Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 01:20
Behavioral task
behavioral1
Sample
88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe
Resource
win7-20220812-en
General
-
Target
88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe
-
Size
1.1MB
-
MD5
1459db879cfdf0a4fdda31a2adf341b3
-
SHA1
52f8fbf0f100acae7fff0be35d89439d7e6d0127
-
SHA256
88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f
-
SHA512
724d9f651b476d8bba5ac36bde16945bde90a875b4c79421816f9eb3345d38a178caac3d31dbf0213598c301d37f6be6d16f6636e22a3c0c1ed4374d4ee93d68
-
SSDEEP
1536:X2n2z/NfmeGrObqqvg5uJhy1haQ2R27sbXu7VUFm10IMSPzY2y76ldFkQZbe4fyQ:wKBmZGqqvgyhy1QRZaum1HBY2uKVDf
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 18 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-70554750" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-57951861" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-53342401" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-28956246" winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Disables taskbar notifications via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Executes dropped EXE 3 IoCs
pid Process 5036 winlogon.exe 5012 winlogon.exe 3596 winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vswinntse.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wfindv32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Opera_964_int_Setup.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luinit.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qserver.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapw32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navw32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpost.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pview95.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tracert.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vswinntse.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monsys32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navap.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wyvernworksfirewall.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfservice.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tgbob.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav8.0.0.357es.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ackwin32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctrl.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpdos32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wnt.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wnt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SPOOLSV.EXE winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpcc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mgui.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\neomonitor.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sgssfw32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\update.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zonealarm.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GenericRenosFix.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwinnt.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iface.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gibe.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvlaunch.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkwctl9.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navstub.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sdclt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbcmserv.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gpedit.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\apimonitor.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-stopw.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nc2000.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ppvstop.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vscan40.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wuauclt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsched32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msinfo32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\padmin.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\trjscan.