3848 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 3848 winlogon.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2608 iexplore.exe 2608 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1792 aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0.exe 2468 winlogon.exe 3848 winlogon.exe 2608 iexplore.exe 2608 iexplore.exe 4800 IEXPLORE.EXE 4800 IEXPLORE.EXE 2608 iexplore.exe 2608 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2468 1792 aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0.exe 83 PID 1792 wrote to memory of 2468 1792 aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0.exe 83 PID 1792 wrote to memory of 2468 1792 aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0.exe 83 PID 2468 wrote to memory of 3848 2468 winlogon.exe 87 PID 2468 wrote to memory of 3848 2468 winlogon.exe 87 PID 2468 wrote to memory of 3848 2468 winlogon.exe 87 PID 2468 wrote to memory of 3848 2468 winlogon.exe 87 PID 2468 wrote to memory of 3848 2468 winlogon.exe 87 PID 2468 wrote to memory of 3848 2468 winlogon.exe 87 PID 2468 wrote to memory of 3848 2468 winlogon.exe 87 PID 2468 wrote to memory of 3848 2468 winlogon.exe 87 PID 2608 wrote to memory of 4800 2608 iexplore.exe 94 PID 2608 wrote to memory of 4800 2608 iexplore.exe 94 PID 2608 wrote to memory of 4800 2608 iexplore.exe 94 PID 2608 wrote to memory of 2712 2608 iexplore.exe 99 PID 2608 wrote to memory of 2712 2608 iexplore.exe 99 PID 2608 wrote to memory of 2712 2608 iexplore.exe 99 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0.exe"C:\Users\Admin\AppData\Local\Temp\aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3848
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:2824
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4800
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:82982 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5e85c3033b5a1d54a616c7361f88dd851
SHA1a1106c716e6a3b6ea251e4cb89f610268fa4ef97
SHA2561abaac8a006e99121082053817d7eb66918b038d1e97c7aee0e9725d0ef39dfa
SHA51291675ed0c855f4b756064bf2e9365786eb70cda80398a171683aadfeb2e7807319691a250f55af0d67cdcfc64435f6d4e74dc86b9916af2719a83715d9ed3b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62
Filesize472B
MD57a10b9fd2fd5dcc9100e43a239ced03b
SHA12b78f9044818d727e5aa37ca90c494afae5ec36b
SHA25600ff5e4a86e071045a22a0f1c44b890e6b9662fa59289b4de6930326ec9bf080
SHA512180cb24c8ca8c69a882894f6c6bfdb3d62d83167f15ee2faab4822b1ec1bc45b5c4b9f328e554a9c1f0c2e9ad520758327264fe663cffd698f26393ea3c2e990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD56d98a7c15f9c1386546accd549dcc7cf
SHA1aa3914fbf4239efacb27f6af73409428628b27f6
SHA256b44a8dc448759475a0ddd3511e681623a19eb620e67a94ee83ef04c0d6ba7944
