Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
7470d5872f941b3b292b1680e6e15cb0.exe
Resource
win7-20231215-en
General
-
Target
7470d5872f941b3b292b1680e6e15cb0.exe
-
Size
60KB
-
MD5
7470d5872f941b3b292b1680e6e15cb0
-
SHA1
06965eadb79740cad6c93652df13b61b5e140dbd
-
SHA256
92c1632863faa07bba110f15ba81148d1b0835636c41037b41cdb75ddee33e47
-
SHA512
84e2d14824cdff08a0420be40800205f643c3db76ff89987fcf5ba5bdcfef8a4dec9ccc640055e000d21c64f3550fb94097acc266c59e91fc2bad336464e3eda
-
SSDEEP
1536:ooglLwBJgfDCW5TMavqjBKXi2le5CP60PwfMMPnouy8:oogx4JDWdMoqjV7AP6wg/fout
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 18 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-43533432" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-86671613" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-27453964" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-54712753" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcshield.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UserAccountControlSettings.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winhlpp32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlh.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ecls.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luinit.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vscan.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsecomr.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\expert.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icsuppnt.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mctool.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\whoswatchingme.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netstat.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsched.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\popscan.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pview.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atupdater.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530stbyb.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ibmasn.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ostronet.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webtrap.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FirewallSettings.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcagent.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvarch16.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rtvscn95.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netarmor.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\normist.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sdclt.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atro55en.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbmenu.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icmon.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nav32_loader.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccapp.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cwnb181.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\w32dsm89.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atwatch.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fp-win_trial.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvapsvc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vccmserv.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\routemon.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scvhosl.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autodown.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpf9x206.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctrl.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vccmserv.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alerter.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldpro.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfweng3.02d30.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tcm.