Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 16:09
Static task
static1
Behavioral task
behavioral1
Sample
7b88ef323bf1a7ac2a1e47f7a48c6170.exe
Resource
win7-20231215-en
General
-
Target
7b88ef323bf1a7ac2a1e47f7a48c6170.exe
-
Size
515KB
-
MD5
7b88ef323bf1a7ac2a1e47f7a48c6170
-
SHA1
bbdc35f615a1b21a25082b39010e5b00f58286ad
-
SHA256
40e36713f322935b08d7dd837e58b77ae18c969b2dde1784ecff64b1f1e511e1
-
SHA512
1e339c959f4bfe933d27db6198bba05748bc1546d6144c79e9ef3250b0dacf098ccce2cc890d038024698fe23b54cbc0e7a6286cda9327749f8093204f96617b
-
SSDEEP
1536:7ws+Dd8oVCTSzQHhn0lIF2rX2OKvQ4m6OXHGvA3D0FsBRyBYOKG0Ph:8ZCoaSzQB0iiaSvTyCRy+4
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 18 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-53342401" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-57951861" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-70554750" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-28956246" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HostsChk.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tgbob.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavsvc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\generics.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jedi.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\localnet.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msblast.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pccwin97.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scrscan.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WerFault.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieCrypto.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PRINTISOLATIONHOST.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cwntdwmo.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\etrustcipe.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspatch.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds2-nt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\virusmdpersonalfirewall.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgserv.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\n32scan.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shellspyinstall.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sweep95.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\GOOGLEUPDATE.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_findviru.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tftpd.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BullGuard.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpnt.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccpxysvc.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luspt.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ogrc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spf.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\trjscan.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpcmap.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpm.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ave32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iris.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nd98spst.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcconsol.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icsupp.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nsched32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atro55en.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exantivirus-cnet.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netcfg.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tfak5.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SmitfraudFix.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shstat.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\proport.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup_flowprotector_us.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fih32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-prot95.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcmnhdlr.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navrunr.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\norton_internet_secu_3.0_407.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npf40_tw_98_nt_me_2k.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spider.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmon.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpc42.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsisetup.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winservices.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkwctl9.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fameh32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 7b88ef323bf1a7ac2a1e47f7a48c6170.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe winlogon.exe -