SHA5121c4d220a2012a26dd7e2d591af91c72ec4cb44fc80663941b64b82cc4cf74562f157ef1193783e2478cd75bcea7a5eba0a8eab753aade55070d9f4eb0ca963f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD55ddb1febcd291eb59d3d67d24a05bfd0
SHA1fe957affe27cb991f332e7f5c86d3a15359bd3b9
SHA256ec45a385c906b3d925ebbe6532d10adec9a14c1733c756c64db5133bd9d88dcb
SHA51262d00893402fae125ae3428da2495b0eb864b125f975cd887f894f7298a4a86f361cf50aaa7c9b69f3dcb734a950c43472778ea4062b3146c3de5623d08dcd21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_C1D494D2F32AEDC4FBA6C14F3F436273
Filesize279B
MD5702dc01e6b3a59151ac6b9f332cf9ccf
SHA13c451cbd96732c0d4058be570ae29296ffeb7056
SHA2562e5fb4ccb8c99cc1d66f9da087c0426f51f78d2aef13b83162919845715aa6a3
SHA5129c6e786cedc5c15ec1e023b722ab605ff40b5789e26903aebdd6918c912ddd159b3595b71516dcf6232dba10988853f9a3a0107f2bf04ac24f7df9c4c99b4044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_ADE4E4D3A3BCBCA5C39C54D362D88565
Filesize471B
MD5ef58825f969fe512726feb9b9793e2ad
SHA1a039fc6348596d4d4cb0e195c2560623db46982a
SHA256c24bebf3bbb3afd6c3c2d394be7264d394488b2dc138b1f1eb208fc8f2e13229
SHA512826db18611c0ddfd6a73a5f6dc7db154e7ae583e9b1f5a59b6370f2cf8bd545dca6100409992329be97c9ebce51114dcb74eb8346c44488a21757b3415658175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_48601092E9B16A3209067EF548621B2A
Filesize472B
MD51debcaa960e657debef448c6b07915de
SHA12d2f4bb13e89fa916d8ecf711ac56276bf4c014b
SHA25620df8a034d59b0262ede2f5c63c4e9c27a69313b5b46ef14b03ea517dfcab1dd
SHA5127d1a332d2c3b5ab5d7c941f3911914b070a31dd117f98623f42481e11bc51c4c95f1764e311c74488d5ed2b1512e634a436f9880f2173a5c5c8961df8c51afc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_5D83FDF122B63B34F40B405089AC36F1
Filesize472B
MD57f82bd4d59e524ef0773811a0c7414a3
SHA1bb1aa4c3dfebc047a5b5648ae6a3c84c977a4840
SHA2569022a411f7f5da582b358b51faa5aca04f1e7012f835d271a821af9c1a73d233
SHA5125ab1dc4beda24e4d663cb5c88f8668d7d1d4c45fa6b2ef75d8f034281c2f6783422fc2933df5e22999e7950bb771730bc8fc8bb6867368ed8d2364b90243b624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD53ed09dcd6269ca5e58e1d239b9c960d5
SHA14ec94e968c886f43e2d652c324773366baeac2e9
SHA256cc08971952d3d8bbb30a755e9375c7d154a9bfddc306cd8a7f532c8d01310891
SHA512b2a147107f17740c20a01b0528cd13b934b519a99380c0437a2622b17bb707e085f5acb86774cd86e472508354b6673598a9abf4672fe57f3ecac6924a4efc4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62
Filesize402B
MD5f9c43f19924d1ddccb979349cab9f9dd
SHA131e00ac2fac29ce6a5a66c0b8442d980492a5ea2
SHA25687c17bc6b79b7624ca93aa446dd790edb98ecf42d842d85d8bae3a169b93537f
SHA5126bc001df5ed34bc1a24cb640363e0b6c8d5632dfc87fba09ddc68d0d2fcaf083f298ef85b990fa889da8d1087038bb94e18cd70dd723bb18c5742d5e03c2497f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize438B