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\anti-trojan.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nmain.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nprotect.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dumphive.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccevtmgr.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssmmc32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlite40eng.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rapapp.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VACFix.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcc32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\generics.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\killprocesssetup161.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe -
resource yara_rule behavioral2/memory/916-135-0x0000000000CB0000-0x0000000000CEB000-memory.dmp upx behavioral2/memory/4508-134-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4508-137-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4508-138-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4508-141-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4508-142-0x0000000000CB0000-0x0000000000CEB000-memory.dmp upx behavioral2/files/0x0009000000022e12-144.dat upx behavioral2/files/0x0009000000022e12-145.dat upx behavioral2/memory/4508-147-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/files/0x0009000000022e12-150.dat upx behavioral2/memory/5036-152-0x0000000000170000-0x00000000001AB000-memory.dmp upx behavioral2/memory/5012-155-0x0000000000170000-0x00000000001AB000-memory.dmp upx behavioral2/memory/3596-159-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/files/0x0009000000022e12-160.dat upx behavioral2/memory/3596-162-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/memory/3596-163-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/memory/5012-166-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3596-167-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Anytime Upgrade.exe winlogon.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\E50B29BAACAA360FCC344254F83743208BA6735D23877EED = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\B9373D14A02BC13F1345A3F7BC53B8BCC98D3B04DD0CD9CF = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 916 set thread context of 4508 916 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 80 PID 5036 set thread context of 5012 5036 winlogon.exe 85 PID 5012 set thread context of 3596 5012 winlogon.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\buscaid.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109a25c39e02d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1097" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b081afbb9e02d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30999198" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000093847f9271dc1c4db9d80912999dc2d300000000020000000000106600000001000020000000d4068f404ee47924f786ca6c6a2a06cb022091e31ced9ba2437186ad3a7cbda2000000000e8000000002000020000000cf69809a38ea68746aafa139233388265cf0843e971c9cc7569ff43151a3670e20000000876fa470dcbe54514ec6a71c733cb5b01afeafd474932b1b117215f51b04d8e240000000cdc530da4708f075429768608ddd2b443c7944c25d5844458c854f41c069d0663f044efb18df17eaa600e2e761b412248bb4c4cfd887402f9c5dd2436239ce40 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\afternic.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2866516574" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376345791" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Download winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://5uwyy1623f47b98.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\www6.buscaid.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "Yes" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://pw7980cjy1a7ida.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\afternic.