Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
3e22e53f409b3e9d4523af3e74b30c44.exe
Resource
win7-20231215-en
General
-
Target
3e22e53f409b3e9d4523af3e74b30c44.exe
-
Size
3.6MB
-
MD5
3e22e53f409b3e9d4523af3e74b30c44
-
SHA1
178e7ff1870e1d62688c4e396572afd7b8bb839b
-
SHA256
18063aec34073060ab335406a1303cbdb8bbbd11e4b02358888ee5681339a796
-
SHA512
60d1adf0819d8317dff03e483debbddda0577ba3f91eba545c8a3a44d82ba3e2e9f9cc5e27d4a25bfb8c512aa256993ae5fc8aa2e1dd9f7069e86cfcc5f88e55
-
SSDEEP
3072:4HqLaIXw+0L/dJjDJgFpCsCCw+dMhWmTC7hwue6DuqDz:B
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 18 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-30425339" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-64221357" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-25102585" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-17775070" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcupdate.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HJTInstall.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieRpcSs.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\claw95cf.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfw2en.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav8win32eng.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntdetect.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UI0Detect.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamapp.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tgbob.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npfmessenger.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icloadnt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lucomserver.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mctool.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mwatch.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\norton_internet_secu_3.0_407.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antigen.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieWUAU.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\etrustcipe.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-agnt95.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wrctrl.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guardhlp.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsm32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\generics.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\poproxy.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rshell.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieDcomLaunch.exe winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSFEEDSSYNC.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\amon9x.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconsol.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsave32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WerFault.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nd98spst.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spysweeper.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpf.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavpers40eng.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monitor.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navdx.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navstub.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qserver.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\realmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sbserv.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\killprocesssetup161.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wrctrl.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exit.exe winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSOSREC.EXE winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avnt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cleaner3.