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\trjscan.exe winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NGEN.EXE winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avnt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanh95.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pccpfw.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tgbob.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vswinntse.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\w9x.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\EXCELCNV.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aplica32.exe winlogon.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 7470d5872f941b3b292b1680e6e15cb0.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe winlogon.exe -
Executes dropped EXE 2 IoCs
pid Process 3160 winlogon.exe 816 winlogon.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/816-16-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-19-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-20-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-30-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-39-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-40-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-142-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-242-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-403-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-495-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-659-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-673-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-757-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-840-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-1023-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-1116-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/816-1248-0x0000000000400000-0x000000000042B000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C4D46535E40555E4 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\C4D46535E40555E4 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3160 set thread context of 816 3160 winlogon.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Download winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Local Page = "http://8mb0q057x178925.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "32" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "121" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hugedomains.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0057f352784fda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "178" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809ac049784fda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b089e24e784fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.hugedomains.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "2198" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4d347bde384c849be64bb2f1c358fef00000000020000000000106600000001000020000000dab9ecf67a5ddcebef2569e4804e469434a61f421dcb52c324c408cbadec14e6000000000e80000000020000200000008513a3f1d323070392c3cff2dad890cb48005a6394591e9348a408e40d0833b5200000005426872ee445e6e0a849762c3efa9ca0d1df08b49606418ad2e8a00b5e7be7bb400000001d331252ab94d08fedf2cb73ad219e67fe6b1207cca22183d05cc5667082cf71cb44d2f2ac2963673ab4c9ec48149c9de875a3930a22e9e4c020c27224bdf2cd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.hugedomains.com\ = "32" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31084408" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "6" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4d347bde384c849be64bb2f1c358fef00000000020000000000106600000001000020000000ebdad432b2dca6e9a89a44e8783c65af0f476e33e84abfb9cc00ddf5f7e79d5c000000000e80000000020000200000006dc66f08b116c805449f2c72d32c9bb13123ab7dde249031153e1bc37ea5aac72000000096f77f20c0951e81a29c723a427a9ca632ab1f741622627b0bc764241176716d40000000f8ceb26972f3340bdf33992115740b6866fa50d5bb442d8675f9253a3eccfb7d2315256ce32cb6516f14d3ed10c5bb1440c10482fd7ee417ec6bbdb6ba8f22c7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "31" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "2255" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://hxv48727d1jc37t.