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000093847f9271dc1c4db9d80912999dc2d3000000000200000000001066000000010000200000007e51ceeab78690130bfa4b4c64d744fb27dbf7b294b92e21671376208a105f9c000000000e800000000200002000000038ce188e8bad7a5814c19b6112b4673d3f61b45f99ff083f90cf792f0d1bb33620000000e24c3976a87342c947a4a6a66f9a6c114ea0dd377905329915a63ce9e9e8b5964000000017f383b1d49890b1875dc03c3c2aac08fa27c9c66cf90c46614ca5883816e4293dfc0cf57d61af8c8a4e34b0051eeca855a4747029f1db370a011182178c8609 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000093847f9271dc1c4db9d80912999dc2d3000000000200000000001066000000010000200000003194bde6185029ec3a8d4c8b45dee048e929e61616462b4e6f56afd823ffda92000000000e80000000020000200000000b27a1e7a8d4308be47d8ab0d969d933a43a946b69c22ac3aa615879f741bec92000000004bc9dadc832dc857980f6aec5abff0e3f687af89a0794ace1a0fd1ab38e6d0d40000000671fbabf3a41f5bd8fbf3ba096392adffeed73b6fb77fd1a148f2f47ba54ed21dc1f0d55a2a1e583db1673e544214c32a04242b81a1f6b7ecf61eebf1f0efbf3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\buscaid.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2866516574" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999198" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01167bc9e02d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://1rcn0442q5o10h7.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "http://rg8451g15sauudm.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999198" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000093847f9271dc1c4db9d80912999dc2d3000000000200000000001066000000010000200000000997b7ff861a74f8de46ce6855062a6e1babe82d697f1b65c35b7d971610be22000000000e80000000020000200000000f34f28664b0d802e77a7d6c9495fa02907fed45c6533a39510d7d25ce5cb93220000000b0d91f1c3ca462337030dce073f8cc750dcfa9ff95f9419fbde7352e2f1b82034000000087e5d646b537a62507e2d977893bdd62d0e8ff92276aae1889f7b9d470cea176a7c05bac4d4f77f1e4ae1da3f2002309f0e5dafa92500e3dfc2e442f36de7964 iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Local Page = "http://06488m6s51m1d98.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D63C0D9E-6E91-11ED-89AC-520B3B914C01} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www6.buscaid.com\ = "1097" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508a88da9e02d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "no" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2868235208" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30999198" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://3h5ce171m08uxnw.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://246d73g8ummm8z5.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\buscaid.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Local Page = "http://09946f1qh45cd28.directorio-w.com" winlogon.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://1xtxh989s17741p.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://1x1556j0n9sx286.directorio-w.com" winlogon.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3596 winlogon.exe 3596 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 3596 winlogon.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1464 iexplore.exe 1464 iexplore.exe 1464 iexplore.exe 1464 iexplore.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 4508 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 5012 winlogon.exe 3596 winlogon.exe 1464 iexplore.exe 1464 iexplore.exe 32 IEXPLORE.EXE 32 IEXPLORE.EXE 1464 iexplore.exe 1464 iexplore.exe 3680 IEXPLORE.EXE 3680 IEXPLORE.EXE 1464 iexplore.exe 1464 iexplore.exe 3420 IEXPLORE.EXE 3420 IEXPLORE.EXE 1464 iexplore.exe 1464 iexplore.exe 4724 IEXPLORE.EXE 4724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 916 wrote to memory of 4280 916 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 79 PID 916 wrote to memory of 4280 916 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 79 PID 916 wrote to memory of 4280 916 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 79 PID 916 wrote to memory of 4508 916 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 80 PID 916 wrote to memory of 4508 916 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 80 PID 916 wrote to memory of 4508 916 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 80 PID 916 wrote to memory of 4508 916 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 80 PID 916 wrote to memory of 4508 916 