MD5607102ce80714e8f29ae30f6a19b721b
SHA1644b2f512dff32482161ca470ebfca47165951cf
SHA256c51a5234d71ec2b60ddb8e48e3d2939f47650834a6354b0eb3fc629ae7a7a90a
SHA51232170f04ff96027bed6e4a4568f5e37cbca1b74a840bc07ad026c9c63b1d1de2ba98d08533cc33bb16f604c89d865b675ca93e17fa4accd88af86da89e6216c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD59cbf0e18554f6f59244cb6c3e80f3454
SHA1ff20f42992edd960ea801fceb37553afe39884e1
SHA2569b4ab43569d685348f01424595c436e79f144e74d981289b9dcc8fbdead3a415
SHA512067e20c877472762cd39cb11da37b3e287d19d79f8383ef5c930607a84e5739ddaa695cd4ae5a86eb7fb8f4d710b3c463fd6de33e8173c613daa5a928380737c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_C1D494D2F32AEDC4FBA6C14F3F436273
Filesize426B
MD59e9bd55b5c5d04f800006abcf1955b5b
SHA15c8f082d0c73ba939fa93e1b516b026e57a0a445
SHA2560750d864ba028683172b891003803405dafa9cc8edd87ebe743312091ab89540
SHA512b51b7fdb567ed297aa8d98720e62cb8b4ee7ffdbfcf35ad401b20e36425e67dc9c93c5ac2bb3d29199cdad620c7bd0afedc4acfd81ef1229c632b0c3a8424943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_ADE4E4D3A3BCBCA5C39C54D362D88565
Filesize434B
MD52b9512aee5892f7910a4a871f72605b2
SHA15bf93cbe48aa8f0d54d880c582332214d36adfc5
SHA2569998511d0e4673de7618149b59b44d597296a384e18978069e53f81c996d1ebe
SHA5122a9b543869a27d91de751c1bc98053c802f7d60e2e99a197c84f55aa9b10da26e5d4ffd349687df31bb5693d9befbce0fde05bae4fff1e25da91e64ef6bb836d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD523f7d24ca3455df02ea50ba8e98d4e87
SHA157677bc20a7f92c3ab43819407a5c7c539da2207
SHA256d7f6f7bd5d9aa949e2fe6e70514c5ce95dc2bad04bf0bbb2e7805b50e756cf87
SHA512df0744af76a5113e98aa6e473c955a40392527b8edbdaac0b75be7afbe95b8d8c455f784454eee3711496eed996d28972d3c10cd50c49d8ed594404a6a0ecb06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_48601092E9B16A3209067EF548621B2A
Filesize402B
MD5442bc5f1186634935433efa41be3f6c1
SHA16de7599da0f940c8be3903fc6322061b97cc3d4e
SHA256c7fe5e54aed85c5fff9996aabef5010ddf56639c5604a1bb37450a65c52b2073
SHA512a042821d1c638e4f1133061e880630184dccbf09234f8b34e17922f1a78aee58b0207145a4c8a93949089f51cc0c91bdf7b294a5d1120a0ab050b59617c4f06f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_5D83FDF122B63B34F40B405089AC36F1
Filesize402B
MD5b76247043d108e8ebb6894f5ed58096d
SHA1f1f3c617764296b6e80f3d12e2280421746de65d
SHA2561eb330a446ad94a6df9e1d2b7b3f7307a0eac87adfe34683cdda07ed84422b7f
SHA5124dfcfaa31d1941fc528c4592ced6ebeced189220466857bd9640b2aecef9e32e89bd84b4ca5ca0f14e20f1bb93659416e46229c2c6192d4784e8d39527bd583e
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
8KB
MD556b21f24437bfc88afae189f4c9a40ff
SHA1a9d3acad3d4c35da454e4a654bdd38f8d2c4e9d0
SHA256cfece1b609f896c5cd5e6dbe86be3ba30a444426a139aec7490305ebf4753ed4