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "25" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "Yes" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.hugedomains.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4d347bde384c849be64bb2f1c358fef000000000200000000001066000000010000200000009f6f3fd11f486b8dbe714ef06b4d3d7c1fd868da060a0d4ca7e01446454ee780000000000e8000000002000020000000b0b774521b9908d1833c46e456883c0526d218813ba1bcbb2e096ba72afac4b7200000005f167bb338f04d5f68bcd3d6c82acc6f8fad9184daf8ebc99626a24d2c3ced4140000000fce316e2dfb40b7defa8015db2910f552212c7f2b13f8e0b2fa1df1dfbc0fb79bb45dc1530e3e72bcfbe2f303c822a357e35c524fbd0f71152b9ef9fe60c4a5c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f092fc6d784fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "172" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1253413356" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "0" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Local Page = "http://335xpjof1d73z2o.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "115" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "2255" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "115" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hugedomains.com\Total = "32" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4d347bde384c849be64bb2f1c358fef00000000020000000000106600000001000020000000b280ee3255c2987f3fcafa9596768b790e4e520a068431074205df57aa7f364f000000000e8000000002000020000000781ace7e3bf11fd4fb92b6a665c2558589779d903e42db086291d0e338257df9200000006fbbaf1085ed86f4fcb0cc17d14b830f78d86a18364490476940f99b7ddaf70140000000e2ece76aafa8bb839a81843aca9431905f60b053b0f81bc89b0504166e1df80b24903d6350a21069540530012ef36da744c83790f5f72024064c021d47170184 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\photos.google.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "257" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0261044784fda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31084408" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "197" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "12297" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "339" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "57" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://9uba0096km4okap.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://m80zmzr22meo511.directorio-w.com" winlogon.exe -
Modifies registry class 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3073191680-435865314-2862784915-1000\{07FCAB85-5152-45A0-8C4D-7B71C91A3DAA} IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3073191680-435865314-2862784915-1000\{54584ED8-5415-45AE-ACF0-86F98025CB34} IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe 816 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 816 winlogon.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 4064 7470d5872f941b3b292b1680e6e15cb0.exe 3160 winlogon.exe 816 winlogon.exe 2352 iexplore.exe 2352 iexplore.exe 5060 IEXPLORE.EXE 5060 IEXPLORE.EXE 2352 iexplore.exe 2352 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4064 wrote to memory of 3160 4064 7470d5872f941b3b292b1680e6e15cb0.exe 87 PID 4064 wrote to memory of 3160 4064 7470d5872f941b3b292b1680e6e15cb0.exe 87 PID 4064 wrote to memory of 3160 4064 7470d5872f941b3b292b1680e6e15cb0.exe 87 PID 3160 wrote to memory of 816 3160 winlogon.exe 92 PID 3160 wrote to memory of 816 3160 winlogon.exe 92 PID 3160 wrote to memory of 816 3160 winlogon.exe 92 PID 3160 wrote to memory of 816 3160 winlogon.exe 92 PID 3160 wrote to memory of 816 3160 winlogon.exe 92 PID 3160 wrote to memory of 816 3160 winlogon.exe 92 PID 3160 wrote to memory of 816 3160 winlogon.exe 92 PID 3160 wrote to memory of 816 3160 winlogon.exe 92 PID 2352 wrote to memory of 5060 2352 iexplore.exe 98 PID 2352 wrote to memory of 5060 2352 iexplore.exe 98 PID 2352 wrote to memory of 5060 2352 iexplore.exe 98 PID 2352 wrote to memory of 2800 2352 iexplore.exe 101 PID 2352 wrote to memory of 2800 2352 iexplore.exe 101 PID 2352 wrote to memory of 2800 2352 iexplore.exe 101 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7470d5872f941b3b292b1680e6e15cb0.exe"C:\Users\Admin\AppData\Local\Temp\7470d5872f941b3b292b1680e6e15cb0.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:816