Executes dropped EXE 3 IoCs
pid Process 640 winlogon.exe 4824 winlogon.exe 5048 winlogon.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1260-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/1260-2-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/1260-4-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/1260-16-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/5048-28-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/5048-31-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/5048-33-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/4824-45-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/5048-56-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/5048-76-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/5048-825-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/5048-883-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/5048-904-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/5048-982-0x0000000000400000-0x000000000043D000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\E50B29BAACAA360FCC344254F83743208BA6735D23877EED = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\B9373D14A02BC13F1345A3F7BC53B8BCC98D3B04DD0CD9CF = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4776 set thread context of 1260 4776 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 88 PID 640 set thread context of 4824 640 winlogon.exe 94 PID 4824 set thread context of 5048 4824 winlogon.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Local Page = "http://0c9b2wy79n42184.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://sp9ih2rde9l034w.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\DOMStorage\hugedomains.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hugedomains.com\Total = "32" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "53" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "53" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "21" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hugedomains.com\Total = "32" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d2a5bfd840da01 iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Local Page = "http://g0qt487fzw52ddg.directorio-w.com" winlogon.exe Set value (data) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08e9a91d840da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2426808122" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hugedomains.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hugedomains.com\Total = "32" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000056c0f093da428f4099809f3dbcc1bfee000000000200000000001066000000010000200000002068e80f2857ae9de8d73ab16458fbd96213a95c34d01dbc58f07e96baefb052000000000e800000000200002000000054454d08783a56c65f1486aad1e9570b51e23fbce404ab49ef42f8a5c8913f6e2000000062b05226816acee6b46d8840402d5ac7d6bb8bfca49b6ba47a95291a3fb5a20f40000000290b9adccbe26528de128dccc8d5f1710f08c51558c885c762f5f582c2e08ac8b378cb25ea54a6d01afd506021e41fd6e975a63790ed089f1c103dfd77852516 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.hugedomains.com IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "no" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "53" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "21" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208d459fd840da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.hugedomains.com\ = "32" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BB4EBC3D-ACCB-11EE-9BE3-72AE6231743A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805a8fa5d840da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31080664" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://yr5z3f87vfbaq9v.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2426808122" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.hugedomains.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\DOMStorage\hugedomains.com IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://75kes53ef8enqp4.