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmgrdian.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ibmasn.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HiJackThis.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zatutor.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HJTInstall.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\apvxdwin.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\apvxdwin.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldnetmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nsched32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavcl.exe winlogon.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 3e22e53f409b3e9d4523af3e74b30c44.exe -
Executes dropped EXE 2 IoCs
pid Process 2248 winlogon.exe 2256 winlogon.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2256-20-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/2256-23-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/2256-25-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/2256-24-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/2256-30-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/2256-33-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/2256-60-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/2256-88-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/2256-295-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/2256-309-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/2256-601-0x0000000000400000-0x000000000043F000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\74D495B494346514 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\74D495B494346514 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2248 set thread context of 2256 2248 winlogon.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31078464" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hugedomains.com\Total = "32" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015a2f750fe9ee1479ecf0c8cfb11934c000000000200000000001066000000010000200000005a5652619e8ba3063d4b99c3fc07d59768a9a01f4daf1048738b4656e431d671000000000e8000000002000020000000cdf6e1c7c144b927f3d918ca6a4e682fd8a18e21ba416bd9894fa62c759067d42000000050769e50591941480e76eeafefbce1ca0be8101979d6a89e4a09841559bf06cb40000000f978b37482002ffba44e4724c2e9aacaa07165ef2fcac18272b8640d0f04843842381c99cf2e430477ed8c923f4ee63bacd7d1970c80d069af4425834b78dedb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31078464" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hugedomains.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "115" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "13529" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{34CF4EEF-A433-11EE-A0B6-6EDCCF833886} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1538" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "1485" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://x27m54352zc3gls.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "13529" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "335" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Local Page = "http://gp8tjzm2fk31vj7.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://mfc50x83rnmdgzy.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://v88ti0159ufxeb2.