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:2756
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5060
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:17422 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5dddc70946c87d597fcbb22adc5bcb4e6
SHA169fe3feffc8aaff40a0850a1f33bd8c2bed63399
SHA25695e572a3c0fadc2b820644ff9571d555f3a348c61315e60456d7c50c426bc225
SHA512f711fdcf7581d52e24ff80739f9114de57d62d05d01459599c09d12b8e63b31e5a6d2ad9392ef9a7688c49b1fd357b8ebdddcbaf4fa48b940df292d99d683a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5819d2f6d228f94bfebac03edbfa4bc64
SHA1257acbdf2270c5285962d10460a77f422143cc8d
SHA256e8b016b694a9c3224b6a405cf52010c03b7bc6c8948ecc8a3d9aaa39a18f6d47
SHA512b81c03ca94d21cdb106281fa478dccd390e07bd0a03d0077952041f3d1d41a671ac9a3d4c97d41d9c8f74b14214abfcaff696a10d0615b603a7a9b1a67adde67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD54c8f0d1fd5142e86be7908a7e625b4d2
SHA1c446c20f4271b92c3bc60ed621cadeff27a67bf8
SHA256ec5a02fc5bf94261e5aff87b9c6c6cd7bd41b9d1b597550edeae52f83a821e32
SHA512aa81184f54e38982f28a53e3dfa82f9c880c6857faa709204a88f724369b8805adad50fd5913f011f91f2976620834ecc3e84dded0ef07aabd41563f0bb4e42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD56c9b222cd1e44e41ad93ba8d2fcb6512
SHA1b00df12a3bb2efd842f545c288b4bc948fc0de8f
SHA2564d9577e0b9cdb6fd342f66ed39177a482fa460da255f954dcd6a32b88385727d
SHA512809faeef601ca22eba46491747fc7dbb4ce292aaff753ec0041cd85121fbf914f78a23bed0882ce89712a0ebdc52d3aaedad71e9e98e194c62289577c82f5507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_F6683F4776D0303FB83B8F5DA6BFA751
Filesize471B
MD533e8c93f56db3d34133fa55ddf704264
SHA100095f78d77938d3867099fceed005e114c0125b
SHA256e10a15ae115bad45a00a575ba12e27105279642a18446f5bc6e36018626866ec
SHA512b12a6147c378c7b6450961fdb8dcf2d80dc45d5b3f664975d53ab47b11ee14600f14745eaa6cddadb9589cf42a119ca809974b4857f51206ae4780d48bee8813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_0FE0C38FA389BB89AC6FA011EE620F62
Filesize472B
MD51b175d94306fceeabfba17df3e707e07
SHA1ee96e3c5210457462b12fa7b68c74ec22306726c
SHA256387f135d0815547613eec6c3165ed22488e38fbe7ed3659f85da1da99f521f90
SHA512a41d7bc88b3d946adf3eea1c0de149d043585a817d66cb083037905366d3e94a4cab01a3b1fbbe347c793a11de96e7ed12b5d9ad0784e894ec27a0221aa3db0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD533b349e03ad668befc331e9b79c15c30
SHA17da33a275e632a3bb5a03afc3df3cf349be1a043
SHA256d9af56f69cf584f0c105a4919934a3e0937912b3245dbc58a6f555aa4597d18d
SHA512bbf477456a8bb8da94f72349c3803edd1a4a176d886e01b3a0667961fc41d479ea2de2d103c5d34aa0c1454afebf4060a13ae6c9a2d9be517476053da2f6c9bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5f346daef12cf9c5db66afb729f731b49
SHA19408b74180b2881c30ea9352f052ecdae033b44a
SHA256396c8ca8892a71870ad87b95a98990146458949a4825b6df226e64d91ea450a2
SHA5127cc2a3114749222896add740814520ea9b04849cfc7b83ca4b56896e090a75fcf8a8ac51bcf2f7eb0742bbd0328858184c8fbc3ea786b91ad51d8212a7333b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD5f4ba35b191ebb48449817bf02ec683df
SHA121700a5de6b9f2f056ac8a1ad28b3d0359e863a4
SHA2563b635f2831006de25deb2b341dc96f55a0f91418e347276844d3cfa9fc16ff85
SHA51279b8fae64fc16864ebd72f215b0466ca72a698f593a3581728457d1f0b26da5ef84eb4167d31abf0625850a9b5cd59c9f82face0e6400cbf3f3265ddbd75e585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD569425513007d3b7a936e7a83cd377cb8