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31080664" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "32" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.hugedomains.com\ = "32" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.hugedomains.com\ = "32" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Download winlogon.exe Set value (data) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301a7ca8d840da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000056c0f093da428f4099809f3dbcc1bfee000000000200000000001066000000010000200000007fc2e1217408a19d6dc6f2b19fe48dc3b29377ae4ea4acc58e7bbda992137d39000000000e8000000002000020000000a8ed2f7879b8b9a1b924fba5442e3f2bd0eb9383787131c19f4820a2c61a0b7f20000000e4c0cea63933556052c50c813f0ac91854ba67b46c5dbf5c99622ae30bdc30fd4000000076654e606df3abfaab02e6a5876bf443d055e21380d931565141d25da5eb4d62d662970bc0c55ad0c87ca1981f92f33a9c2f155600ced56056bd4ef360a7aa47 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000056c0f093da428f4099809f3dbcc1bfee00000000020000000000106600000001000020000000d0bc67a215af20613400e8c9d10d9d6bcfe252357077a5518f874978353b46e8000000000e8000000002000020000000210ff26d5b7da72a5ae6b44c5ed9ebcfc4fbdec62b56ecb5fa467c64e19258cd20000000ad5aa5ed8c35d5e315a748d30b8e7e059e61443ef3d6aab897b5f94cb63d2b99400000007b073188f77302ee5fc300a361d783fd6ab3b8ac9105bdd848acedd3fd9a6d7c0989ffff897835c3dd6beb8e10dfacd1f960643387c3905b2ab5fbfd2f812f5e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "53" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.hugedomains.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\DOMStorage\hugedomains.com IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://kw2k1towdv5oxv1.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://j4psw8cd422z683.directorio-w.com" winlogon.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5048 winlogon.exe 5048 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 5048 winlogon.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 3848 iexplore.exe 3848 iexplore.exe 3848 iexplore.exe 3848 iexplore.exe 3848 iexplore.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 1260 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 4824 winlogon.exe 5048 winlogon.exe 3848 iexplore.exe 3848 iexplore.exe 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 3848 iexplore.exe 3848 iexplore.exe 4696 IEXPLORE.EXE 4696 IEXPLORE.EXE 3848 iexplore.exe 3848 iexplore.exe 3440 IEXPLORE.EXE 3440 IEXPLORE.EXE 3848 iexplore.exe 3848 iexplore.exe 5084 IEXPLORE.EXE 5084 IEXPLORE.EXE 3848 iexplore.exe 3848 iexplore.exe 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4776 wrote to memory of 1260 4776 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 88 PID 4776 wrote to memory of 1260 4776 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 88 PID 4776 wrote to memory of 1260 4776 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 88 PID 4776 wrote to memory of 1260 4776 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 88 PID 4776 wrote to memory of 1260 4776 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 88 PID 4776 wrote to memory of 1260 4776 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 88 PID 4776 wrote to memory of 1260 4776 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 88 PID 4776 wrote to memory of 1260 4776 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 88 PID 1260 wrote to memory of 640 1260 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 93 PID 1260 wrote to memory of 640 1260 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 93 PID 1260 wrote to memory of 640 1260 7b88ef323bf1a7ac2a1e47f7a48c6170.exe 93 PID 640 wrote to memory of 4824 640 winlogon.exe 94 PID 640 wrote to memory of 4824 640 winlogon.exe 94 PID 640 wrote to memory of 4824 640 winlogon.exe 94 PID 640 wrote to memory of 4824 640 winlogon.exe 94 PID 640 wrote to memory of 4824 640 winlogon.exe 94 PID 640 wrote to memory of 4824 640 winlogon.exe 94 PID 640 wrote to memory of 4824 640 winlogon.exe 94 PID 640 wrote to memory of 4824 640 winlogon.exe 94 PID 4824 wrote to memory of 5048 4824 winlogon.exe 95 PID 4824 wrote to memory of 5048 4824 winlogon.exe 95 PID 4824 wrote to memory of 5048 4824 winlogon.exe 95 PID 4824 wrote to memory of 5048 4824 winlogon.exe 95 PID 4824 wrote to memory of 5048 4824 winlogon.exe 95 PID 4824 wrote to memory of 5048 4824 winlogon.exe 95 PID 4824 wrote to memory of 5048 4824 winlogon.exe 95 PID 4824 wrote to memory of 5048 4824 winlogon.exe 95 PID 3848 wrote to memory of 2624 3848 iexplore.exe 100 PID 3848 wrote to memory of 2624 3848 iexplore.exe 100 PID 3848 wrote to memory of 2624 3848 iexplore.exe 100 PID 3848 wrote to memory of 4696 3848 iexplore.exe 115 PID 3848 wrote to memory of 4696 3848 iexplore.exe 115 PID 3848 wrote to memory of 4696 3848 iexplore.exe 115 PID 3848 wrote to memory of 3440 3848 iexplore.exe 116 PID 3848 wrote to memory of 3440 3848 iexplore.exe 116 PID 3848 wrote to memory of 3440 3848 iexplore.exe 116 PID 3848 wrote to memory of 5084 3848 iexplore.exe 117 PID 3848 wrote to memory of 5084 3848 iexplore.exe 117 PID 3848 wrote to memory of 5084 3848 iexplore.exe 117 PID 3848 wrote to memory of 1344 3848 iexplore.exe 118 PID 3848 wrote to memory of 1344 3848 iexplore.exe 118 PID 3848 wrote to memory of 1344 3848 iexplore.exe 118 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b88ef323bf1a7ac2a1e47f7a48c6170.exe"C:\Users\Admin\AppData\Local\Temp\7b88ef323bf1a7ac2a1e47f7a48c6170.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\7b88ef323bf1a7ac2a1e47f7a48c6170.exe"C:\Users\Admin\AppData\Local\Temp\7b88ef323bf1a7ac2a1e47f7a48c6170.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5048