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "27" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "168" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d11c334038da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Download winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31078464" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.hugedomains.com\ = "32" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015a2f750fe9ee1479ecf0c8cfb11934c000000000200000000001066000000010000200000002d1a79b5150f738f6039e769843c2aed347ba3f3fad7b0d9764dfa86dc3db860000000000e8000000002000020000000d62356b03dbfe21f06f4f8d004c273c395520ecf552443ae169b64237a9d977620000000755220a7283de5d01153f986358ab1386547a9008f49b02446a69209150b684d400000001a9da0aedd0d523e5da1faa91abe73c7cfc450ad8615917ec9c31e0b53efcdd15aa2e902b4f14cd1452706d3f95c01237fe5cd540fefe0d2edd3b81801963e04 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "1567" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "32" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "12334" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "1452" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "197" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "1485" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b089503a4038da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Local Page = "http://u728k65794i77js.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://g1036316149y1v9.directorio-w.com" winlogon.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b121284038da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "174" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1620" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06c302a4038da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "2851" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6066020b4038da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "12334" IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "http://0u8m4pr367x7z8s.directorio-w.com" winlogon.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0021e124038da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "1573" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "154822471" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://w02w86864tzkg17.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://4b2vgqp2ht7k323.directorio-w.com" winlogon.exe -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3803511929-1339359695-2191195476-1000\{AE6E0929-CDE0-4D5B-B3D8-54D5C071BBF8} IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3803511929-1339359695-2191195476-1000\{94C31F67-D7EC-48DF-A34C-714059536D62} IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3803511929-1339359695-2191195476-1000\{CCFAE2C4-9A8D-40D4-8140-EC11A267634A} IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe 2256 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 2256 winlogon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3812 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4616 3e22e53f409b3e9d4523af3e74b30c44.exe 2248 winlogon.exe 2256 winlogon.exe 3812 iexplore.exe 3812 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2248 4616 3e22e53f409b3e9d4523af3e74b30c44.exe 87 PID 4616 wrote to memory of 2248 4616 3e22e53f409b3e9d4523af3e74b30c44.exe 87 PID 4616 wrote to memory of 2248 4616 3e22e53f409b3e9d4523af3e74b30c44.exe 87 PID 2248 wrote to memory of 2256 2248 winlogon.exe 89 PID 2248 wrote to memory of 2256 2248 winlogon.exe 89 PID 2248 wrote to memory of 2256 2248 winlogon.exe 89 PID 2248 wrote to memory of 2256 2248 winlogon.exe 89 PID 2248 wrote to memory of 2256 2248 winlogon.exe 89 PID 2248 wrote to memory of 2256 2248 winlogon.exe 89 PID 2248 wrote to memory of 2256 2248 winlogon.exe 89 PID 2248 wrote to memory of 2256 2248 winlogon.exe 89 PID 3812 wrote to memory of 2972 3812 iexplore.exe 97 PID 3812 wrote to memory of 2972 3812 iexplore.exe 97 PID 3812 wrote to memory of 2972 3812 iexplore.exe 97 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e22e53f409b3e9d4523af3e74b30c44.exe"C:\Users\Admin\AppData\Local\Temp\3e22e53f409b3e9d4523af3e74b30c44.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2256