SHA1b4d5de52481e929788f8bace8cc1eab3986a7dd7
SHA256194b3fe3d50bc1fbfec9d34c36b456ba4bb9fee04012fee320e33a8b0edef239
SHA5122fa2328d52eb22d46c4e380c7284e2fa3ef7826dc2f7ae28685e46155c76db726dd1b766a372bde9d3de75f0f452b6135260a3b189252c3b9f21f2243024ad45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD58715d39fc930d566bfb1c0a2932b7d2c
SHA198d81b8c14b00d53e322e089c820d443bfe21817
SHA2565bb50a34a742a2f8072a530bbabf26514c5b9676e893cc59be6bdbeb97cbcf0c
SHA512c372346e6fbc7764f172ee42def5dcb8c6f1de1e3077fd7e2448218e30901c17ba9bc9c82f79a7f80ead1efd8552f4bacae4d5cdc17916b6174ebad0169a65ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_F6683F4776D0303FB83B8F5DA6BFA751
Filesize406B
MD580fc530d3169577199e9bf9bf23fb537
SHA1dee85955c34be367cf4c99611bffdb6a9db5f3ba
SHA256b9209284a2ec134b81cd8c2b3616da42e8d44ea3335dea08c395f51a8eb6f90b
SHA5122b74931f3e6d1beb77c3704395d161a50a0fa04f4f0f5b5f79f16799943400ef8aaff25b3c21cdea72776804040020efa230eb053c996d8861fd32f459f818d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_0FE0C38FA389BB89AC6FA011EE620F62
Filesize402B
MD56aa78b2cec53834294fb3afa79b60f35
SHA1e6077313c5e1a6373bc0a429828da7a440a7644b
SHA2566221b68cfa55fd232a2d25af41073097a73e266af60d477459df3d06a66910e6
SHA5126ace05fd92be389f23be31c117768e795b5217af044e4b15348f3ac50340967f8f9f1425f0ab538730c989994ff67d05d892776932918a4101b70c5e2e744f24
-
Filesize
99B
MD557208d1b48a2310665442696edbe17ee
SHA174550923fd1614f7c7c1dced69f3d45b9114c214
SHA256bc20ebd668eec3c26d1cfada98758b7ee30d691061c8c36f27885bede5ec694a
SHA512218e430d680eb0c3016b0906b56a2b9242a7c3f098f831c1e2da92628ade5e56ff96c24f1698393eab2911a3db758d2e12bfabc02dbce45e8f91f6a244898a81
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
229B
MD5bc45500f49f7c476d8972ab27bf95f08
SHA19b7a4ea37a3ee4cfa22a385777814aae8b51e1df
SHA256f7fafe5cd48dc4bba1d217447e5161a21af59a5363fc1fb15770d580ae31ffca
SHA5123d869df58a92c206d2ff769bb8cc7926bf12cb7bd7caac2e85dffd0bfb4a769f88eabce5cf0f16416a94880dd37af16dadc5454abf8dae7fbed876d9c519a932
-
Filesize
18KB
MD5b5e79ad2dfd241b230678cd66d6b9832
SHA1cbd1d2ff32169f6e7cfeef7f6c03e2c1caee6c6d
SHA256c6e53f736fd76ed14908880ee13abd8795020435598c9737f284e01c60fb5eff
SHA51245f99e7b0b46658a6eedf3270fc441833ebedad6d855c6053bb698251d9aa0870a78012b3aa89223aecf546002a7df3ea78f372e56587b5a2994ba4605cd0655
-
Filesize
3KB
MD56acac406a628b160bccc1d9d1adcdc93
SHA1502d8066ba6c9eacf24d07a16d8e197dadfda27b
SHA25614630f2925a9bdcaaa2c9a411cd77e930ca721fcc226f435b5b4738b061620f3
SHA512b9cdff9d1516de3ce0bd31aa1b9fa84f3b564075b435c2fa92b1e6aff7a43ce9e9f4de2758026d2a113dc11e3c7db948400758fd6fb9f98f6f41cc4407c2d471
-
Filesize
116B
MD5e922e022914db065e08ffc7a2f7ff273
SHA162683fd6b94dffa3fad92b0b00fc5b80164ea740
SHA256994c5735bd4903d435ce648c1b0be0179f406c1583bbfb81dd789bce15d114fe
SHA5127adf93eaafad7cedbc45b2c87295b52e2a513b2d5ac766397bd30c221da669cf3818a690ce230cf7078b4e90b6051d5b27147d6290e53bf9b2a94583a59d0765
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
1KB
MD5446404d2e34a83ae18af74338cbd048a
SHA1dff734b12a296aa16dc3c9047c3d609945955419
SHA256c3c936ca8226784b0520b6079f164e173db289a68283f166e1379b2ac9f81915
SHA51224ecb35f1d12b4bdb6feb30df3c6dcc38ae36b6fe67b09c04b83636acf1b397efea0200172b862ba1a1a213dd1885eee2367724e48fc4d0ef32b991f51c84e40
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\L3T8W3B4\YuiiIo4P4ZHg2F3GHKf2auO9Fzpqn5dJxD56uxpuDSo[1].js
Filesize23KB
MD5e2765fd5b6374dfae397edc8ae9afe1f
SHA125dbff6ee8bdf654c854f7a567aababb234a061d
SHA25662e8a2228e0fe191e0d85dc61ca7f66ae3bd173a6a9f9749c43e7abb1a6e0d2a
SHA5123081bb1826539b257dde74668e5d428502e71f20e127d1b047dd8bd7739eafcb1bf4b5b26ff2074dce983d90071ad384974cccc0b982215d2b7e5247425ccb59
-
Filesize
708B
MD53ceb91c3c875ca5750c7aadf7e4ece6c
SHA1041a428a64ee9d32d6da4befacf6d8e5e3f5e436
SHA2563ec2212fc76e58ec342024869548e63c5a954162535572610a184aa0690577c8