-
-
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:548
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:3060
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3848 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3848 CREDAT:82958 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4696
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3848 CREDAT:17418 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3440
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3848 CREDAT:82964 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5084
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3848 CREDAT:17424 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1344
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5e6ac57e8aacfc97c04c86d0aee61b4cc
SHA1f5c17d4c0b36afc7d69e1c3ecc4f60e0e9e0d793
SHA256d612754cc8550c6f59652c7aaa9cedf5b29fa6e87020db1dc20eb74debb66e9d
SHA512765b7532b332c480a7c00ff2217182b39323e9d96302b8360097fd4a2e00f14c95eaaadb21b7ced0016b357f7f07cd3221780f2f97b779dbe68e945031c4b6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD58b3f66674e6838f15e010a3a85daa599
SHA158fc249721056bb240912535e042dc744c158aba
SHA256c94853517feb843767fd405e5bb1a7e01b8e284e39072bf5fd8ff4e7cc47b8b9
SHA51266f484aae25fd5aa9070652929a2d45c6106475f6bc94e16d49d2f1216d1b07923878205a5eb23afb5b662f527d6319dfbd9cea58d2fac13cd5d12dc141c822c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_D0D14F4F1B2FCD1B1200D55E5D35DBA7
Filesize472B
MD5a82a58d807ea0705f6836eb2b7f8d955
SHA1dd582b6497eff29bbd2870f8549d306378b7659b
SHA256cbf7110c2840c060b7d4000b2f23f1f4d228fa3993b86db6483af19592cbd7bd
SHA51231afe9176677482d4c3865d4d088b53fe3ecef67d64c8fdf474abad5d160b4e8889f0868549d1a48acaa27ed1253e094d9910f98f8f18862357488bf63ef03f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD5a7419b9a48190e72b48fadc5688f4043
SHA18b7459f5470b9b0c003ce4e6d3b2c5dc67c58c91
SHA25646d3c9b45a09f5f3c75f407736d26dcebd07297c9e7ebefdc633840a05d91939
SHA5123bb8094ca1c9faa0ebc4109b485c95a079611a5876360c102341ffc1070b839a8a455f35c0b64aea0880adf70ef532bc0020e3be86ad07a69211548d8e7de2b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_622063C24DB418AA522B5CFF45000BF1
Filesize471B
MD59becaf2b42680b6b722d5a1a155374d9
SHA180c030aaa5c36dc85896c665ef8a9f52a675d64d
SHA256e608ba5741ae47f410d278a9e18edb9c78430238452150f26eac0d089b02101b
SHA512210ddbe89302e77b2c77cc4a1075ff970dead6484a52a5b166498e4d22b0026210d9e0d57115dee5bc2f280f5708b7f681cf38ed71ee1804b8607e10db99c162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize471B
MD5354cc1a19b7ee0fff03e6309f7ef340e
SHA1446b9b1d860665b1f386d23a73d02dd49220c0eb
SHA256e6d67d2c6a10c33503c2b423f29f5c62f209d567e6e74c46606704a31fe8995e
SHA51225fd9c5e1c433b5221b8544d3f495397c555afa7f57e0bda7effb04b8349c842842bb6c6b09c3471f5520b21356ebd9c878c52f8d8633b0592f38aacdf1d1e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_9E9C5BD522DEAFF0AF9BF0B0877DDF33
Filesize472B
MD5fd8a0038405340f8dd2cf0506aa8e4ad
SHA14d68d550b9f69faa62d73766da8f3c572acbd06d
SHA25675157e12fcd0436a8dc506df847385e0445a71aeae796c8b7db22351b19b1ae4
SHA5122b9c6d6ca09e0bdfa8e4d6359df93df82448d171ad86681a0e4e6e73ff8697c374241c3c3c9c85de8eae334ffee1f92237a55fa440aec054f78de39b99eda71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_F134D707C209C83E02D4485138FE5D48
Filesize471B
MD59168a7514122449590dbdad749a1f7b6
SHA113934cbf9663e92a2a82f06df31a8b9cafb2fcfc
SHA25634340df91b7948ae10d08fb0337bd8d161df5795f195d238117e949ba719301b
SHA5120b782614db5bfd9ede22ef709ed4e649d76588888fa2d00bbb3bc6a125a65e41b4d035426b8ae5fb909bb9d5baab060afb06e8108c438a7ae8411f3f7a1b6457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_EC50BC49A28D68A36F5274F1BD1417C1
Filesize471B
MD5d3f2c72f1be782e061bc1657003b1b73
SHA11306cd9d79554ef0ac4ce7acb85e91a359b3e49c
SHA256a7f0e405f3abcec6c69466a913e231cd1b37d5c670249114c369c3d32fc37684