SHA51253d4718e60a47526be027c7829f9ad48f381e22765790f20db35ff646bd994f8085b12b8fbeefd5b29ecda8f71f4c6c62b64652bc9a7256e001b5e4047c21651
-
Filesize
1KB
MD50a25a0f7dce9ed7a7945047317fb3f7d
SHA1bbc885ee49a5f3db247f593b1f274dfb5fa238c1
SHA256185d87eb9de584fa8aa1bf2c5048d606e7c0d30c7e95e13395e5a128f9d23dc0
SHA512a3dec147a0cbbaa4525bff0f6853e965d45bd0857193a3927675f5b96f649c1c65dded27ea83f6e3e019609f3a73832c587403582ff6f7f440e0b81fd37be9e9
-
Filesize
5KB
MD5b6f184f76153cfbe241be9900845ac44
SHA1077e96bd9339bea5594a6bfebdd0713c47456810
SHA256646c56353fc79540a716097112daf9d12f97b2c1928e076b980eb78c9d201a1a
SHA512792db08585519f8033bf312b6ea00bd5903f0dba39f71f332f14c2e8ba1f0fc26eabb72cab3c57bf4b6c5e9330eb8dc45aba3daa05989d44c954fea4bee3b1b6
-
Filesize
108KB
MD5050de1cb9ba77af49cb026cd202b4fad
SHA1ee3da20d2d6e7a1505111305b0403db2fda72157
SHA25632809234e303fce034c5196214de8640414655b123495ec5c41796410a8b5522
SHA51264fe54afef3eac9cfa661584f353fa60f28eaa8b61e244b035a6763a03e326e6e576611b19c512e83d61dd0646d638fc987eabf5a78f1eff8b5ee5c261c5f60e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8YLPV06K\o-0IIpQlx3QUlC5A4PNr5TRG[1].woff
Filesize16KB
MD579db7338c58d45690d0c52191565f282
SHA1be752feda754b6a064fa01c7345d42c731937975
SHA2562c97a299469742468c68766ff4cc4756329adf6e1849f040e0e0ca69c94bf84f
SHA51217b1752b8b8cd08c603ce0b31dd9f7a4896c43ba179a982a2ca55954e711e429fee919a0ac24852ae64efc375568f7ed8f89110ba473f9f3661b41e723edcdcd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8YLPV06K\o-0NIpQlx3QUlC5A4PNjXhFVZNyH[1].woff
Filesize15KB
MD58b4d99e44a4941049ba8745dac9a02b9
SHA14a8f19832a2ebdf5fe6d908548131629bac0a3c2
SHA2562f78f2a61dff8a8178f50fae71a82d32bf9b33602300f1f495bbd547ddc5939a
SHA512a5e1a9f6250f647b3caf0a63b176692a2f8067093ca76c39e9c9810ce8aac12847a0132df44e4c346f3d69b5aeb653afd5bce399aac13fdfaf5523d400a7b3f1
-
Filesize
743B
MD5bd361461dbc83db995e644e42e59dca9
SHA17d3d5350646382e10d1fd84a3489d2eec7f1c651
SHA2564e5d6e60573346e0eb3e8368ca629af38d0d59f4e51f750724e7f95f8be5917e
SHA5128b09cd2f95cd9e50a04aca3a57942e565556cefd65d6c903321a45bf4d746f48ca3e0785f2330483a0ed52437631d9bb086e958368c3da44b4bcf3314bfd0f5d
-
Filesize
3KB
MD5220e4dc01283a9e9c5c146f984eb8934
SHA1990f408175caef6b397c247f3aa614692211c5b4
SHA256740458b82de9774c1affb4781e4b7fb11db37cb1c281b9d5010dac3f084d7b40
SHA512094deb9ec05b7c0be1ca0130ad5118482888ac9061d293c751a0dc9919b36711e536306540c47e44ec152d6c23c3395fc08962472a1d5cf5fb321ca02408a683
-
Filesize
1KB
MD583c278e963a93a2959550be1b4a0709b
SHA175fd7cdb3469c5611a23e5562987e339b0ea881c
SHA2567e71f7e336be2d4cfe6832efaede2461ab30c275748db90d1322663ed580ccc8
SHA512e1edb8e6c2c4b1b10a29a26e7dd0c21f07bc415858e5dc1462992e4e29584d35290f41aaf4bee0fcc48d07ca939a08d2ba1e4673aa66bb2e377e0f0125d6d6b6