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3812 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2972
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:2604
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5068aebabc7396613777a6f3d9a396727
SHA13182a8789b2f974b746cdfec6167682f208185b2
SHA256049aed18fbc265d3c858ce4481f6f6a15cd342272104374476adc7e14b4f3521
SHA512e7e4c47c72be93b18563038d85566c3127f232af207cd1b9c93c8655f73e34a4a92de4375f960cf409dd8603a14648a057dffd5cb7336ddf32c9504d972c86fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5092a1d3ba8d4ff41c1035fe2d32915c2
SHA1a87550b0da14ebaae1aab67b55a88b3a32f33343
SHA256f1a9d8a44a263758b103503e5c1d71c303828c43c1ba34de03bb7a63ba16f22b
SHA5121d48144ae595f646188b715b3d455b88c96ab807b9eee0022840e7876963b31681091f2117ec3f8bc524a96df558c4d2c02bccfc8454d3452a83ff80d06bc2b6
-
Filesize
2KB
MD516c5b7d6ca6bf25688ce6dd424dfa82c
SHA17dfba7b38eaa37fdce8a9bf9eb2e829b5ced1d2a
SHA256af4077a1965d1b28cf06e774371ac84853cf68f7c07784ba452710a4b4b93aac
SHA5127a904065bf53061f3dda57f9e1bd8cec513fda15cf7ed86aa7dbab0478d0c5ec49fea63f138c8d631d78b2f1876a0d88ebe9c079c82d34430cf4435f5f381327
-
Filesize
2KB
MD5b0718cc46121d596b2b55492cedba477
SHA1c2cf37b662cb03aa67725765c0ec7c561f435331
SHA2565debcc96d1f0977baa22212b2d226c029cf3b80d26e2a97923cb92a61edd1b12
SHA51245ea028714b412f0e4e04a05662d37286d58154ad0470dcf814da53c0b0a73ff8fa0a63bf402f3ba6b45931cd2cc3bd3b49eae196b6427ee405c011df2514db2
-
Filesize
3KB
MD58a55eac4ebc560118c41beaf2c7a6eef
SHA13bebe2dfdadb4cb30cbdbc18d6383a54bb0d4078
SHA2568f584f9dde57dea5ca6f3d2fbdc8199ce909fdf2c63dacaed537f5b5958cd36a
SHA512b015f5b678482c22ef229356c2703be0d56e4bc650298906d73fd0d7d9821f2a28d7835e16c98a658d3075c32ffe9c3f959bd57a5fe83d4aa6c4a72becbd843c
-
Filesize
2KB
MD5c781bb918d047cc16a1ae28277514785
SHA103f8771e214b92ac848d99124d73b1f559f6689a
SHA256dd2b93a5b7a711850d4db0d06619a597aa07859a27049216069ddcc82f560786
SHA51285bbd5d2935faff178f72f88be7ace6431f11dff4f6dfc271065d7c234750b63c0b6a18e0dc084cac23bdf0495fc2e22013488c92354b1ecf462b3bee678157b
-
Filesize
2KB
MD5cb08a52c21efbac8cf464b9f42c14952
SHA1f30fd930782ff7f5cef57aec90c87d5814afa763
SHA2560cee64e29739bfb7aaf2d532ee144abe8c31f3b030114c6322544df7511c4d9e
SHA5126890c992ff3ee1584e3b31b78dd553843fdd26f99454ec0cac2d8ad46cbed53e8c168558e43cf4ca5e6fb4570e3d2998eb777b693bf74d3ea9d118e0e4019b31
-
Filesize
3KB
MD54c50ad52df18fbe0659d88060dfccf25
SHA10d6e799ff135637ed312cd451e3eb186eb802442
SHA25675474d15f6ff74fc66e42c7398ac2d5599675b1143dd16ded7498a533be1d4d5
SHA512271a3e1023c3e99941bd535f2b4489579e02379ba9c1ceed68547694778a0967ae40093621024a9650a89c139654206dce3e7e0f8c5f2715331d0fc4007ded94
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
228B
MD5dd8c21f5479465f77e50f0aa7ab4fcc4
SHA17a697d5acc64b7392831a78a10de3c2b15d8d6b3
SHA256fc8d0e01034f749d77580db4fe74985bbc613da3aa9a2dc995de404734e1f054
SHA5127903627295284f7905155e54f47a7382c7bff9eaec4453e0a598c1b73d80d9a2ea735c8cf9ce638fd40dfb50bf1f5a24b3bf673933915f7e459edd8c4ea79475
-
Filesize
19KB
MD5bc182cfa3c9933af7efd351db3a13b68
SHA1a4fd15397a5b2c0126ee3e919432ca0d9e2b725c
SHA2569511d60e62804019e74479878bbb2a6ad5c4887cfa5c05bc253ba9ffbd3834da
SHA5121ac9d6a2603dea41bf66674f1a702cd30b7e7b2acf425925943d901923d729a25d50083761023fc2a6d9066d54f8c7c6c9f20bdeaef7a8b39e70611625fc6e66
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BJCNBC62\KFOlCnqEu92Fr1MmEU9fBBc9[1].ttf
Filesize34KB
MD54d88404f733741eaacfda2e318840a98
SHA149e0f3d32666ac36205f84ac7457030ca0a9d95f
SHA256b464107219af95400af44c949574d9617de760e100712d4dec8f51a76c50dda1
SHA5122e5d3280d5f7e70ca3ea29e7c01f47feb57fe93fc55fd0ea63641e99e5d699bb4b1f1f686da25c91ba4f64833f9946070f7546558cbd68249b0d853949ff85c5