SHA512b1640b868f57ec06ea1738ed625889881175305d99c747ea378e7252140d7756cd05def2ffec588ec75765c1f053fa1aac3f24bebbf3632a7b7c69a77fd08cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_BB0E5383BB6E3CF78C8AC8388DB6A7BF
Filesize472B
MD51f9eefbe35034f39ffea303c28c5c71d
SHA199d81ef6b62292e7b534fb7af50db49844abf901
SHA256e78e2cadc8116a42233b5616180e065c1686f38174fa6675dc867e0ead3735be
SHA5129e6bd8f231a9421aa58ea3bc907c292bf24a07d33db7eb608b51dce681d7430fc54cd0c958ab439a365148840e91e2bd0aa5d6014f5a703fc851a8e4c84207b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD539ccf4080413ef277f667d608b5c661f
SHA1944e57e05278ab74fbcb357909ac2eef0a0aa109
SHA2569adf658b928ca5fc37de8f89d6ad3981de4a5b348743a9a9f56961bf6a3d4640
SHA5127e1f6fc6aed52a570362138b2612c4e7dbeeba914895b5fe7663b26d8cd54c635f9d27c44474986141971cacd9f1f89af79daea01d333875255e1116220c5cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5ce7f4412ff71d6fa3fe1eb58a187338b
SHA14d4ed85787ade13ad7d07075c148947bfaaab3c4
SHA2561ccfdb8e297edf7cf4a28d8f0df10c3ccd549807a32caffba923895724b0079c
SHA512148ce22c10abd3ed5a2a2f1286d01af8f4c697dcb99aa08d47fd3d76c88e696e0387f15711919a5a7229f1ccd6b1466a8d4add3f796c5fdc139c0f9096e755b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_D0D14F4F1B2FCD1B1200D55E5D35DBA7
Filesize402B
MD5f2bd4dfa88314f960744d61103649eb8
SHA189ffe28461f06a79a2d98db4df966415ebd076c2
SHA2567d311a1a3d2738397249e2397459356bee07064379fdbe24156d563f046768c4
SHA512c5b344a8bbb98bdafdf7fc25ed55be7e0d2826f865cf96ab0a8514e8ffb27ea29582d3868f397c4cf2883d5378dbe6feda941ce6e1200717218edd6c6017cfad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD564cbbfe48492d0d5299e726240e3b42b
SHA1ef81f659e258b475a96f96b56d513b0273cf6d84
SHA2568fb770fd0c5c6c6fe0986a72fc08fce4add1b8b4f02e5302708d6dcee0704501
SHA512d4945f0b7bdb127eecedbc699eea9157e28a582e383259627651b866b38e7573a8b0c32c1819b95a38fbe6df18cafd47733144325323edcb8aad0d7c3bc04767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_622063C24DB418AA522B5CFF45000BF1
Filesize410B
MD5bca32a740712b27b1a524c2deb9bf0f8
SHA11488fa586f0b428e3d5b83517e698a9bbd1f744a
SHA25606056ab2456a22fba002d22be28b5b1ecfb742a965d9e2158d36ec879f2fc93e
SHA5120e8a5491ebfd84a6600546ce8797dbf2cb6afe421858a5ba1e730a8ddbe54fbda37ea386222065a646478108619406da476360e9ad3b3c9e8a961f2ee49cd08c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD57f99b2fad089c5eff2c703826150e78d
SHA1ded7b9e0adfcab9ae250ce99c1a9f0ea62ff574f
SHA25667cbeea8a392ce159667943678e052e14bf6a62ea2ac351754635351cc7dc25d
SHA5120ebefcd54abf2c341e3b7ba80884162ba84eb1f35d159274e7e8350151499022ac00e677b360808be67f1be8636968b927d2ca6c03cb637f1496bdb50598ed0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize412B
MD5b852a71803179403239817811dac3d64
SHA1bdc6041e36683f753048d84a3cc503f36fc8a36b
SHA256dd0e150ab74db3ab99c70a3f356bb8bcf6533b9a8a11cb45579131880addb5b6
SHA5124b110363a1b1c28d85064d97a468d86e693c3fdb9988543183296d17b5e9880e46a7320c1a5cb10712ae60273461ff4903a55d2039db38b2ab82f60054ace0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_9E9C5BD522DEAFF0AF9BF0B0877DDF33
Filesize406B
MD5f7e3da7456a52ad1683050393dbc2fb0
SHA15e5eed23ae3af11248c2ba89912e5d5ef3b00ce4
SHA256383e3b0e5fe157632745b5103727d04d1dad066ab8993eed462c19e68a99f41f
SHA5125bbd92a16b3eae654d586fe869dea0506b86fc89549b2a203e4417f07dfa36f854dcbc570744281231b621deda675208a0003fbb95f770da6e25c85700c2c5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_F134D707C209C83E02D4485138FE5D48
Filesize406B
MD5a489209bd3de173286f2855be33d331f
SHA158b12676633ff6459acf29e7328a53d50d0a567f
SHA256d93777c5e4600df1ea104f284a6c2d48f8e7727ce38296e89e97822c5fa48e2c
SHA512da1e16895336071346f6b8cd8e49ff512d57f472413380b0880a0667f872bea1db37ff72c3f8fbe7ef9f0aa536dfcdd9cf6ad9780c667342cd7c889f70b2fc42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_EC50BC49A28D68A36F5274F1BD1417C1
Filesize406B
MD52eb8de9f011a0e3ee5e585c044c99d79
SHA117f7334a541ec7baaac1385b831c39aa30811af3
SHA256fbd4d5e27eadae4047b0898636bc070b757dc7da613eb904c697615484595c46
SHA5120deae290c0343175ef06f2db2b4700bec63f257a07acafc4d31eab1940923dc8fbd89ef65bb1feb2179f2a14dcb166a0db709634348509cb556759897362fbf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_BB0E5383BB6E3CF78C8AC8388DB6A7BF
Filesize414B
MD56dc36c6d17ffa48266127a4aed6e0c3d
SHA155c51c9a561183b6a11ad3c57890ec1a77c8251b
SHA256a5330ac0770eb8e25f838f468180ad13201167da5ad4b5c474a10ab19388c444
SHA512033c653e60001ac1fa63120cb85b308e634e08572da9b2cfac213940389af114600ce2587ebf97a50465594012cc410b1ed40d2e1a32daa87fdebd5d9b55dc4c
-
Filesize
116B
MD514107c5bc44c83e9f711ca8a2d527986
SHA13386ddc48131c9479e0f87e7e80e55bed18e0f0e
SHA2569b67795de8a837ebe4d36d8adc26a5cdc15e5b9561c4be1d59e3ab426fae8b2c