-
Filesize
2.0MB
MD5b2cbd02cacf3708f1651a614a39e312c
SHA148bd5e0cec89b181d1cb1450dc18a1846a417940
SHA256e4649ffc01467245e13023a150532dc3ce95c6715137aec90eacfc223f48c00f
SHA512554935667a0c8023b418b4a019663dce0356434f7b601df956511349d406e4329a61f059e57c41ea4dd2bbdf4946e05f9ec55841889bc1b168b4ba28616196da
-
Filesize
23KB
MD5ef76c804c0bc0cb9a96e9b3200b50da5
SHA1efadb4f24bc5ba2d66c9bf4d76ef71b1b0fde954
SHA25630024e76936a08c73e918f80e327fff82ee1bd1a25f31f9fce88b4b4d546055d
SHA512735b6470e4639e2d13d6b8247e948dbd6082650902a9441b439ceacc4dfce12cd6c9840ee4c4dcb8a8f1e22adb80968f63ace0c0051811a8d6d1afb2b3c68d74
-
Filesize
874B
MD54d659a3919fd8725dea740c5ffa2cae7
SHA19fdba862155cd98224b795dc487b682794806643
SHA2562c0d55fc5e53879ffcd771d05b533099944a51929713a4396a94f5363a581ddb
SHA512f834dfbc7f075015b4fa73ed0f87c562f720cb71313c8347873e0262532388fd1202efec4740354ff71dfb3409c08487bff072cfa55dd98a26e0d14d1bb88410
-
Filesize
1KB
MD5dc4241ed657ab17360978ef585a63d16
SHA1e85acaaefad1d1e4e242c13cbd9d0540ce11648b
SHA2561a0abc3ae1527f752686bcdd1b0225c12d6f6921c2952c7c41422b0dc664e375
SHA5120356df4063dfdb37c1ef2709014e81a83db502befc35772a34eddf9290f2296a9e8459f60c2a08fb65a897b5b58ff4a22e8f3a85cd75bf38a1d8dd90cfc7ba32
-
Filesize
1KB
MD5ea35132495135d411f93d650fae1e32b
SHA1771fa45af8702143f0c249bac033ed4e25b4c9fd
SHA25676733411dbf73236de890e174070a13622ddbc97d7b59543770b15c416f3f6f8
SHA512a9b1a66b633942433afc683b6f838568a3516d73bca9c009c34c15d8d6e92b0b3e0cedbc68947b472ed64f9d6ed895494e90d9023226fa35a4501273a1a01575
-
Filesize
24KB
MD50678b5ceb6570ec77fc6952bb3a2ae48
SHA124d098f28ae69c10e75e5aa015576b88c740c863
SHA256f2dbcde950747a4f61d8d0a78ddc2ecf14272328749bdf08cf58b37ad3408175
SHA512433cc7e78c2c77e27d8a98abc2a34b8da6ace9b4b87d0f63a6cef2c7ccc879d2481476f88b3883f70afeb6a7abb3feb9a374c09a722382868c50ec4288dfb949
-
Filesize
41KB
MD50131b7c96ef8eda32ab47aba87d481bf
SHA10e5cd24a4797f3d3649254bb1e7ab1d22b7718c1
SHA2561aafcc8aa40051234444fd47d973660991991d492048adafa92610c410418f83
SHA512e5fa133d8c4b8da05b739057bdae7ee154b18fd5e317a21c50ca9aded6b3713fd534c919200b55930c1d37537a6c0a20be47bd62a947125b348e6bf97c4b0b9d
-
Filesize
33KB
MD58e4c1a86a9967cf38da7e381cb8c49e5
SHA1eb9d3f655683851d18854c5ef70476b8ec32deb6
SHA25655f00162c5d1b65e992aa2be7191ed12ef1a1995e445ae199f2da061bc00fe46
SHA512cfb53aed33dcf84304e6096555d865f068233e2d42d691683e5a627e349b701ce90952cfc299875aec52136375e9588fc98647956d0adba41e30ceb501ebdbe7
-
Filesize
12KB
MD5a2d42584292f64c5827e8b67b1b38726
SHA11be9b79be02a1cfc5d96c4a5e0feb8f472babd95
SHA2565736e3eec0c34bfc288854b7b8d2a8f1e22e9e2e7dae3c8d1ad5dfb2d4734ad0
SHA5121fd8eb6628a8a5476c2e983de00df7dc47ee9a0501a4ef4c75bc52b5d7884e8f8a10831a35f1cdbf0ca38c325bf8444f6914ba0e9c9194a6ef3d46ac348b51cb