SHA5122638d74954ce8fe60b66fb9b6222b41660014426b0ff41accd110191e206764e0967a253d348a9a24417eefa6240ab2d3c50eebbeccb1ce484f359be484518c3
-
Filesize
23KB
MD5ef76c804c0bc0cb9a96e9b3200b50da5
SHA1efadb4f24bc5ba2d66c9bf4d76ef71b1b0fde954
SHA25630024e76936a08c73e918f80e327fff82ee1bd1a25f31f9fce88b4b4d546055d
SHA512735b6470e4639e2d13d6b8247e948dbd6082650902a9441b439ceacc4dfce12cd6c9840ee4c4dcb8a8f1e22adb80968f63ace0c0051811a8d6d1afb2b3c68d74
-
Filesize
6KB
MD5594853c02310c19f005cf809c8a3ffd1
SHA19fc99c9435d265d5133ea4f00d1baba6edfcd75f
SHA25689b88e58406dfd8c5a6136e0d86392703013ee5e2127c946d429791e64f70091
SHA51278ba0698f99ca792d7ba1b252913c1a0fa6dbf1b785d86e11671607a23d6da0b4b800995ee3831326033c28b57efafea1d3c96f4874a7c48c67671d01e1a2963
-
Filesize
1KB
MD5e527bd653c6ab12a65243ea7b6090d60
SHA16f4cecd8c8d38e340a81295606d4faa28d34d0a7
SHA256397380d4c94183937f67dc28fc89697fadef075f66e637080ec71545b07d65f1
SHA5129896c83694472a6bfa82c34c637c59db24d04591027df55416bd070b223230976d129d12b1d69618b6039a3b4e25a8cc9f79ad27652ec079ac80801eb7a596cd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\L3T8W3B4\o-0mIpQlx3QUlC5A4PNB6Ryti20_6n1iPHjcz6L1SoM-jCpoiyAaBO9a6VQ[1].woff
Filesize16KB
MD5dd6fe4c6f321f39c750ee024b38bc1c6
SHA1192f09d9b27fd7518a7b2cc7ba503d6f83c68307
SHA256d2de7fbc083f058b6c7eeb6985a1d24e46e5e9be3aebf0f2d3b26204fc7edd94
SHA512e677bce8d3920d2e755c9fb80a6a96922c5504ecf06b5a650787a22f29d5f39b2c37ca336bdca41b25b71d36caec21dac78d855e0819435165d3771701ca45a4
-
Filesize
743B
MD5bd361461dbc83db995e644e42e59dca9
SHA17d3d5350646382e10d1fd84a3489d2eec7f1c651
SHA2564e5d6e60573346e0eb3e8368ca629af38d0d59f4e51f750724e7f95f8be5917e
SHA5128b09cd2f95cd9e50a04aca3a57942e565556cefd65d6c903321a45bf4d746f48ca3e0785f2330483a0ed52437631d9bb086e958368c3da44b4bcf3314bfd0f5d
-
Filesize
3KB
MD551b8b71098eeed2c55a4534e48579a16
SHA12ec1922d2bfaf67bf3ffabe43a11e3bf481dc5d7
SHA256bd78e3bcc569d029e7c709144e4038dede4d92a143e77bc46e4f15913769758b
SHA5122597223e603e095bf405998aacd8585f85e66de8d992a9078951dd85f462217305e215b4828188bf7840368d8116ed8fb5d95f3bfab00240b4a8ddab71ac760d
-
Filesize
55KB
MD5eb4bc511f79f7a1573b45f5775b3a99b
SHA1d910fb51ad7316aa54f055079374574698e74b35
SHA2567859a62e04b0acb06516eb12454de6673883ecfaeaed6c254659bca7cd59c050
SHA512ec9bdf1c91b6262b183fd23f640eac22016d1f42db631380676ed34b962e01badda91f9cbdfa189b42fe3182a992f1b95a7353af41e41b2d6e1dab17e87637a0
-
Filesize
49B
MD556398e76be6355ad5999b262208a17c9
SHA1a1fdee122b95748d81cee426d717c05b5174fe96
SHA2562f561b02a49376e3679acd5975e3790abdff09ecbadfa1e1858c7ba26e3ffcef
SHA512fd8b021f0236e487bfee13bf8f0ae98760abc492f7ca3023e292631979e135cb4ccb0c89b6234971b060ad72c0ca4474cbb5092c6c7a3255d81a54a36277b486
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M8F18HYR\KFOlCnqEu92Fr1MmEU9fBBc-[1].woff
Filesize19KB
MD5de8b7431b74642e830af4d4f4b513ec9
SHA1f549f1fe8a0b86ef3fbdcb8d508440aff84c385c
SHA2563bfe46bb1ca35b205306c5ec664e99e4a816f48a417b6b42e77a1f43f0bc4e7a
SHA51257d3d4de3816307ed954b796c13bfa34af22a46a2fea310df90e966301350ae8adac62bcd2abf7d7768e6bdcbb3dfc5069378a728436173d07abfa483c1025ac
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M8F18HYR\KFOlCnqEu92Fr1MmEU9fBBc9[1].ttf
Filesize34KB
MD54d88404f733741eaacfda2e318840a98
SHA149e0f3d32666ac36205f84ac7457030ca0a9d95f
SHA256b464107219af95400af44c949574d9617de760e100712d4dec8f51a76c50dda1
SHA5122e5d3280d5f7e70ca3ea29e7c01f47feb57fe93fc55fd0ea63641e99e5d699bb4b1f1f686da25c91ba4f64833f9946070f7546558cbd68249b0d853949ff85c5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M8F18HYR\KFOlCnqEu92Fr1MmYUtfBBc9[1].ttf
Filesize34KB
MD54d99b85fa964307056c1410f78f51439
SHA1f8e30a1a61011f1ee42435d7e18ba7e21d4ee894
SHA25601027695832f4a3850663c9e798eb03eadfd1462d0b76e7c5ac6465d2d77dbd0
SHA51213d93544b16453fe9ac9fc025c3d4320c1c83a2eca4cd01132ce5c68b12e150bc7d96341f10cbaa2777526cf72b2ca0cd64458b3df1875a184bbb907c5e3d731
-
Filesize
19KB
MD5bafb105baeb22d965c70fe52ba6b49d9
SHA1934014cc9bbe5883542be756b3146c05844b254f
SHA2561570f866bf6eae82041e407280894a86ad2b8b275e01908ae156914dc693a4ed