-
Filesize
34KB
MD5372d0cc3288fe8e97df49742baefce90
SHA1754d9eaa4a009c42e8d6d40c632a1dad6d44ec21
SHA256466989fd178ca6ed13641893b7003e5d6ec36e42c2a816dee71f87b775ea097f
SHA5128447bc59795b16877974cd77c52729f6ff08a1e741f68ff445c087ecc09c8c4822b83e8907d156a00be81cb2c0259081926e758c12b3aea023ac574e4a6c9885
-
Filesize
29B
MD51fa71744db23d0f8df9cce6719defcb7
SHA1e4be9b7136697942a036f97cf26ebaf703ad2067
SHA256eed0dc1fdb5d97ed188ae16fd5e1024a5bb744af47340346be2146300a6c54b9
SHA51217fa262901b608368eb4b70910da67e1f11b9cfb2c9dc81844f55bee1db3ec11f704d81ab20f2dda973378f9c0df56eaad8111f34b92e4161a4d194ba902f82f
-
Filesize
84KB
MD5c9f5aeeca3ad37bf2aa006139b935f0a
SHA11055018c28ab41087ef9ccefe411606893dabea2
SHA25687083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
SHA512dcff2b5c2b8625d3593a7531ff4ddcd633939cc9f7acfeb79c18a9e6038fdaa99487960075502f159d44f902d965b0b5aed32b41bfa66a1dc07d85b5d5152b58
-
Filesize
186KB
MD5a846fa5a9d0b144818ee536afad4c2f8
SHA10062a2eb8a9a5a63124ebc52918385bb72561691
SHA25658acb908ef6c7ec5c546ba2dfe277182d4d579c1c641a35a2d38df5ee7c5216c
SHA512bed8da013270be2daf98a72e494d99fa8e811ed02a92760dbf9222d3fd9b0bcfef26a3f09c4e4e14a2e06958d17bf5f5176a0b7cc99c9d2edc1ca618a7c82e7b
-
Filesize
240KB
MD52fc0ada22251481b1b682084de2cf066
SHA10d85c6c2741afb7ec1cac922763957ff830b188b
SHA256f063d6729a6eb2368fb7dab0580afff26d1ad648dc5a94f17d30e090c17a54dc
SHA512a03c333f49bbf2efd68ced8de53ddb3b45ae8da783f1021a7651c2c9082d5081c7a2a0ba040cbfb2caff1adb56f62e41af8d8ebdc77f0469e489591edf81f9af
-
Filesize
7KB
MD57e1fc959c6a680c6c95b10d78037f66e
SHA10023e6b0e067d14aca1a2f035253e3cae028a671
SHA25681bb85e46a51df272ac5a50991b8f37ccef0061013ebf87fe6f563477ac977d2
SHA512d4699279a753607e5f2fca1abbd24edf19f890f9a029bbd53799c309ee62877b9a5d1ef16fc54a7d3bdb0a0415a7bce859c281fea417f97ffd6ad9196786b4e5
-
Filesize
3KB
MD551b8b71098eeed2c55a4534e48579a16
SHA12ec1922d2bfaf67bf3ffabe43a11e3bf481dc5d7
SHA256bd78e3bcc569d029e7c709144e4038dede4d92a143e77bc46e4f15913769758b
SHA5122597223e603e095bf405998aacd8585f85e66de8d992a9078951dd85f462217305e215b4828188bf7840368d8116ed8fb5d95f3bfab00240b4a8ddab71ac760d
-
Filesize
9KB
MD5b43df051b5395061af5eb3556fb0806d
SHA17d99e35537aee8a36063ab1431a6d2bc9f7f8d1e
SHA256a7a45aa92860d76fb18e52806145dbf36ef6f487d8abb2a7fa1d83a8b9e68cc4
SHA5120d9ea609e80526e3191a02e139ca3e86197b2332aa8414e7f1de283e08f3de71d745a9d3931012769ea4932e4196ea901cec40b8aa6af75414a830e5a77780db
-
Filesize
51KB
MD5575b5480531da4d14e7453e2016fe0bc
SHA1e5c5f3134fe29e60b591c87ea85951f0aea36ee1
SHA256de36e50194320a7d3ef1ace9bd34a875a8bd458b253c061979dd628e9bf49afd
SHA512174e48f4fb2a7e7a0be1e16564f9ed2d0bbcc8b4af18cb89ad49cf42b1c3894c8f8e29ce673bc5d9bc8552f88d1d47294ee0e216402566a3f446f04aca24857a
-
Filesize
850B
MD53b2e99294f82f2ba64c2ca33c8b607e1
SHA1991dabc70bbdc7e83b422f16044866e286bba07f
SHA2565c233ff100be4a898501dd4838cca4ecf914eb5926cc287416793208eed9d151
SHA512ce5f2e9e1caef7b744767386e8e10273703d6856590b6b8f812ee73fc4aaa53319f12b8c42ce087448ebf11766dd27ed8376786d741a8ebc37c24450a9545e67
-
Filesize
62KB
MD5a057cd45d9f791653a09b6d31f5ff82e
SHA1b4b4a4e4be2819fb79cd9600aec5ddcf04f7ad9c
SHA256afbb80362c014ee0df81ade6ede2248b9eb7869c101c8977a53a0b6b4bb47911
SHA512e55f3b0256c7f8d32181d1037dd220b1e65219b9f525ec3c63c092695f37d6cf1bd7697aa30cc0a8e2e8bc26d2e9f4bfbddb74130c9c386e2b3707b376dc2187
-
Filesize
51KB
MD5a3064ec3c04afaf37f4f4a9ad1b9335d
SHA15be0f0fbcc525232bb6c9730070ec09e8cf2dc5c
SHA2563ab0548debd396f8d12cd376404480a810a690677d400ba37ccf74639d90ee18
SHA512d4ab405e11a50afba110ee8aae2872d935fe262909b37603378a7af4042a57adc5bbfcce56b7ff2cf2ca4fe36d4fedb1540fbf4aa082fa130106b7f1bb2041fc
-
Filesize
974B
MD5af2bee43df94fe1199040d3aabe8e083