SHA5129ccd28d733dd7fd999091edd2dfd11345354fcfc61b99be9ebbfcdc0e557ca989bf8b1e127cf401d9c4b29f5f0c0fb7c86e9b1f9b1a887f855541723df7da229
-
Filesize
116B
MD5b6f2e406dcf92022ad9663ab559f691f
SHA1fc2553e21aeec2de991752c9d82f776add1177d1
SHA2566a72956c360729cd43068800f9553895653e76f6ef669ec64085839e85678f70
SHA5129094268a8ab0ec00aab93ebcd88b86f953e63230d7a34e6940be11153de015440c74d2a993c2dc1dfcd2928a40dd9d8ec38b89ff6f561185d30df90b515491e3
-
Filesize
116B
MD5ca24ce888bb542c3ea2855e5ff70aa6e
SHA15315728570ab800f944d8e4c66bd93db46806d9f
SHA25696b1f25f3bbb99f533e191d8df0c6036c1df4b8eeac3dabb94c1621ec4a57188
SHA512f25738b5e8373e42dccb4f1ce45f06a2db39befc22dc25813f6c2801d45dc2a323b53affd8317401099a07bf1dfb2b3466c78ecd9d8cc14899d50bf76ce0e414
-
Filesize
116B
MD54802456d6ddb44ebf201ac50330c01c6
SHA1b3a5b279fb0c6dd1d4a0c5208bdaf7de50fed673
SHA256978aadb510a4a358d70d16e7de022a65c6786bc23c6fa16312f3a25614f49346
SHA5121577ebe453b056dd44b5664422197416b816046840efa1e2ed2075ce374acf334070e777b2d5e8b9dc0455422c2b91810e13c07d83445c902a5ff15c68d60c21
-
Filesize
116B
MD51afe5b43fc11f33c6d7a3d6dc4584f3d
SHA1be3202ba396e05798ab700462849a120ecfcf1d4
SHA256c91c821202d760e9d5a63649c25e774fc10f329ae7979396131673d25880fcb5
SHA512e02ea802466694a8dc27c9f391bbe3e14dfb097026f943ffbf1cba12987536c1fa42fa703e9cd72f12ac0fb098b6eb4c314313e236da46a665a8f16e7a09ad58
-
Filesize
95B
MD5c4153af1f593ba73152266555b0dbd0a
SHA1e7c92b9a204b9962403ab626ae4c71b202582c58
SHA25615ec5ef67d6578096f87f20a670aa34c89e4ca2bc81cb062c7109da981c75c7c
SHA5128bf1b6eaa6c8a94897ee6be8bc403ee1a1be8c064118b0ee6c2d8bd80693454e7e1a225e8942269e2f55f77af109886175e45c35a1359315b8396be9cd06b9df
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
34KB
MD5372d0cc3288fe8e97df49742baefce90
SHA1754d9eaa4a009c42e8d6d40c632a1dad6d44ec21
SHA256466989fd178ca6ed13641893b7003e5d6ec36e42c2a816dee71f87b775ea097f
SHA5128447bc59795b16877974cd77c52729f6ff08a1e741f68ff445c087ecc09c8c4822b83e8907d156a00be81cb2c0259081926e758c12b3aea023ac574e4a6c9885
-
Filesize
51KB
MD5575b5480531da4d14e7453e2016fe0bc
SHA1e5c5f3134fe29e60b591c87ea85951f0aea36ee1
SHA256de36e50194320a7d3ef1ace9bd34a875a8bd458b253c061979dd628e9bf49afd
SHA512174e48f4fb2a7e7a0be1e16564f9ed2d0bbcc8b4af18cb89ad49cf42b1c3894c8f8e29ce673bc5d9bc8552f88d1d47294ee0e216402566a3f446f04aca24857a
-
Filesize
6KB
MD51154336c4ebfa89267f27c67dd37dbd4
SHA1e1563ac2a05af2daeba1b1b800f17dec5e9f09fa
SHA2564e21b791a29ced6d0cdf76e55fb64d73d2da980ccd2c462717375c2b641a33a5
SHA512bd26ed34fa7f4702c10a3cf64422b3a7abe80d9358b0357e01a8ff6a7ab088dccadd8eee1568c4616bfbedd8dce295f9d96ed6a081bd6c2b736187151db3afb3
-
Filesize
243KB
MD58b117a0f8d162c59a0da9117fa4c160f
SHA15f6eb22108f15964b6f61da1b64503ace35136c4
SHA256a3d9afcb58dde67278eb621c06d536f1a10c8abc348664064a68b9803b3504b6
SHA512cf1e0a6d13806784f3f42744608f37bc36190b03b88506d689be55756491e9ebe5629731714340096716aa01d9cdb512ea1a1356653520cd6e0c81c9f5c65b17
-
Filesize
743B
MD5bd361461dbc83db995e644e42e59dca9
SHA17d3d5350646382e10d1fd84a3489d2eec7f1c651
SHA2564e5d6e60573346e0eb3e8368ca629af38d0d59f4e51f750724e7f95f8be5917e
SHA5128b09cd2f95cd9e50a04aca3a57942e565556cefd65d6c903321a45bf4d746f48ca3e0785f2330483a0ed52437631d9bb086e958368c3da44b4bcf3314bfd0f5d
-
Filesize
66KB
MD5781608aaede6e759fe48d7967b0a6c53
SHA1bc595134b15c604ec6d42dded9f6d167d94084ac
SHA2567371dd376a195424e3df2ee7877a045a2d60c307b3b3a119789c7160b7c21b92
SHA5120eadd4bd38115eee3db9c62508143e7b93b5ff5fc5f8f05489af21c6499ccfc9e741d4de740e75ab933a32de2a1ca5cce7777a60b015ba53e503196e75bd0c71
-
Filesize
102B
MD574a981e3aaaa1f7200e5f87b03883703
SHA122cf9554c2d813a219b2982ae769695119ac1092
SHA25655052d853a3f144505dc773ef237ac838af312c0180ff293f7cf1a3847345eab
SHA5120e3190f7e3de1b0127001342b33bcd3f23ad1bf113fea94a97f9d4a59c9c6bfeec61a5889bb69fb0d16bded2656529dffd69e48d4a4b32e436346772d7d8fbf2
-
Filesize
1KB
MD54c2e266587bb622926747856f9bdb65d
SHA116999e0d2a01b96b70a0ef191461388c5047f1ed
SHA256cfddcd1ab28963d8219ef42d0b455b1e062521bfe7b100d4c47e0b9dd0a79023
SHA512c9526cd6537aa068b48641fd2dfb93843fc5f535faa4cd856d4d3427c8f1e97d79c969215a9291fd50a96597c43dba3c45a3fe2ad32c78677e38f93dbfc32ca0
-
Filesize
12KB
MD5a2d42584292f64c5827e8b67b1b38726
SHA11be9b79be02a1cfc5d96c4a5e0feb8f472babd95
SHA2565736e3eec0c34bfc288854b7b8d2a8f1e22e9e2e7dae3c8d1ad5dfb2d4734ad0
SHA5121fd8eb6628a8a5476c2e983de00df7dc47ee9a0501a4ef4c75bc52b5d7884e8f8a10831a35f1cdbf0ca38c325bf8444f6914ba0e9c9194a6ef3d46ac348b51cb
-
Filesize
4KB
MD5c6585d35dbe66427d2971405193e3420
SHA188f0c9cc830f31e475aa5040a44c959b6e5b309a
SHA256b7538e415e50685e667d23705f5513c5770ae627e849bd1ea3c98f5abaf336c8