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 80 PID 916 wrote to memory of 4508 916 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 80 PID 916 wrote to memory of 4508 916 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 80 PID 916 wrote to memory of 4508 916 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 80 PID 4508 wrote to memory of 5036 4508 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 83 PID 4508 wrote to memory of 5036 4508 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 83 PID 4508 wrote to memory of 5036 4508 88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe 83 PID 5036 wrote to memory of 5116 5036 winlogon.exe 84 PID 5036 wrote to memory of 5116 5036 winlogon.exe 84 PID 5036 wrote to memory of 5116 5036 winlogon.exe 84 PID 5036 wrote to memory of 5012 5036 winlogon.exe 85 PID 5036 wrote to memory of 5012 5036 winlogon.exe 85 PID 5036 wrote to memory of 5012 5036 winlogon.exe 85 PID 5036 wrote to memory of 5012 5036 winlogon.exe 85 PID 5036 wrote to memory of 5012 5036 winlogon.exe 85 PID 5036 wrote to memory of 5012 5036 winlogon.exe 85 PID 5036 wrote to memory of 5012 5036 winlogon.exe 85 PID 5036 wrote to memory of 5012 5036 winlogon.exe 85 PID 5012 wrote to memory of 3596 5012 winlogon.exe 86 PID 5012 wrote to memory of 3596 5012 winlogon.exe 86 PID 5012 wrote to memory of 3596 5012 winlogon.exe 86 PID 5012 wrote to memory of 3596 5012 winlogon.exe 86 PID 5012 wrote to memory of 3596 5012 winlogon.exe 86 PID 5012 wrote to memory of 3596 5012 winlogon.exe 86 PID 5012 wrote to memory of 3596 5012 winlogon.exe 86 PID 5012 wrote to memory of 3596 5012 winlogon.exe 86 PID 1464 wrote to memory of 32 1464 iexplore.exe 90 PID 1464 wrote to memory of 32 1464 iexplore.exe 90 PID 1464 wrote to memory of 32 1464 iexplore.exe 90 PID 1464 wrote to memory of 3680 1464 iexplore.exe 94 PID 1464 wrote to memory of 3680 1464 iexplore.exe 94 PID 1464 wrote to memory of 3680 1464 iexplore.exe 94 PID 1464 wrote to memory of 3420 1464 iexplore.exe 101 PID 1464 wrote to memory of 3420 1464 iexplore.exe 101 PID 1464 wrote to memory of 3420 1464 iexplore.exe 101 PID 1464 wrote to memory of 4724 1464 iexplore.exe 102 PID 1464 wrote to memory of 4724 1464 iexplore.exe 102 PID 1464 wrote to memory of 4724 1464 iexplore.exe 102 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe"C:\Users\Admin\AppData\Local\Temp\88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\88812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:5116
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3596
-
-
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2088
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:2892
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:32
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:17422 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3680
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:82960 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3420
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:17432 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4724
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0684275E946EA5A526A0B9446D8D1B31_8BC55A34553CE38DA9A256FD39734BE9
Filesize1KB
MD59a1abbce3ae069f45cbe33e04342094b
SHA1a3a98f4b4142ff83bbbd0364e6e09f64854919dd
SHA2563708a3d7064f8a697d7df4aa573b046fc0c6aed04ed01f3666f7941afde18773
SHA5124e3bd4ad8fa4b82655411fd2c952b35e32a29a82853ac9c5474787f9f9e8dd9b670149b0c323bc3eaa093752bac373e1e42f76f155a971bfed99f5c1ee40a414
-
Filesize
503B
MD5eb8c9fbef4633868dffc517c34fbeace
SHA12e5a63b5e1d0f3224960a7fa9391bb67fc236d04
SHA256be67cef9cd7227c55c2f6393ee7f0c9aacc7a9fd551581c015c526bef95631b5
SHA512e1abff3608fa60a08114e8c7f72f31aa0a435d0a6b29792734b5bcf26a1f338235490363859b0e9f8784101dd8a05a583b798b2c191f0fc8aeef2df75bd18942
-
Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize1KB
MD594817136e9599384f670daa258a0d574
SHA15b7984ad4d51452617e5d7ee84a4155e44cf11e8
SHA256982d0cd93ae2ba2c48bf7401a79ca77a0b088866f8881ae5ca8905795c5a438c
SHA5121de88814ace858313f9c049b7ff1c2492230faf8a0fc5507fd29ca7a73570cb2008f8d44e72c49534ee7afa092f15a1d6677d32a6ab03ad8adbc106794e1f5a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f2080851a6780703a0f3764645202ce1