SHA1e49b31a366891b2b59ccda75d9c5342ff517155a
SHA25632b2b25fb2aeedd3d10f5e851c224a4ce0cd0ae69976db30ddd4ca9ec823d6cd
SHA5128120e2ed5a2edc94b7197b64e89202568685c9b90d9198b7b35a4f09417ab13206cc025449a3035610dc5086e1fd6935ee8519d93433136ee385068ab9f961a9
-
Filesize
36KB
MD5e7ae0fcd873e942c583cbc0be10b36bb
SHA1e87e118c228ba3d2b44292d967c2c2284032a560
SHA256f671f659fcd63ee8c79380431c3fe3005702b0d374ba286d4dbbc68c7cbf3bd4
SHA512c00feeaa2ea6acb0454269d44fd8eeca911a2af6737f470cb3a9f3f4031f8841d3ae096c801389e3cd873b0bd11b61356c33fbba553386e901df24996bb93e43
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\o-0mIpQlx3QUlC5A4PNB6Ryti20_6n1iPHjcz6L1SoM-jCpoiyAaBO9a6VQ[1].woff
Filesize16KB
MD5dd6fe4c6f321f39c750ee024b38bc1c6
SHA1192f09d9b27fd7518a7b2cc7ba503d6f83c68307
SHA256d2de7fbc083f058b6c7eeb6985a1d24e46e5e9be3aebf0f2d3b26204fc7edd94
SHA512e677bce8d3920d2e755c9fb80a6a96922c5504ecf06b5a650787a22f29d5f39b2c37ca336bdca41b25b71d36caec21dac78d855e0819435165d3771701ca45a4
-
Filesize
5B
MD583d24d4b43cc7eef2b61e66c95f3d158
SHA1f0cafc285ee23bb6c28c5166f305493c4331c84d
SHA2561c0ff118a4290c99f39c90abb38703a866e47251b23cca20266c69c812ccafeb
SHA512e6e84563d3a55767f8e5f36c4e217a0768120d6e15ce4d01aa63d36af7ec8d20b600ce96dcc56de91ec7e55e83a8267baddd68b61447069b82abdb2e92c6acb6
-
Filesize
502KB
MD537c6af40dd48a63fcc1be84eaaf44f05
SHA11d708ace806d9e78a21f2a5f89424372e249f718
SHA256daf20b4dbc2ee9cc700e99c7be570105ecaf649d9c044adb62a2098cf4662d24
SHA512a159bf35fc7f6efdbe911b2f24019dca5907db8cf9ba516bf18e3a228009055bcd9b26a3486823d56eacc391a3e0cc4ae917607bd95a3ad2f02676430de03e07
-
Filesize
66KB
MD5781608aaede6e759fe48d7967b0a6c53
SHA1bc595134b15c604ec6d42dded9f6d167d94084ac
SHA2567371dd376a195424e3df2ee7877a045a2d60c307b3b3a119789c7160b7c21b92
SHA5120eadd4bd38115eee3db9c62508143e7b93b5ff5fc5f8f05489af21c6499ccfc9e741d4de740e75ab933a32de2a1ca5cce7777a60b015ba53e503196e75bd0c71
-
Filesize
22KB
MD5867b64001bcab4662ca0f029fc0b0d43
SHA1f66ce822709f3bb92182ee78c94f7b6a21cc118e
SHA2566a0ebb1d6bcd9703a786b8271968852f4268c4237e87f9212c981c31d35cc974
SHA512ae541327da8eba7ec16c5094bf3dbe3bb8a5fddb45b56a15c9f5cd7b3846e49aedfe5411967767a92c734d7231142a33225a74f452491f5cb4f3daef1d2155bb
-
Filesize
165KB
MD565760e3b3b198746b7e73e4de28efea1
SHA11d1a2cce09b28cffc89378b0a60cbb1aa8a08c4f
SHA25610e40ea3a2ad69c08d13e194cf13eb4a28a093c939758a17a6a775ef603ac4fc
SHA512fbcb91f26b7bd874d6a6a3b1d4d6f7277ded091cdae5706c285b4d5d17446a1bf58572c224af38393ce49b310a51d5c5d60711c7094e5d32abbaaf10d1107e1b
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
40KB
MD55ccfb1e528317225c9b3924787df29e4
SHA1b6d5a52c9a24a7b54b3b7139cb7abffb3f38d1bb
SHA2563388c5aed0e5e4e9dee701437ca533b27360d6663e86c08c301199b6e315dd79
SHA5129f884fbb9692bc9e4b2db0a028612089eb9a46ba2e81b71d8dbe1a0cd0f819a8271c8f17ba24e4a339c7b4399015ee4bbf1fe8ffc37177851c2c01a1b0acb1e1
-
Filesize
40KB
MD59e33acb5cab6802df44887bd6df31416
SHA1f96f235aeccf43da8e795c291f3a3c1390d8f377
SHA256ca02d1a91f43d6b8c5d8d127d04e95afb736ae1779577bde0a6f0641cc4f4893
SHA512a6cd85df3e64c7b7b462dd07025563f5ccf4c8b98394ba0d31e9705fc933ee89e1c13874b11f428c090179ebc70bfbe2728a92a8b56fa5a58253cbb7793fe333
-
Filesize
23KB
MD5ef76c804c0bc0cb9a96e9b3200b50da5
SHA1efadb4f24bc5ba2d66c9bf4d76ef71b1b0fde954
SHA25630024e76936a08c73e918f80e327fff82ee1bd1a25f31f9fce88b4b4d546055d
SHA512735b6470e4639e2d13d6b8247e948dbd6082650902a9441b439ceacc4dfce12cd6c9840ee4c4dcb8a8f1e22adb80968f63ace0c0051811a8d6d1afb2b3c68d74
-
Filesize
6KB
MD5112927efffc591f6c8175fc8f57432c8
SHA19da9dfad1435e0a3043d052be3a1587cfc39ec63
SHA256ea13c3085f8440f456b9e9db545cbfd8432b2c782386041997729cd55535d4b8
SHA512f8a11304d39903f6a5aaddc9d4a1004eea545ea1247c4957fe8da9a9f5f31db41b5b9adfb4f28b92a30c520315749c27b7255938aa899329d88ade08ed83f96a