SHA5120042ffe3ee3c8b62a7f9c58de72f8c27730a993f423a9daa32864102f8621ff52111a8b8f55b5e882c6e338ce3da7a4c1a46ac9f621b53c8aef95bc7e0d881e5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FRK3R5YS\o-0mIpQlx3QUlC5A4PNB6Ryti20_6n1iPHjcz6L1SoM-jCpoiyAaBO9a6VQ[1].woff
Filesize16KB
MD5dd6fe4c6f321f39c750ee024b38bc1c6
SHA1192f09d9b27fd7518a7b2cc7ba503d6f83c68307
SHA256d2de7fbc083f058b6c7eeb6985a1d24e46e5e9be3aebf0f2d3b26204fc7edd94
SHA512e677bce8d3920d2e755c9fb80a6a96922c5504ecf06b5a650787a22f29d5f39b2c37ca336bdca41b25b71d36caec21dac78d855e0819435165d3771701ca45a4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FRK3R5YS\o-0mIpQlx3QUlC5A4PNB6Ryti20_6n1iPHjcz6L1SoM-jCpoiyD9A-9a6VQ[1].woff
Filesize16KB
MD5d22f975c52faaf5f561bcf90641485d4
SHA14092103795efeb56b3cf83a69d1f215771ac651d
SHA25608cccd7191ddeadbb2ac3f16aaf5e3a0b65d2477fdb5a33e3b17d1bee9501d6c
SHA512b85b99e957dc5ffc88b3ef14d14b7b7738e1210c01decc249fbb4a5274baa928b6d81e652244572e45ac162aa4616b0a0c607d59a01b01303e572ac3bce03382
-
Filesize
5B
MD583d24d4b43cc7eef2b61e66c95f3d158
SHA1f0cafc285ee23bb6c28c5166f305493c4331c84d
SHA2561c0ff118a4290c99f39c90abb38703a866e47251b23cca20266c69c812ccafeb
SHA512e6e84563d3a55767f8e5f36c4e217a0768120d6e15ce4d01aa63d36af7ec8d20b600ce96dcc56de91ec7e55e83a8267baddd68b61447069b82abdb2e92c6acb6
-
Filesize
3KB
MD551b8b71098eeed2c55a4534e48579a16
SHA12ec1922d2bfaf67bf3ffabe43a11e3bf481dc5d7
SHA256bd78e3bcc569d029e7c709144e4038dede4d92a143e77bc46e4f15913769758b
SHA5122597223e603e095bf405998aacd8585f85e66de8d992a9078951dd85f462217305e215b4828188bf7840368d8116ed8fb5d95f3bfab00240b4a8ddab71ac760d
-
Filesize
502KB
MD537c6af40dd48a63fcc1be84eaaf44f05
SHA11d708ace806d9e78a21f2a5f89424372e249f718
SHA256daf20b4dbc2ee9cc700e99c7be570105ecaf649d9c044adb62a2098cf4662d24
SHA512a159bf35fc7f6efdbe911b2f24019dca5907db8cf9ba516bf18e3a228009055bcd9b26a3486823d56eacc391a3e0cc4ae917607bd95a3ad2f02676430de03e07
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\J6M39GIU\KFOlCnqEu92Fr1MmEU9fBBc9[1].ttf
Filesize34KB
MD54d88404f733741eaacfda2e318840a98
SHA149e0f3d32666ac36205f84ac7457030ca0a9d95f
SHA256b464107219af95400af44c949574d9617de760e100712d4dec8f51a76c50dda1
SHA5122e5d3280d5f7e70ca3ea29e7c01f47feb57fe93fc55fd0ea63641e99e5d699bb4b1f1f686da25c91ba4f64833f9946070f7546558cbd68249b0d853949ff85c5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\J6M39GIU\KFOlCnqEu92Fr1MmYUtfBBc9[1].ttf
Filesize34KB
MD54d99b85fa964307056c1410f78f51439
SHA1f8e30a1a61011f1ee42435d7e18ba7e21d4ee894
SHA25601027695832f4a3850663c9e798eb03eadfd1462d0b76e7c5ac6465d2d77dbd0
SHA51213d93544b16453fe9ac9fc025c3d4320c1c83a2eca4cd01132ce5c68b12e150bc7d96341f10cbaa2777526cf72b2ca0cd64458b3df1875a184bbb907c5e3d731
-
Filesize
40KB
MD59e33acb5cab6802df44887bd6df31416
SHA1f96f235aeccf43da8e795c291f3a3c1390d8f377
SHA256ca02d1a91f43d6b8c5d8d127d04e95afb736ae1779577bde0a6f0641cc4f4893
SHA512a6cd85df3e64c7b7b462dd07025563f5ccf4c8b98394ba0d31e9705fc933ee89e1c13874b11f428c090179ebc70bfbe2728a92a8b56fa5a58253cbb7793fe333
-
Filesize
530B
MD50a127ad39a8ebe4207492293b556adf6
SHA117d3dad64e4f9139cfb85bbcca6659a8aa532a48
SHA256c1294965425b5028a83bbe5eeed0cd9b92733ec41efd07e34532522d4c97b6e1
SHA5125aa845c5c6c20259d9c6bc0c9fdbd13ff178ba4008865f7113387767db0ad39cd53c1d276cfa4997186fd39f21d30bf00caf8d092e5c04119d992368b1563df3
-
Filesize
2KB
MD51aceace0b63ef3e4cf3a349b83f5725b
SHA1fede44a511cbb7a94be77c6a3fbaf05c0ac735e9
SHA2567185ad18f6d3ea3d12c0a64a084a4bc570ba2e79ed46a1fb3427a4c29ca9bb20
SHA5126f1c7357b7cca38c3fa5fa6cc8ab4171d9b8522eb77c9ac814102a2b4711f021a6387706ec8f4da8d5c199498c4695e7289ce647373451b4d60b755fd8af1ba0
-
Filesize
1KB
MD5e527bd653c6ab12a65243ea7b6090d60
SHA16f4cecd8c8d38e340a81295606d4faa28d34d0a7
SHA256397380d4c94183937f67dc28fc89697fadef075f66e637080ec71545b07d65f1
SHA5129896c83694472a6bfa82c34c637c59db24d04591027df55416bd070b223230976d129d12b1d69618b6039a3b4e25a8cc9f79ad27652ec079ac80801eb7a596cd
-
Filesize
9KB
MD5defee0a43f53c0bd24b5420db2325418
SHA155e3fdbced6fb04f1a2a664209f6117110b206f3
SHA256c1f8e55b298dc653477b557d4d9ef04951b3b8ba8362a836c54e2db10cda4d09
SHA51233d1a6753a32ec06dcfc07637e9654af9321fe9fa2590efc70893eb58c8603505f2be69084fb2bcbf929218c4e7df9f7a8bc3f17a5b41ed38c4d8645296ebab5
-
Filesize
165KB
MD565760e3b3b198746b7e73e4de28efea1
SHA11d1a2cce09b28cffc89378b0a60cbb1aa8a08c4f
SHA25610e40ea3a2ad69c08d13e194cf13eb4a28a093c939758a17a6a775ef603ac4fc
SHA512fbcb91f26b7bd874d6a6a3b1d4d6f7277ded091cdae5706c285b4d5d17446a1bf58572c224af38393ce49b310a51d5c5d60711c7094e5d32abbaaf10d1107e1b
-
Filesize
55KB
MD5eb4bc511f79f7a1573b45f5775b3a99b
SHA1d910fb51ad7316aa54f055079374574698e74b35
SHA2567859a62e04b0acb06516eb12454de6673883ecfaeaed6c254659bca7cd59c050