SHA16e16ec7fe0404b0fe43ebd271ca47ffba9fc9588
SHA256d3969401d4fc819669b9ce997251cc41d4883a31c4f43271b088944fadce3a83
SHA51250e5661d1b5c66073c34d164b49733d7c1c1d7b2782611596646b60dae81321c5c92f9e64dce980cea8306b29db6136e582dcc07f1a951580c1f9f4d69643121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD59f6cc8d3fe9092a6d3901e873a87fd87
SHA12e0aac117a4cc57596efb3d6f6624c269f94b031
SHA256e73982e62b92abac3d15b161f4525448cc2bc8b9bacefdcbfc6f87b74ec372e4
SHA5129736a099967d7ad595439768e45c633ff7d34de92f7cb0c19cd3d4590c4a6dd4fedfcd1b5617c81652e61f4ffe919057507f622f4c6d8d626cfc40234ad2c757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\31976568FBE31D20174C3FAC50D34698_B9D3AB1B35EBCD8BC167EE128E15D0DF
Filesize471B
MD589d712ccdb6927688e1bacfc55b92a55
SHA15e1c2c1f57f8c9ffac776baa7c6d9a518dfc62f8
SHA25680bdeb5cdf96bc2501ff60f32a5f94b8e40ae83440efe339ceaa7b19a7bf40b1
SHA512c7dcd82933205bc4c925de52c1d518dc9642a661aaf012deda4be554590ac21a50634efdf6a06b23da5c7f484bed9c8d27dc14abed4b9eceedfc09728a493c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD53bc8595d0a469edc8b7a071a3befe724
SHA1f7e4b53b01d31626ab7965b267fea4457d798a91
SHA25633c4b30d18fa3eeeed676831973cf8dd8c9a9145e7edcb689efeec0647d685d4
SHA5124969ab6d2239a94d1dfb6105d9a329588ad0e3366ab4af874e033b853adfcadf808eced3466823136221e110accd2bcd5b25b0474b11947aab510f0b92d397d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
Filesize1KB
MD51b3b8f713880b3ea49f4007bf1bb5236
SHA1d477e779a5410ada34327526d7a0796160a9a0bc
SHA256a4c99fdb0502a7056def84ddefe11d03d39fb3b35682ff2138a29b3364b582ec
SHA512a9cfbf8c6ffed392a0a469cdb3c58d2a11e3cea483a34ec76945206433ad1754f52559e577e6dffc7a670727a22110c2f3fc547273a5f4aaee218b8f800feb4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD50d30b5ac98a3ca61b3000c997d83ae70
SHA15edda8278cafdf2a0e057afdd512870e2deb4497
SHA2565cda9ad7c84dc9431ed7cf876f514a9dd313f893d062073a3f036efb43502a36
SHA51222714bdaeac5cfd63ac788d00234ce9920793ef01de60fa4752c2401f35cc5e38b5e05f4d406c066f50a6967c0db0aefbb13dfe442de7e3d36e4f0e7b3756e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
Filesize1KB
MD52729b3dc45f5c3549781096d2f953abf
SHA1db954efe7c9e9948d579a44efbcad78a8720dffd
SHA25612a0607343d847606b3fac170a80c5f64ce70457e1a54fe6a245411b6ddc8593
SHA512108b6a338f4043cfef8da285c7135924b20edef5d9740bac2e7396775b0abf81339c95da9400042486afea6bbf39c0455f2b3ddcc65f7ab050e4988ff45ecba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize1KB
MD533f52773cae9a28175753a6ed4c7d214
SHA18cc8d0863a484bf54110f007b19c58f9742816bf
SHA2562132ec0a0d6fd4dfb755224b89d19e9e09e899e3b6c509bae332486c966269d5
SHA51278cc14837d588be3dcc138e9645eb989e63ba995fc9233e76c0a05a4b86bb966e41cdf11be1d6de717943f2ad73b04897355d17dcd7ef70ae95b9f1fea313f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_01B1031F6736E831E4D73D2798F7305E
Filesize472B
MD50ee1d1a60ec1770ec3e880a25c257f5d
SHA1015b05feff63bdcf8fae4d1a8c0c83c923a2ca67
SHA256b6845619444a37f322c044933a44cf3fd283a18a54d03bad4f76a2ed8c2cbaf6
SHA5122cb2f9dfd6ffa79bdadee19b2f9ce11cf93204dca4feca0b7e29af210bd5acf2eeba1687c405012987f977a8dddd0ab481300619deb3bbf936db6676a85f999c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0684275E946EA5A526A0B9446D8D1B31_8BC55A34553CE38DA9A256FD39734BE9
Filesize458B
MD5d803bedec9b1d4c6223e2de19e9130dc
SHA136d29616cff72c3c39cd1535252d93959b265702
SHA2567ab3fcfa39e396ade7360623002e261e8d657fae6817b20606add8cfccdf7105
SHA5128fc26a59d3a51a1233a54ca99aad1138245b7a00042ec7ed42c224c921f25970362a72e6f48392f80356fd7b503080e2318ed7319f06d68310cafed2482823ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\08B8D8C1791AA7714DD4D760C5F42C55
Filesize548B
MD5bb75f45b33f462ab3dbb802a940b0618
SHA1e088cd6b29476fe9c5138300d7b06726af410ea6
SHA2562ed5fb884222ae66d013194d272e16b20db9b72bc8201d41a8fe94a03218821b
SHA5127682b8066c3b6904c8e7db0502b63d843b07beab73f0e06245e39a7ca022f0868a5c156f2d452385b6f0559e0c936d9512546f752664016abb1029e161eb3843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD540e98dc6a5f197618feb0eef4ff0e44b
SHA143e84d87b8bda2e71338f63979d7423a8e1df2e9
SHA2569ae362069f86b1b4488352b82c009b9f057af3af38276b933a951e816a150cc4