-
Filesize
51KB
MD502e3aa6de0c0cecb0267cd83d6f64d51
SHA1ab29481e145d32c7ff2a2e850a90e93ea9e2a60d
SHA256234595572b74d58cd52917208142b3131ad7992126358ee0d917a40cd1240e83
SHA5122e01c259120af23f10fab29d646879a9db5d1b8c4d8ed37b1c6cb0a49c19fbd7683e77f1749ac476fb44fe6f992c2403a3590a8d79ebf0dbaa3164f50c702660
-
Filesize
9KB
MD546c07dc020b669cb5d8d1a67aaa18c32
SHA16a536f1543cc2632058c3a928b60cf2a6775e55c
SHA256a9114d4faedc608fad8bd45a7e23f44a56e974c82d13339c85c8d0ba3aa1900d
SHA512d690687c3ed1fc291f29f2285e6ecba815a0697a04dfea813c150a06f137444cc78424d6cc636423620a3f893eb732333fd26d669ca4c4dcd5d584ce917cc7a8
-
Filesize
25KB
MD55cfe055f07a4e103b33296e4ffc80d87
SHA18fcbd263e8b08cb6fb949c4de2f753e85722afbd
SHA256cedecee8a414c15e0ff4c2e2d49763544ed69ca77a082b4b5330bee1decf0ec9
SHA5124888541dc650f6bd62d6a41d2ac0b8742da57d87aba89a13a95ccd8e80bdefe184a48195b49ef00fffb04bd71ee60a9181190baee1cbe081cdd27eb58f82de18
-
Filesize
9KB
MD5defee0a43f53c0bd24b5420db2325418
SHA155e3fdbced6fb04f1a2a664209f6117110b206f3
SHA256c1f8e55b298dc653477b557d4d9ef04951b3b8ba8362a836c54e2db10cda4d09
SHA51233d1a6753a32ec06dcfc07637e9654af9321fe9fa2590efc70893eb58c8603505f2be69084fb2bcbf929218c4e7df9f7a8bc3f17a5b41ed38c4d8645296ebab5
-
Filesize
102B
MD574a981e3aaaa1f7200e5f87b03883703
SHA122cf9554c2d813a219b2982ae769695119ac1092
SHA25655052d853a3f144505dc773ef237ac838af312c0180ff293f7cf1a3847345eab
SHA5120e3190f7e3de1b0127001342b33bcd3f23ad1bf113fea94a97f9d4a59c9c6bfeec61a5889bb69fb0d16bded2656529dffd69e48d4a4b32e436346772d7d8fbf2
-
Filesize
71KB
MD5f7e0e532f5b4833d0eaace2d4a85b6d2
SHA1583f4e731d1e6aca83be37eb9f262fa83766c626
SHA256123e577e361781993453a535e8d6f4ae1d51cd11d5d745f76c5698773a3c9da2
SHA5126cf2ad6e619135c1246cccc82e4ce2ee76efcb3a30866b03c9387ac7e70555b64d0885c8aacd3a54b3d652e66fc730852920ae1c1f7233fa82ad7bbe975ef144
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QSO8CY24\xUSKbXqocTPwo3RspD7uVldcgi_KkGuO0Izsc1rniEk[1].js
Filesize23KB
MD5b476ff2653f6129fa32e065c886ef15f
SHA101856f5cf0476ffa135218ccbf7563210c4d585f
SHA256c5448a6d7aa87133f0a3746ca43eee56575c822fca906b8ed08cec735ae78849
SHA512112d5fcce59ab4ecee6fdb9fb91cd04bbba3ac76dd0ffd1d9d6e3a10a556af47fa2b6ab00542497403c0c4c08ec7619a7dd7dfdc2e5843516b4c8cbe7457442f
-
Filesize
1KB
MD54c2e266587bb622926747856f9bdb65d
SHA116999e0d2a01b96b70a0ef191461388c5047f1ed
SHA256cfddcd1ab28963d8219ef42d0b455b1e062521bfe7b100d4c47e0b9dd0a79023
SHA512c9526cd6537aa068b48641fd2dfb93843fc5f535faa4cd856d4d3427c8f1e97d79c969215a9291fd50a96597c43dba3c45a3fe2ad32c78677e38f93dbfc32ca0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\DV8riFx6jQ4gLK3NxCQ0wH6lqJRF3nkZMG7zsdp4UIQ[1].js
Filesize52KB
MD548e936b2e9e018ddb1f5346ea193a9ec
SHA15db531370c082965d774fe01e42bf9bb5c3a4007
SHA2560d5f2b885c7a8d0e202cadcdc42434c07ea5a89445de7919306ef3b1da785084
SHA512a28ee781a28c842e1fddc863f1b0d1131fe5eb0aa9512a00260061a7a5f9d062d0b8a9be8312caa6ec08b069eb1c198b3d08292852db88f648ab580806daf4fd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\KFOlCnqEu92Fr1MmEU9fBBc-[1].woff
Filesize5KB
MD54c87324d5b074854bf4ca9c92dc07c91
SHA148effb82f0cf910560a8c683b386791a5332a75c
SHA25682c4e9f3a8d372c6fe51cbec1b14d11a43b0a6a78105b69f7414e94b27fb0207
SHA512e7c69f341dde27421209ae3a52a0b5d2f9886eaf774c301219942854db8e99a10dc149afc819d513ece50562afcd2d7748d2783402aee77ac7b2f04f2b1d8211
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\KFOlCnqEu92Fr1MmYUtfBBc9[1].ttf
Filesize34KB
MD54d99b85fa964307056c1410f78f51439
SHA1f8e30a1a61011f1ee42435d7e18ba7e21d4ee894
SHA25601027695832f4a3850663c9e798eb03eadfd1462d0b76e7c5ac6465d2d77dbd0
SHA51213d93544b16453fe9ac9fc025c3d4320c1c83a2eca4cd01132ce5c68b12e150bc7d96341f10cbaa2777526cf72b2ca0cd64458b3df1875a184bbb907c5e3d731
-
Filesize
8KB