SHA512ec9bdf1c91b6262b183fd23f640eac22016d1f42db631380676ed34b962e01badda91f9cbdfa189b42fe3182a992f1b95a7353af41e41b2d6e1dab17e87637a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K44LV95Q\5j074AdDmmeUGgx3dNhxK1JlBXnpDKPLLo4EkeP6Hhg[1].js
Filesize23KB
MD51079c72962af933af886ee7d5f540f6e
SHA167e167c1aaacfcc5acda7b26b892e02d97ef7332
SHA256e63d3be007439a67941a0c7774d8712b52650579e90ca3cb2e8e0491e3fa1e18
SHA512ac14360c87adf0ed2b78df4f8b389a7058a1780a2e0637456113d27bdf08dd76751a011d6ea332390103319ea149655f1cf6d7e97400871e3d8e2a2fb3f2ab8f
-
Filesize
850B
MD53b2e99294f82f2ba64c2ca33c8b607e1
SHA1991dabc70bbdc7e83b422f16044866e286bba07f
SHA2565c233ff100be4a898501dd4838cca4ecf914eb5926cc287416793208eed9d151
SHA512ce5f2e9e1caef7b744767386e8e10273703d6856590b6b8f812ee73fc4aaa53319f12b8c42ce087448ebf11766dd27ed8376786d741a8ebc37c24450a9545e67
-
Filesize
708B
MD53ceb91c3c875ca5750c7aadf7e4ece6c
SHA1041a428a64ee9d32d6da4befacf6d8e5e3f5e436
SHA2563ec2212fc76e58ec342024869548e63c5a954162535572610a184aa0690577c8
SHA5122638d74954ce8fe60b66fb9b6222b41660014426b0ff41accd110191e206764e0967a253d348a9a24417eefa6240ab2d3c50eebbeccb1ce484f359be484518c3
-
Filesize
23KB
MD5ef76c804c0bc0cb9a96e9b3200b50da5
SHA1efadb4f24bc5ba2d66c9bf4d76ef71b1b0fde954
SHA25630024e76936a08c73e918f80e327fff82ee1bd1a25f31f9fce88b4b4d546055d
SHA512735b6470e4639e2d13d6b8247e948dbd6082650902a9441b439ceacc4dfce12cd6c9840ee4c4dcb8a8f1e22adb80968f63ace0c0051811a8d6d1afb2b3c68d74
-
Filesize
2KB
MD55e3fff838a9aa2ef46e2e4d9fe13ab85
SHA1a6ea4b142dd129e28d02ecc0dc59edade1976376
SHA256bbb3555394a1e45cb61c59281716bf177f29a026efef4750eed9c8a21b838765
SHA512af1bf6100980f0af9243c24802fa904350193e9f31d5f43cab779e17f03fe2214cc32a6621a1b5110108131d7a6aea5d68c4c6d7f04ddee278ff9da026d2f3fd
-
Filesize
84KB
MD5c9f5aeeca3ad37bf2aa006139b935f0a
SHA11055018c28ab41087ef9ccefe411606893dabea2
SHA25687083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
SHA512dcff2b5c2b8625d3593a7531ff4ddcd633939cc9f7acfeb79c18a9e6038fdaa99487960075502f159d44f902d965b0b5aed32b41bfa66a1dc07d85b5d5152b58
-
Filesize
188KB
MD55134d0ba977c9069df9819ca4f45ebd2
SHA11f3855fbb6eef00af8f55825de07328b94dab202
SHA256a199758780e4530affcf877c34b54d2ba18df77e637f661f4658ea0bfb931068
SHA512ee17dc516cd4e309649c92026196990960c29a873b75c9bd6a65d49e8c2a37bc834c791984c7d7bd8594dd1d9fd2f2d5fdd525149fbe4aa715b4697c820f5f33
-
Filesize
2KB
MD5ef9941290c50cd3866e2ba6b793f010d
SHA14736508c795667dcea21f8d864233031223b7832
SHA2561b9efb22c938500971aac2b2130a475fa23684dd69e43103894968df83145b8a
SHA512a0c69c70117c5713caf8b12f3b6e8bbb9cdaf72768e5db9db5831a3c37541b87613c6b020dd2f9b8760064a8c7337f175e7234bfe776eee5e3588dc5662419d9
-
Filesize
7KB
MD5681dfeed62aa8b9142e62d64c31b2110
SHA15c273df03fbc28214fcc8a512416e85737a56add
SHA2561749c7e7bcd9cb00e1d2238f9a024f6829e2c62cac99eb629599937f4fa2254e
SHA51268c1ecdb7c054ac468dd7058220fce650f88563b8b8f43bbaa9fcdb335b58912f43a3d6848dcbc21573f257f59f89643b87d63749b49857f66ab1ef0542d2a99
-
Filesize
192B
MD523c7c9601fcef4d3b7a0156f978f548b
SHA159a47fe9edd6026b0b468628eb3f96b05a010f1c
SHA256eb2697b60c526a1d4980e0874700e7c2b4f43bb9292770f71bb4bb972506e415
SHA5123d250e9a223259a23f0ebf4fbb20db3fde955fdf80a64b9c7278290c60ec2560ebf665764d4e35515f9e69e1cba2f4e21fa7504505cf3ac8d3a380201a284f6d
-
Filesize
49B
MD556398e76be6355ad5999b262208a17c9
SHA1a1fdee122b95748d81cee426d717c05b5174fe96
SHA2562f561b02a49376e3679acd5975e3790abdff09ecbadfa1e1858c7ba26e3ffcef
SHA512fd8b021f0236e487bfee13bf8f0ae98760abc492f7ca3023e292631979e135cb4ccb0c89b6234971b060ad72c0ca4474cbb5092c6c7a3255d81a54a36277b486
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms
Filesize3KB
MD5c60d374d7c339e619aaf30c297501f11
SHA1ae6ff7e259e41e8e3de8bd224bc0e35822898d5f
SHA2564a9a8d053af8fea439a21281690541496ab90403669e8e637d2a937506144295
SHA5122f86f96db65b4818c734f39e262240a1ad906d520877209f60435e1189a04db193f313707fa4e0af679561858866f585f4897108dd4a5631fe0163edd3a29f42
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms
Filesize3KB
MD54ada337b29ec260c3f29c3095a6559d0
SHA1b915fd67923e96c300381cfec1108a5b2c842b3f
SHA25601f0d24ee6db1f603525db3fa23256216cfb8a7a0ec7cfbc8ed70e95c392a3c1
SHA512e6d7a5dbeb8359cdead6a2056b82010514ed17ac26e9711a7581550d5ca976422469a50e333862238339d395f36a1e854f747e59bafdd3229d8072fd6cdbadee
-
Filesize
515KB
MD57b88ef323bf1a7ac2a1e47f7a48c6170
SHA1bbdc35f615a1b21a25082b39010e5b00f58286ad
SHA25640e36713f322935b08d7dd837e58b77ae18c969b2dde1784ecff64b1f1e511e1
SHA5121e339c959f4bfe933d27db6198bba05748bc1546d6144c79e9ef3250b0dacf098ccce2cc890d038024698fe23b54cbc0e7a6286cda9327749f8093204f96617b