SHA512f9640ca8e5c489fe075e50fdac97c780004ad16a22a976480d872309e0820cceac246dc388644d2cde8f09b3461b4ad476094fa96e9b87002e59e3e66082235f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize450B
MD5a7f88645c54126a4679468247b9d9d78
SHA1129b4e3d7b26a61d01e2af6121361ef9a2333004
SHA256403203dd4553a1df4f4fb27572ee268726594b5b6815ad932eff9d7db9091c8e
SHA512e51e7572a5097293be525bfadc44f71bc31e54e765e25b743e805e207d2aa4e9b769915b18da485de32d1c35c8267477ef4f2e3c38649046e1add0af011da964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD52c736b21e00a546906e05bdae9fefe0c
SHA13a9f117c0468e40b4b7bc1e782e16c15bca288c1
SHA256b67f421033683260d3a9e2caa3da114423129a0c32d0e6e5218c84196391a86d
SHA51294cd5a82b9eeed73c4826ab44c5d1fa4eb68672770681cf661cf29701f6782a4d825b9f664bec688a0853c03a5d12d881e9fae047824fc31e1c643fbaebe3e99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD5444f8e08b72b5ca6706fd737bc5a5c50
SHA1dc3afcad4f1648450e5734738b9000160b33f571
SHA256fb29dc0f9cd6489b3beddaadff7ded653734f98db1950f2c78b10fd13556dc96
SHA5123c44d54d9d98a9b6a00a09c3c442bbe12cb767c54d6b19a10e61e47b6139d793cc07c1eef3cfb23f779ff58107d30530c5d9285e8a16eb7391da29e5e80bb17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\31976568FBE31D20174C3FAC50D34698_B9D3AB1B35EBCD8BC167EE128E15D0DF
Filesize438B
MD5ce80cc2fee3d2b2f03edf1bcbf00bc97
SHA13f01d71a6959c663859a95a1bb43a7ad6ab0b68b
SHA256ee2d30a4f923a59ba2081e1493303d7dd08734af48add98f166613fe8c45ff5e
SHA51280a17ea4bd5d2d4cb31bc1c4871007b6792e0f3d8f8a3558286b975380f6010c27d59f58ac288a76d0694479eb303abb12ae46d1cdc4344494155e7684dd651f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5c194f9547a6e065fa5533fac23c123fa
SHA1ee15e28f832c092ff8ec5493b7918852a8312ec0
SHA256f5a0a26fa002a9513ffef0235be5d000dc1ad94d665003e7972ddcb6dbe9f7e6
SHA51228f36506de2b620481a08770285e9e7ee8f7f2c939f9ce145cee5e94e209eb3af6a68111bd143b4f28fb66e5775584091e7593568f229b3f14bce8969eeccb21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
Filesize466B
MD5ef8d0bb9b47aca5788f851a306bcd216
SHA1d5f4964060f892ccf6d8d2b6d4d35c3d8b8deb59
SHA256bd885ce23cd2d4ed390fb9af0e7e8637b1ec39a1c07eadcb22d08fcc612d7683
SHA512558c7297dc28260e7b8cc69159a17c51fd023919145b4e4786e3c8b172e6688f8cade1ab5e35568f04a7432b6309067006cdf77f93eef79c93f44e2719a49447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize430B
MD599bc0222121a01e77ad41ef9299d5cd5
SHA164f1f5130d4d2bc3bf30628e4184f46b89e630b9
SHA2569b5ea5f5297161283a262e4d0b86ee95781894959b5a269f0c1def54c1081b96
SHA5124ec3da65b34dded446ff954ec40c766265be8e57f8b07b8b856d3dc875e7243c8295dd43dbeba473578e629708c2213a8ebf0f26a3f8e260543de11558221a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
Filesize470B
MD54d42e17295799c6e245b07c5710fde18
SHA14212aa830e1503c7cb8ab389e7c2cadf667e84f2
SHA256558ce5917ffb93a8481565bbd14bc27b84e4c1b273b1e1a7729732466ff72f1c
SHA512aca88056bf637660b5dacf604d3c3595661be628ba1e05f79360ba528fde97ad75e91da67899c06389a9591fd07c539f5dea38e98ca26385be154fe7db6c0367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD513ab8658465ac77f0dcde6c03f9bd522
SHA18a9226db2dde77a90fe510154c4be7e4f022f65f
SHA256c0904123952b1ea0eb6301ccf6dbab8dc4eae79089bddc456ca1fd762b8aadb9
SHA512e154afa4e2016473374bf35f68b70a157b6a7cc85149fdbb9a6ea6688ce4dc01c3517aa0528c149e1ab2c0b8270c02764e8de3be9d6763adb9598a49fd415c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize458B
MD54e164918848d299f98d5e91b327bb81e
SHA1a531bae10e7025e3b3f76124b687fc41a043ab21
SHA256015c7600868158eb2c7be62ca1911a65d000d2ada180e756b9ba13e05f48da76
SHA512581103287b81b254b1f3c49fe17fd631a002f89b589731a308e7f095efc363950e7bffbbc2a7616ef5747f4e4d6498d262e5d4ba0f4707233e92c632eafc4890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_01B1031F6736E831E4D73D2798F7305E
Filesize402B
MD5f56408d263d804c63dba6a5458f1c545
SHA1f6693f425148bcaf70cee7d2d57dc203b54aefa0
SHA2566f86bf621a51ac77fe04539af6665d6c27e02b1e0cf34b61510ccc5f5a4c4d06
SHA512eb854e0df01165dee19e233d8e7209cd0395131bd838ad714e8da0c9d2054f089a66206a452dd4b0487d53e5f7a1c9b9b938662ef1273c9f1094cebc6ca5ccb0
-
Filesize
1KB
MD5dd0f7ea08a15806f9e97b47fb7897da1
SHA168af699400b5406b41b6cb32867e21fc7beaf92f
SHA25691f590b21316e446bf5f44e670a4717c9bf9d0daefdfc07d4a085566ef75b5f6