-
Filesize
198B
MD5fbf3b4a2ff5ac9a28d220e36f3ea591c
SHA11f2082b815cee0177aad6a5d0ca8144688968fb0
SHA25626a60a5d4d44d6e7705b6950e5a25c7160b5455bd415a1504c65a35f08e6af4f
SHA5122fd72998d98d62e895448c8b5648b888da861141840938a9a804108dbeae178ba0a21abea69db454366a8fefe8d2cac5c9cd7cce6c8384a18707c30ef347d162
-
Filesize
700B
MD57de12efe8d3724dbd4c57739e298b326
SHA199c28e3126ed0550acd975411cb1588440876e29
SHA256defe0f4bfa4039dfda6eaa05970e1a99a2907add81c0590933a5f8c16521ea60
SHA512154595775728b1afe9dc1a8e3f15317f2c047e2fc1a99a0d59815b6fedd10c958b827f35d28ac7cb3809a197c3c01d4385cec3ea855f8431b825b8a71374a988
-
Filesize
322B
MD5dbc7a86b27c59031e7d89f6a5752b054
SHA1e2f3487332a333ff0347f1a1980a77284110e83e
SHA256d6409f1b92adc2691c8f203ae9dd771408b4c642bfdb074169501940870a2346
SHA512cdf1e1fe953ff8ada9d31fdc20db6612bf111cde992284bff18f55dba6dbfb5c9f282bc70f4fb99eb84b1afb4220814b4c1dcd89b13605625af11f0349042daa
-
Filesize
292B
MD5b3792c11bed67f85c3cfe6a7ac28f151
SHA12d85d7c9ed3d6f8318206e59b3ac50b0cb180b54
SHA25604f8c60098f80af404073216192f1c5d4dd32775bf348d907a3488020c2d7947
SHA512fc1f4087eeb4152d096a7aeca3ca5254956f8c80ce44b5d5fa132349abecbf4efa0c267c0d65fc84226da4301ad80d2810ba2e7bbb12a45ff1181cdf64eb46d4
-
Filesize
305KB
MD587bafdf1576c5cd574a8870aef9f5154
SHA1ea754d70fd65b3dd37fbe539db1a64edef5defe2
SHA256de0e3e13ac455201d77e111b8c417ddae1ea4689e4406203baaa78d0ff9532bf
SHA512fd3682addd3489bcc4a00392299e36bc6c7ec5a40585c8a373ab305a7ae16940b1436e5e5aecaa291173ae77016b93b734523821acac1298cdcb067800fb54fe
-
Filesize
41KB
MD54b45210cd83b8056a1b69fd3b075efd5
SHA13a367d912deae4b1af6a7a971eeeca516983f8a8
SHA2563244b09f1a7f2595200ff725c6a0c3b8d55cc8f349bc04a9eccb9e0f9d5b1695
SHA512c0f0776057f3ca1ae67336fc2c9d9f7efadc924496880635449aa1b2e48077a9997399e1a2a87654b6aa24889cbfa358ef1f785c81f6596a0dd45a42fa78025c
-
Filesize
2KB
MD57b430c6350a59a7cf22b9adeccba327b
SHA1b48d3c289bcb6809bb52fffd8f013055ed6bcd65
SHA256058ed961bfe422af7bfc65865f4c08531ec8ace995f8a1ec560a46581cb7712c
SHA512bbb70e6c0318ed68fc6810e0210d010fc743b9987c6ed15a43c5d308a96a43331b79c3fab1b39a9034398418fa3321eec8c51998d79c981e3f511da3b398326a
-
Filesize
1KB
MD560cced2bb9ae91355eb44c42bf856c49
SHA1964c7ac1ff63c8791818a875ff5faea19f19b42f
SHA256ddbd38d82bf2338590d8126ff47d032e6b09fb0982e8330d61bf24027d30f59b
SHA512e23af1ebdb20a02f0daece10e5dc011156678daf73873a7b6aad380381bde2a66fc8649f16b0cc8b13248ab104b98076549304ecdc45cf667c215cce871ce032
-
Filesize
22KB
MD551ce5057ba8c24e01fe99c36cd2ac47a
SHA189d7dd3042ece3f7976d955df125093acb303fc6
SHA256ec5a7200769d54c7d5c27e8bcafb841965ff063b83712bc9f62dd7551fdc2d42
SHA51256fb1cf828080624cda190e2d8e9aab3efd30fcda694b0e4a86e2f33c3930fdc21812569ef9990985089c3ebb31a5b39905cd86859bc7d28e43552d9522f9799