MD556b21f24437bfc88afae189f4c9a40ff
SHA1a9d3acad3d4c35da454e4a654bdd38f8d2c4e9d0
SHA256cfece1b609f896c5cd5e6dbe86be3ba30a444426a139aec7490305ebf4753ed4
SHA51253d4718e60a47526be027c7829f9ad48f381e22765790f20db35ff646bd994f8085b12b8fbeefd5b29ecda8f71f4c6c62b64652bc9a7256e001b5e4047c21651
-
Filesize
530B
MD50a127ad39a8ebe4207492293b556adf6
SHA117d3dad64e4f9139cfb85bbcca6659a8aa532a48
SHA256c1294965425b5028a83bbe5eeed0cd9b92733ec41efd07e34532522d4c97b6e1
SHA5125aa845c5c6c20259d9c6bc0c9fdbd13ff178ba4008865f7113387767db0ad39cd53c1d276cfa4997186fd39f21d30bf00caf8d092e5c04119d992368b1563df3
-
Filesize
41KB
MD56cd0b6d7421cc56520f0a4d94df01c3b
SHA102914372f8068297bbd0e617585fd8aaaaeb4d1e
SHA2569da638d32a074de2fd54fd394edbfe986d0cff2d26be1de95f3c060768e5c71d
SHA512be5c8dd668dd2a28dcaa88b4b6df71d8c64f1f8cf713c3971d27d5e8c56bcb9b9400f1309aae522569ed4cda881332932395ca98335bfcc4bb17051052ae811d
-
Filesize
337B
MD5238d0b3770e5b7467029a4cb2779b62f
SHA196e718d3ab5f99a88c0a37f923923b1c55a21d81
SHA2563ce693bb3c697a5a3fee7db995c21550f57536ebeafb703ed57013f2dda39857
SHA51210dd6a54aaf2b11b4763fb12e0c6c476b7034d7230980adeab47ffa66151a33f606b3e2bca3371491669408cf8ffbf384ebca41a22c72efee02a97cf36cdea03
-
Filesize
12KB
MD5a2d42584292f64c5827e8b67b1b38726
SHA11be9b79be02a1cfc5d96c4a5e0feb8f472babd95
SHA2565736e3eec0c34bfc288854b7b8d2a8f1e22e9e2e7dae3c8d1ad5dfb2d4734ad0
SHA5121fd8eb6628a8a5476c2e983de00df7dc47ee9a0501a4ef4c75bc52b5d7884e8f8a10831a35f1cdbf0ca38c325bf8444f6914ba0e9c9194a6ef3d46ac348b51cb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\o-0mIpQlx3QUlC5A4PNB6Ryti20_6n1iPHjcz6L1SoM-jCpoiyD9A-9a6VQ[1].woff
Filesize16KB
MD5d22f975c52faaf5f561bcf90641485d4
SHA14092103795efeb56b3cf83a69d1f215771ac651d
SHA25608cccd7191ddeadbb2ac3f16aaf5e3a0b65d2477fdb5a33e3b17d1bee9501d6c
SHA512b85b99e957dc5ffc88b3ef14d14b7b7738e1210c01decc249fbb4a5274baa928b6d81e652244572e45ac162aa4616b0a0c607d59a01b01303e572ac3bce03382
-
Filesize
55KB
MD5eb4bc511f79f7a1573b45f5775b3a99b
SHA1d910fb51ad7316aa54f055079374574698e74b35
SHA2567859a62e04b0acb06516eb12454de6673883ecfaeaed6c254659bca7cd59c050
SHA512ec9bdf1c91b6262b183fd23f640eac22016d1f42db631380676ed34b962e01badda91f9cbdfa189b42fe3182a992f1b95a7353af41e41b2d6e1dab17e87637a0
-
Filesize
49B
MD556398e76be6355ad5999b262208a17c9
SHA1a1fdee122b95748d81cee426d717c05b5174fe96
SHA2562f561b02a49376e3679acd5975e3790abdff09ecbadfa1e1858c7ba26e3ffcef
SHA512fd8b021f0236e487bfee13bf8f0ae98760abc492f7ca3023e292631979e135cb4ccb0c89b6234971b060ad72c0ca4474cbb5092c6c7a3255d81a54a36277b486
-
Filesize
2.3MB
MD576d0905a1d6db81f52f61b39847f0998
SHA166cf3f8ddb2c54503e8b1876f9dbc01bd98d9f83
SHA256b96297243fec55072f1927db43aec9ed6e96a752589a2be8b127727a59f643db
SHA5121c3bd672fb6c069b1ebec4117eeb46a6e42236f54dced433495e7a08ef5bf636f708396866415f7f9c1a7fc28609078f8bd4c15e5d48d2a7c879979c34dc2699
-
Filesize
2.4MB
MD5dc524133d47872ef8704646202bece93
SHA154107065c4d902e3da502c06d69beadd6371b699
SHA2566d3e3611eac532f20afe33a3a7c42653bc62023048de1378d168e4a284adcba2
SHA5125199bde67dae097812d1d56251af627f52e85d96f3b8f38148287fe44a1db6900fa53d513082b764701ab23fa34e031d69536c2565943e27ad093a9b92c2e2a6
-
Filesize
1.1MB
MD5ac1b01375505b111d745656af32d7ee7
SHA10b35d9d6b3028ca15a74321d6191507911e1d95c
SHA25657f6fee919b2196349583982aa87669251dc4c2c997ee99b8b82e55cce1a9418
SHA51267aa8ebf9f0f5c0999b3ae63f1c5d541112ba9d567c6683c3ba442ff16fa8581fe77da6a1d28acb18d8cd284dfa9c8f2c08c5a53294a151fdb0dd2ab53d6cc83
-
Filesize
2.5MB
MD588488bd0650cc07545f5a8dced54b7c4
SHA1109909041384c06b4067effb02b9a7d60c691837
SHA256b8e1010a6ac006ab04af5c73192677390e0caefd17e888e6848e1f52f8a80a76
SHA512b5279f5621ed626ace3a70bdd7b460a4e2e28619e9ac21202fe9258ca8bff56bfd3c25aa559f13feadf7e5bfc63864d60fe270d5b98268bcb4c5b1c3d106ae48