SHA5121248f5f84f20764c4a09a42a9ca58074babe79fbdcc5c2744e05a864ecc702f02c6ae763836b86317db270dfee133e7a4ab449c0109d2c82f97c0ea517a6de3e
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
40KB
MD565e85f547495a60b512f8c72a27eceee
SHA165748f561dd91e961478854a1655543a0adba3a7
SHA256049f35a7be26f9e4740439035f164d00f9d18c12fb4f38e1bef46fe6d0bddd38
SHA5128821a6437e13e031c0d7548ae0c4b264fc5c78c92180625026f578a394e72c429b34121e32eaa9e1c094a44d7529a850b9e654ecf32b3b8f3c5d6ba044e3f067
-
Filesize
46KB
MD545c90d645d730cdad9de7a7ee2d7ce95
SHA1cd4ad50e1715f89397a787277bc66ae262b25283
SHA256acac35f11667cb78adf3dbd8cbdac7efe6c4456c07a7580ad71378c8ec96f908
SHA512a097732f856dd286a3c59d05f8bba2222dffe07c0f2d86d3042c0ddfdf44877f37462054f8575c416bfa7ada3692e3f73e960a69dc04bb3ca2ceb30088fc71db
-
Filesize
2KB
MD541f66bb0ac50f2d851236170e7c71341
SHA159bcec216302151922219b51be8ad8ab6d0b8384
SHA256ec99cca58b612ce268e6ada818dfcec0acc22dd1bbe372487be9abbdd07ce073
SHA512d0d223b93236d62d60974d638d9916901c37c32a4b8ef3faebd336850bc1af8b73ce27ac57205a00d97f38ccdd0ad655c9df7e1d7da6ae89de40b173a8639fa6
-
Filesize
9KB
MD57cfb45086f6a4315888c673435ec065c
SHA1acdbde5d75e542da5cb6cac5c1d7398e0ff151f5
SHA256fad24947a0d526db1c948435452e18265ebfc86c2088cb9d0a4815320858fa16
SHA512ee75ff980240f3326af7b9cb1d1110c8dc2d9b8e31ba88f7b3836849d832c0039173320a85f54a7f5771eb570703c8d741f00b6a0346f254104a4263d34e4d31
-
Filesize
2KB
MD541f66bb0ac50f2d851236170e7c71341
SHA159bcec216302151922219b51be8ad8ab6d0b8384
SHA256ec99cca58b612ce268e6ada818dfcec0acc22dd1bbe372487be9abbdd07ce073
SHA512d0d223b93236d62d60974d638d9916901c37c32a4b8ef3faebd336850bc1af8b73ce27ac57205a00d97f38ccdd0ad655c9df7e1d7da6ae89de40b173a8639fa6
-
Filesize
2KB
MD5e13573e069dce9296462064305bee369
SHA19d2869eba36102f68e64b59328aef309dcd257af
SHA256b14b0293fbf55d507a4a81231a651e521ca4c2f39d5dcd3ad2fb17fefda792a8
SHA512f7d8eb564f91592fb0e5d5e532d15a38c0310cb79d5bbccb07ab2023502499dc27e1cec759215a24461786817da5eb4d1ccea6d30311c2a3e313cd3d60ee47df
-
Filesize
15KB
MD5adc7107efab329ad7634b248994a19a8
SHA179334dcbec455928b20636baa49d9b2aa2c0d6ec
SHA25633bad9afc5fe13e2d869bc5f6b54360d282e0d942fd35e85ca74ced7e61fb3ed
SHA51246b762072e2d6cf83bebce60a5f3e7439dc3aa36e285f3ace4ae3fc08bc17eb02179eb7d2e1765d8df6e3b11bdfc83ef706e8381bedd18048cf4ad3cf023666f
-
Filesize
8KB
MD542b6041cd6723c49c49a81ee94333ecb
SHA168bce117321f5012641b4003db2d2db7706677f8
SHA2563e7e3f965de910c020a0278fa5777f38cef4ec2b2f397b89731c074aece31c72
SHA512bab44a62ecf8d5ec1ccd4f5dae70c2cea3fd4098e035da9735cd446a95f4982fd448f9cdd186f78d0a119cafa34470a9271fdfff25c5fb6c7a2957cbdd4ec3bf
-
Filesize
791B
MD59f9feca32571e02e523cf72f38722092
SHA18550958ac700d7b1112d5c436ff75252784aad04
SHA25660c56234ed3d8ffa3e247eed41f0fbb3f09f5d17ef22569982dd7f080d2dbf8a
SHA51228a4751ea48059eccb75512e27e46a9c4a5811f154b27a83840bc87dbfa29bced9b55607948f577a107667bcfb25a3c7f40072ab8ab89d28197df734a4543a0d
-
Filesize
92B
MD57c3f7e060745668041278118c0bb3d6d
SHA1e639f56695b3cc30d78dce7a0084aa8299a1311a
SHA256de5341313a4dc5d982ca50ae4a491e84bc5e80b0f439d87f05fc3973c1b7e59a
SHA512b12a692ef9be5857423f2df563b986e241f7161573b5a7f23190696d1b0a50c5da453c7bd35641fe61695b459d0a7d76f8053a8e0e0ccbc6811f800aab1532c6
-
Filesize
77B
MD5b6652df95db52feb4daf4eca35380933
SHA165451d110137761b318c82d9071c042db80c4036
SHA2566f5b4aa00d2f8d6aed9935b471806bf7acef464d0c1d390260e5fe27f800c67e
SHA5123390c5663ef9081885df8cdbc719f6c2f1597a4e25168529598097e9472608a4a62ec7f7e0bc400d22aac81bf6ea926532886e4dc6e4e272d3b588490a090473
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G9LDH5FK\framework-f7ba292b22b03fed[1].js
Filesize782B
MD53fe79b776ff5571f46ccfa287ab89e32
SHA1fc7cdbb85ad1191228f6a96e915649fd36f8b75e
SHA256bef8311539637726e163314d8fac57b8ce86330ad9414d6b1a73fbc74815edc8
SHA51264fdcc428cac0087b34b397b5754136d2bdfba9378b6e821aa31e4850094175f0f92ab76b3eb8ed4015820ddb1fa94d301f77ba60646892f3f9e530b6c6cb809
-
Filesize
22KB
MD52a791a94037e5e338fd34d069f5a3af8
SHA12eda31c74f8526234a056d6e8858dee4e3818d66
SHA25686fe0ae52c050d45e594932d0540521063cdac71ce6a435e8a4ed6f419653218
SHA5127b6ccaeabe143319f36da3cc788c838d2deae0226141bcd5987d15bdbfb3f472f1ff04681160994668b104a09e21572a9a8a08113d9e6a9d83bb8e4313fd2e8e