-
Filesize
5B
MD583d24d4b43cc7eef2b61e66c95f3d158
SHA1f0cafc285ee23bb6c28c5166f305493c4331c84d
SHA2561c0ff118a4290c99f39c90abb38703a866e47251b23cca20266c69c812ccafeb
SHA512e6e84563d3a55767f8e5f36c4e217a0768120d6e15ce4d01aa63d36af7ec8d20b600ce96dcc56de91ec7e55e83a8267baddd68b61447069b82abdb2e92c6acb6
-
Filesize
1KB
MD5640ed0e889c6d470702159fa2d7f7489
SHA11d84e90a5ba163045800393f571e154f4726f171
SHA2562ced678e63b5d3522c9dda7e19607c082b4adf9b2df35eec1b8a6b463554e778
SHA51267559858093174ba7815b9c381b27b6fe0ca3668be26fd8d57a683c03455e9cf4b0200e998e5542c75266a44d7ad8f807ca6713bc2bcd09250c6dd673a69eb63
-
Filesize
9KB
MD596e78f8efefc9f0db74492b73a6b861a
SHA1cca818efb118edc2545512d5aed4f890d924e0f5
SHA2563a79919561d849e65b816d41a13d9f3c0db23d5242384333e2ad509db3b16721
SHA51293a393ed64a85b3e99ce5da26765dbc2f25aa5fc455f6bd16e1e821b00ef7c187d1c043b9c998735da2e5ea6c0f524e9198e2d163b62f4aac586ac9292592ce0
-
Filesize
158KB
MD59b02e62faf032ecb47560c0944d2044b
SHA15c2283710f83026d0117c1d31567926c991e3c70
SHA25659190ed4208b5f4bdceb308020c144225d80d82c6436d7b9afd920c87c3315ef
SHA512c0ba9272e90b46fc9b66f747c4c49860e255f454604e7ee4b7cca4a9e29a801b0e85fb12086ce9b9dd5fe710960ac6ae023e1587c3d5ab6c31d1cf5f124becb6
-
Filesize
359KB
MD5aab2681f29d15b92759785552474beff
SHA17d734dcf9d0a9f1726a47c37e125b50fc0baaa7c
SHA256edbcd66789533fa7b2997c4b5c03a4df3042683b35384b0199fef3ad78554d2d
SHA51223c2cfc68f4d9b12ca641722422ad96c43ba1c6b2779fd37d3a869087543e28a1a762a4f8f486dd16a27952d483464bafee661d4015b320c9a244ca638ddb518
-
Filesize
1KB
MD5c21e98c1e6650fec016a67ce3c81c4d7
SHA11d6b7a01154482fe865a97808c33d85930e55e8a
SHA2566f0e45e97dc8397f4f6c88ed72de83d68c75517f0915c7e69a08fe871a52fcff
SHA512e7afd6ce6ef17073c68970c0065ce2d741188ed7acac07fb5f95341a1b09eab4af18ef93d94ef9830d0032e12a75d73e1813cb3d337db540cf211d3f06b560f7
-
Filesize
1KB
MD59da2b20534822547ab99086173be8d5b
SHA105f729ccc7ed1b283a4996a95dc60b3b83d9fea0
SHA25611b275304b1ae874dd2e20e2cb779e798a5a665728b15e0f9af120729bf2e214
SHA5125ba9c0c0b44bb7fc5765cff051cc3d5b5d42e1ebef6a0bbb7f279d42b10850b26ea96b02c25eb13fe27943e8550ccff842db8bbf9090a947e26680056815a186
-
Filesize
1KB
MD502432208ea0259266966116d8ce01526
SHA1cdd79516fdeec8df6cb90a2812e812e51e7f069f
SHA2567ed6b8857c338703683ce21aa41ded288e50c76147f61704f71bcfaf6ac2d7aa
SHA5127bf97d9d03df486ef851f04ac284eec3634b8d3ea60ec011dfcc2dadd85733309ae3e0bb7a5f10505abfb8df0708a0e0c01260f2fbb692da51e2be1131e727b4
-
Filesize
49KB
MD5fda30e8a22c9bcd954fd8d0fadd0e77c
SHA1ae47cd34cbde081a48d7f92fc80aaf06a1381193
SHA256b42e4a056cb5b80c5a315040826866445ec9332f0749e184509ab2d9d3b86719
SHA512bf551c26ecbdbca8d8be0bc05aede18db415318a8143226e03311e235b7d8d497d6e08d73417926c878d253ad38f0dfc11571df2700500d02e68596b903309ac