SHA51285a91773b0283e3b2400c773527542228478cc1b9e8ad8ea62435d705e98702a40bedf26cb5b0900dd8fecc79f802b8c1839184e787d9416886dbc73dff22a64
-
Filesize
40KB
MD59e33acb5cab6802df44887bd6df31416
SHA1f96f235aeccf43da8e795c291f3a3c1390d8f377
SHA256ca02d1a91f43d6b8c5d8d127d04e95afb736ae1779577bde0a6f0641cc4f4893
SHA512a6cd85df3e64c7b7b462dd07025563f5ccf4c8b98394ba0d31e9705fc933ee89e1c13874b11f428c090179ebc70bfbe2728a92a8b56fa5a58253cbb7793fe333
-
Filesize
6KB
MD58e5f9aa55c72399cabea0d1e8329c69f
SHA19c4eca2feaf93899c13bd5977a4129a8bb6c08f8
SHA256a8e5ee5273f5ff44b8703b89593dca7c571895b47fd49b1ae4d9282ff6506804
SHA51245db7c2ad7097742213f8d3f78dc9eacc9070ad4dd2a60e2f4a26f3ae1b384bbb3994d0dcc222122bcdf3b318ed0b52b51492f9de0903e907e1ddd161fee8423
-
Filesize
2KB
MD51aceace0b63ef3e4cf3a349b83f5725b
SHA1fede44a511cbb7a94be77c6a3fbaf05c0ac735e9
SHA2567185ad18f6d3ea3d12c0a64a084a4bc570ba2e79ed46a1fb3427a4c29ca9bb20
SHA5126f1c7357b7cca38c3fa5fa6cc8ab4171d9b8522eb77c9ac814102a2b4711f021a6387706ec8f4da8d5c199498c4695e7289ce647373451b4d60b755fd8af1ba0
-
Filesize
84KB
MD5c9f5aeeca3ad37bf2aa006139b935f0a
SHA11055018c28ab41087ef9ccefe411606893dabea2
SHA25687083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
SHA512dcff2b5c2b8625d3593a7531ff4ddcd633939cc9f7acfeb79c18a9e6038fdaa99487960075502f159d44f902d965b0b5aed32b41bfa66a1dc07d85b5d5152b58
-
Filesize
188KB
MD553647aee2bce750584299c10b77adea0
SHA19558331b394c821a46230f1c4d635c3afd7e0a4a
SHA2567ac1b22ea6a81a6dd81f18567e94d1f82ec4477c3eb7fd4884cf6950470bb555
SHA512c28fa009835604920b3cf7060459bb9f2d0fb216965d0e2265c454fb79dc7bdbfee1757d343fadf4254b02c52ce9df2ae4dc9a9506ddec59f43829f17af821a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M8F18HYR\o-0mIpQlx3QUlC5A4PNB6Ryti20_6n1iPHjcz6L1SoM-jCpoiyD9A-9a6VQ[1].woff
Filesize16KB
MD5d22f975c52faaf5f561bcf90641485d4
SHA14092103795efeb56b3cf83a69d1f215771ac651d
SHA25608cccd7191ddeadbb2ac3f16aaf5e3a0b65d2477fdb5a33e3b17d1bee9501d6c
SHA512b85b99e957dc5ffc88b3ef14d14b7b7738e1210c01decc249fbb4a5274baa928b6d81e652244572e45ac162aa4616b0a0c607d59a01b01303e572ac3bce03382
-
Filesize
5B
MD583d24d4b43cc7eef2b61e66c95f3d158
SHA1f0cafc285ee23bb6c28c5166f305493c4331c84d
SHA2561c0ff118a4290c99f39c90abb38703a866e47251b23cca20266c69c812ccafeb
SHA512e6e84563d3a55767f8e5f36c4e217a0768120d6e15ce4d01aa63d36af7ec8d20b600ce96dcc56de91ec7e55e83a8267baddd68b61447069b82abdb2e92c6acb6
-
Filesize
34KB
MD5372d0cc3288fe8e97df49742baefce90
SHA1754d9eaa4a009c42e8d6d40c632a1dad6d44ec21
SHA256466989fd178ca6ed13641893b7003e5d6ec36e42c2a816dee71f87b775ea097f
SHA5128447bc59795b16877974cd77c52729f6ff08a1e741f68ff445c087ecc09c8c4822b83e8907d156a00be81cb2c0259081926e758c12b3aea023ac574e4a6c9885
-
Filesize
51KB
MD5575b5480531da4d14e7453e2016fe0bc
SHA1e5c5f3134fe29e60b591c87ea85951f0aea36ee1
SHA256de36e50194320a7d3ef1ace9bd34a875a8bd458b253c061979dd628e9bf49afd
SHA512174e48f4fb2a7e7a0be1e16564f9ed2d0bbcc8b4af18cb89ad49cf42b1c3894c8f8e29ce673bc5d9bc8552f88d1d47294ee0e216402566a3f446f04aca24857a
-
Filesize
530B
MD50a127ad39a8ebe4207492293b556adf6
SHA117d3dad64e4f9139cfb85bbcca6659a8aa532a48
SHA256c1294965425b5028a83bbe5eeed0cd9b92733ec41efd07e34532522d4c97b6e1
SHA5125aa845c5c6c20259d9c6bc0c9fdbd13ff178ba4008865f7113387767db0ad39cd53c1d276cfa4997186fd39f21d30bf00caf8d092e5c04119d992368b1563df3
-
Filesize
4KB
MD5c6585d35dbe66427d2971405193e3420
SHA188f0c9cc830f31e475aa5040a44c959b6e5b309a
SHA256b7538e415e50685e667d23705f5513c5770ae627e849bd1ea3c98f5abaf336c8
SHA5120042ffe3ee3c8b62a7f9c58de72f8c27730a993f423a9daa32864102f8621ff52111a8b8f55b5e882c6e338ce3da7a4c1a46ac9f621b53c8aef95bc7e0d881e5
-
Filesize
2KB
MD5ef9941290c50cd3866e2ba6b793f010d
SHA14736508c795667dcea21f8d864233031223b7832
SHA2561b9efb22c938500971aac2b2130a475fa23684dd69e43103894968df83145b8a
SHA512a0c69c70117c5713caf8b12f3b6e8bbb9cdaf72768e5db9db5831a3c37541b87613c6b020dd2f9b8760064a8c7337f175e7234bfe776eee5e3588dc5662419d9
-
Filesize
66KB
MD54998fe22f90eacce5aa2ec3b3b37bd81