-
Filesize
9KB
MD5d1e118ab121e308d64c08119fb265f05
SHA122bb0b0b46f3761b3ded6f5bd17ba555f51420df
SHA2569dd031f2f54c27fc5e807ca577b369727838e9660ba683daed71bb590c4674c9
SHA51256deba0576946169ef9233060cfe91f801a7165198d0a181f7496bd826e549797caf66d0c28e245ce7668bd9c38b44f2abaaffedd70c6f4ba4a9bc260d7fb9c7
-
Filesize
2KB
MD541f66bb0ac50f2d851236170e7c71341
SHA159bcec216302151922219b51be8ad8ab6d0b8384
SHA256ec99cca58b612ce268e6ada818dfcec0acc22dd1bbe372487be9abbdd07ce073
SHA512d0d223b93236d62d60974d638d9916901c37c32a4b8ef3faebd336850bc1af8b73ce27ac57205a00d97f38ccdd0ad655c9df7e1d7da6ae89de40b173a8639fa6
-
Filesize
85KB
MD502bd8a851097cbeba5217f497a74f7a0
SHA1848cf97f5ae134c61bce4b721c0c12d312f20744
SHA2561693a44565b02c9fc3328674e424d74212876776c74e1aecca57220a9ed885dd
SHA51230ff5c0fcc555c08481e780f1ca76c7a7a0b27f1186bfb09d49e17562f90f780436f97141b8ef3eae1fa9e66ffb2528d377e77ff70fa9c4f79138d1608ef37ce
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GMQ6XNBF\polyfills-5cd94c89d3acac5f[1].js
Filesize89KB
MD599442aec5788bccac9b2f0ead2afdd6b
SHA1a6811998005bf46e0f58737628aca9e0d6f1c934
SHA2567cb5a87a6c0d05aab2245cbf6a26adad80cd322540d5f6360dde621bf922743f
SHA51286628a64609601ad2f2adc87aabbf8d96292c38335798c8c3d4f538f6ff1613e6180f0a11fd07dece2b6f5608fb885ffec047d793fbd258fdc9d904910517048
-
Filesize
733KB
MD5bf8a6e9cac7c08413c9208e0551e7c0b
SHA165d056e50f09c35751599f1fe1af5867c34ed250
SHA2562f59d79a79071c7ee207931da8c924216de9f8e2a58fa95a0be8c7ce82d52b40
SHA51218f0b8c32a791761327ee8a076d8e0c8ce13039dd780e99515ecff3f17c0e0fb052b1ac460e4bbcb0ac4e7d2d636675c701ff2020706dc8333ca33ef698967f8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S58XVZL8\[domain]-9fcf5ea1b1912cd6[1].js
Filesize43KB
MD5232b292472d3ab13f5d4cee3734261ef
SHA1ed6e3da745702159c495b3c1e9c15d96443cf2f3
SHA2568fa5295310b4959092112fde0c31be608ba6c5c4d9cc9a49686bc0907e09cafe
SHA512a47c3ce26bff427ad114acc80aa827b61cb8ee7b184ee7da09dfb7022b103e040478d92b13b2a201197ffaf21c4cd12d511df02fb99ed307f2925dd472146bca
-
Filesize
145KB
MD5c7ad7fb8ea8f86063a7bd85f563a1dcf
SHA17f8bfcce203965fb3395db056438f3a1a54eed29
SHA2561708ac19300b788bb0dbedf34c7a1e1b0eb3d5ab0589a08999997913780cf29a
SHA51282dcdd9b3e72d45172ce03fc040207f9eab037ed277c6ef9da36a6ea0d2a94657115b03af224885febde6be19a11d72a1260c465408c750439ce4d48f0f97696
-
Filesize
65KB
MD5825e3fe10a7f4efa6ea872fe1fd2a2a4
SHA1f719b540fb85d825a074dea9e716bf036fbc0870
SHA256397f5299befde44b4d118c095fd4d1bf6fa16aaeb3ace275d028a93848dcfe05
SHA512589dc482bebc82bffb85f6b484de68e64068f91b941c01e64f58ede6f9b9d1bef33e2eb5c31f46004a2d2006f92fb250c978d69daedcfee20cfc88d17ac4d255
-
Filesize
3KB
MD598894a07eb7087682d854bd4686aa0a6
SHA138739035ab9fafaad9a21f6fe5b73e982ede9484
SHA2568b91473b7e1a9cf3049828f7b84e15a27073494a6a6c773fe4c1d1d353e85e30
SHA5128cf54147fdc6514f1237b6901d5cee5c32c01de96b50a306eb514a7f6355c420420b0e41f3c043aef445c88a23c617da4bbed4525e08acf58fbd835fbfa9ffef
-
Filesize
1.1MB
MD51459db879cfdf0a4fdda31a2adf341b3
SHA152f8fbf0f100acae7fff0be35d89439d7e6d0127
SHA25688812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f
SHA512724d9f651b476d8bba5ac36bde16945bde90a875b4c79421816f9eb3345d38a178caac3d31dbf0213598c301d37f6be6d16f6636e22a3c0c1ed4374d4ee93d68
-
Filesize
1.1MB
MD51459db879cfdf0a4fdda31a2adf341b3
SHA152f8fbf0f100acae7fff0be35d89439d7e6d0127
SHA25688812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f
SHA512724d9f651b476d8bba5ac36bde16945bde90a875b4c79421816f9eb3345d38a178caac3d31dbf0213598c301d37f6be6d16f6636e22a3c0c1ed4374d4ee93d68
-
Filesize
1.1MB
MD51459db879cfdf0a4fdda31a2adf341b3
SHA152f8fbf0f100acae7fff0be35d89439d7e6d0127
SHA25688812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f
SHA512724d9f651b476d8bba5ac36bde16945bde90a875b4c79421816f9eb3345d38a178caac3d31dbf0213598c301d37f6be6d16f6636e22a3c0c1ed4374d4ee93d68
-
Filesize
1.1MB
MD51459db879cfdf0a4fdda31a2adf341b3
SHA152f8fbf0f100acae7fff0be35d89439d7e6d0127
SHA25688812afd0432a4b86690d91eba4aa05cbb7e764cc512903ba92507ec6a3d6a1f
SHA512724d9f651b476d8bba5ac36bde16945bde90a875b4c79421816f9eb3345d38a178caac3d31dbf0213598c301d37f6be6d16f6636e22a3c0c1ed4374d4ee93d68