-
Filesize
940B
MD52b11bc65916d4c4377a41fc82af176f6
SHA174129ee0c6de086e34929a486527d3d93ccfebca
SHA256cfef2bb5fb357beec4f62314005a5191c77ae65d726b8a5ec3f8fd908fd29a68
SHA512329d78cff171fbfd622e6a92be4c55caa1a3ecfc1e80f4ce9fba8f2875ddd51b53f077d51251c40a431bd06995d32d3cee1dadcd54cd3eb85246187528293f1a
-
Filesize
416B
MD5f7864e2a2a7d53417a589ce5a6abf257
SHA1a4c9534e3d07b53b51d5e4ebee3974cc718f857d
SHA25687a6fb17dd49a08690a2e56d7089a9091ca23c501000c0826298d9dae7a863f3
SHA512dd53378a595c04dfb4ecc0203a9b3e4b776ef4df68329ea6c075907e28010ca670f1d643c37eb0f0ba7ab91455f5f9e7a61b91a1127e7d8cdcc4dcd4c002395a
-
Filesize
738B
MD57fe831002613d2e8662b532f1dd1b3b2
SHA196b83310c316234e463503823d6496b3518e7517
SHA2569ebf3b77ef751016d3c569c0103ccda9bea86602af3a6c35a75e0d9afbe1f08f
SHA51253a5cd0136d538de5ef833ed16750d3f15cc82bb2a3e4a8a73a21a6106731cce0f1eaa5cee2ffc34655e594da35e5a1ef462db1e4130a4f52c626deb3a41b810
-
Filesize
84KB
MD5c9f5aeeca3ad37bf2aa006139b935f0a
SHA11055018c28ab41087ef9ccefe411606893dabea2
SHA25687083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
SHA512dcff2b5c2b8625d3593a7531ff4ddcd633939cc9f7acfeb79c18a9e6038fdaa99487960075502f159d44f902d965b0b5aed32b41bfa66a1dc07d85b5d5152b58
-
Filesize
817B
MD5f9b5bd66f71760ab44c90c0b9c4968e6
SHA1055823b0c24afeba400be30645a28f1b1b492dce
SHA256d3a3f5f9a2aca5d5cd5bb804c0b6f11b9a7df84ee4f8944acf9c6e2430c22b9f
SHA5128eed9785acae8460c28854e202e6da0a78edbc65b55c1c60473045cc73a51d603ecaeea4105b3e5d131e900d96a4c8791279e55ff5336871e77f693f8f7f8e71
-
Filesize
63KB
MD571c2751b4fc2bdd14c9ddb960f45a3f1
SHA12ff12cf4611d1dd6b3b9a1260900a5c2f88eb472
SHA2560fb69e11495d2244539725a723358bd6aa59d242986f8b6aaefff070b698dc40
SHA5121eac711937cbc3629a280de0290f270102ca22f3d897c328fd410ee7e8134e2a10647681bbd6e8f6ce5a8c1000093b0ca4420f56c9018d79c80232b699ce1c05
-
Filesize
228KB
MD5925e67d8b0fb0ab91fc17be72fff8dec
SHA1defc546b9cf066dbec5afb4a5d4212506ff49759
SHA256aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0
SHA51251282afe448ed81c82adb3763b3ea2873dcc3548e9886fc98408a3630a73a07d8cfeddc68238ec042e6da5e719baf1f1a95aee79c40b541ff7d6181bbcf46843
-
Filesize
228KB
MD5925e67d8b0fb0ab91fc17be72fff8dec
SHA1defc546b9cf066dbec5afb4a5d4212506ff49759
SHA256aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0
SHA51251282afe448ed81c82adb3763b3ea2873dcc3548e9886fc98408a3630a73a07d8cfeddc68238ec042e6da5e719baf1f1a95aee79c40b541ff7d6181bbcf46843
-
Filesize
228KB
MD5925e67d8b0fb0ab91fc17be72fff8dec
SHA1defc546b9cf066dbec5afb4a5d4212506ff49759
SHA256aa6266502aa216a185dd62247c5d0616251749849476926b13032a9183bd6fb0
SHA51251282afe448ed81c82adb3763b3ea2873dcc3548e9886fc98408a3630a73a07d8cfeddc68238ec042e6da5e719baf1f1a95aee79c40b541ff7d6181bbcf46843