SHA1f871e53836d5049ef2dafa26c3e20acab38a9155
SHA25693fcbfca018780a8af6e48a2c4cd6f7ad314730440236c787d581e2cef1ab8f8
SHA512822158dac2694341f6cf5c8f14f017ac877c00143194d3cd0a67ffd4d97f9bf8f2305e33b99fa12f62eee53ba18029541c0601ea5496ff50279d1200cfa03232
-
Filesize
165KB
MD565760e3b3b198746b7e73e4de28efea1
SHA11d1a2cce09b28cffc89378b0a60cbb1aa8a08c4f
SHA25610e40ea3a2ad69c08d13e194cf13eb4a28a093c939758a17a6a775ef603ac4fc
SHA512fbcb91f26b7bd874d6a6a3b1d4d6f7277ded091cdae5706c285b4d5d17446a1bf58572c224af38393ce49b310a51d5c5d60711c7094e5d32abbaaf10d1107e1b
-
Filesize
1KB
MD5a5bb75d5bd1b19def25c1dd4f3d4e09c
SHA1d0c1457e8f357c964b9d4b6c0788e89717fe651f
SHA256ff0689879c72300a01eae0c05c3205e2ca57c4bc1a6bfa0718fa6fea4a51627e
SHA512b9fc57f7ade8f34cb02ece2935acb30757ed846e4bcf81d3fcf5bfcb45611d386bd337a6337e9945c5654cf044dce4dd3fafd60a2b42ed5bdc857ef96d077a69
-
Filesize
850B
MD53b570820be60c9c70656f57582c68e43
SHA196f2c2409412d8a6424d9a94d7c694d488b4b09e
SHA256c63efb3ef2b5dde52db952d989ed358916fe20fff0f270bd81734fd493d29926
SHA5123984a5827089c4913a6b1243ecdfe88344f86146508721f787d1bd69968f0ce36ca958db6076a6b4b42d25f3e4df6e7604c47970d1db5a257c8a4a95ea1ed88c
-
Filesize
2KB
MD55e3fff838a9aa2ef46e2e4d9fe13ab85
SHA1a6ea4b142dd129e28d02ecc0dc59edade1976376
SHA256bbb3555394a1e45cb61c59281716bf177f29a026efef4750eed9c8a21b838765
SHA512af1bf6100980f0af9243c24802fa904350193e9f31d5f43cab779e17f03fe2214cc32a6621a1b5110108131d7a6aea5d68c4c6d7f04ddee278ff9da026d2f3fd
-
Filesize
1KB
MD50106d4fd24f36c561cf3e33bea3973e4
SHA184572f2157c0ac8bacc38b563069b223f93cb23c
SHA2565a6c5f7923c7b5ba984f3c4b79b5c3005f3c2f1347a84a6a7b3c16ffbf11777d
SHA51257b77c5d345eca415257e708a52a96e71d3ddf4a781c1f60e8ba175ea0c60b1d74749cd3fa2e33f56642ce42b7221f16491cf666dc4e795ecc6d1fbfdb54ab98
-
Filesize
12KB
MD5a2d42584292f64c5827e8b67b1b38726
SHA11be9b79be02a1cfc5d96c4a5e0feb8f472babd95
SHA2565736e3eec0c34bfc288854b7b8d2a8f1e22e9e2e7dae3c8d1ad5dfb2d4734ad0
SHA5121fd8eb6628a8a5476c2e983de00df7dc47ee9a0501a4ef4c75bc52b5d7884e8f8a10831a35f1cdbf0ca38c325bf8444f6914ba0e9c9194a6ef3d46ac348b51cb
-
Filesize
243KB
MD5be1b447ef269453185f8fd40d3cebcba
SHA12c90f13baa67977b35906b9115a26f8960bdf200
SHA25631e142c6ccbef4ba79601445876834ace14a75e6ec5b7c63a882319ea5ebce23
SHA5122ed70049b512a1342272b15bf3c9a59aaddb3970e21f59353c38ec608bec591db62b0defefc3a55d8b16e59796c6e9dd299e62e67f433f8d3b51a014b0ac2f7d
-
Filesize
7KB
MD566236607aaac92a4373811b873449d1c
SHA19059ad5e6859f9489a3a67e4ed7b40e487cdd753
SHA256c96f41de6b4d64ec7f471f0ef3b6687f3ccc926975ecf78b99bca02d371cda45
SHA5122bda9a2bc8abdbf1633cf5d0b62f61f0a3f56a16baebef0b2ee94a5d5356581bd688e64754bd4bd6a257ae05fb5c19ab08f4a223f645127b347070e426ce0e8e
-
Filesize
481KB
MD52b4a2c0d107bc671d4b39568a47aad66
SHA1779b0775413e557f972fb43d07c4e1a09d2dbf01
SHA256cccbd316b2e050d41ebf62c8c613d5bfae33cd43104ac3b772c9e10950a3dbd2
SHA51226d41601eabd090a6f6fb2e99d270f1631e2a4ecbade927705cc1ade3495757b097f0832a8a1f915688fb6072322b10071c93bf81d4304863ed53ec41c71fbd6
-
Filesize
9KB
MD5defee0a43f53c0bd24b5420db2325418
SHA155e3fdbced6fb04f1a2a664209f6117110b206f3
SHA256c1f8e55b298dc653477b557d4d9ef04951b3b8ba8362a836c54e2db10cda4d09
SHA51233d1a6753a32ec06dcfc07637e9654af9321fe9fa2590efc70893eb58c8603505f2be69084fb2bcbf929218c4e7df9f7a8bc3f17a5b41ed38c4d8645296ebab5
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
102B
MD52d457f9ae6c3f872f7b68f869e7670ea
SHA1681e579199b4d94bd144ce0a8e6e1afa757b7089
SHA2567d61c6329c5eea651d09e2f4d8f5533751b47d90af6e75c0db658ff1c84712ce
SHA51201b95615365082cd06e515e645fcbdff1e44ac23fb08bc4d2ce69261332ade937ad23d5c2b48354e00abf9f440475cfc13df23682cbe1c6ca424206b64082cae
-
Filesize
60KB
MD57470d5872f941b3b292b1680e6e15cb0
SHA106965eadb79740cad6c93652df13b61b5e140dbd
SHA25692c1632863faa07bba110f15ba81148d1b0835636c41037b41cdb75ddee33e47
SHA51284e2d14824cdff08a0420be40800205f643c3db76ff89987fcf5ba5bdcfef8a4dec9ccc640055e000d21c64f3550fb94097acc266c59e91fc2bad336464e3eda