Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
20-01-2023 09:47
Static task
static1
Behavioral task
behavioral1
Sample
SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe
Resource
win10v2004-20220901-en
General
-
Target
SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe
-
Size
54.0MB
-
MD5
26027b442df7212f436733b85e1a4aa2
-
SHA1
ada45868d8f9f70b7a80f6ea0fcb5b7f347499c9
-
SHA256
0ccf0ae2788bc683e39ea3b5e404c97cd866decdf444dfb177eb8cef1a153f4d
-
SHA512
36b706b8bcc863a0ebdf34b4a0ac4ffd9f1696beee8b80543a2c2656e65ad54e5ee7de652a2063fe545d9323ed013b5d6ccf7d5379011a0b8ccd27903c46d9a2
-
SSDEEP
1572864:A30jzjWCOwPvwmRZuivmuCKirHDX03Lf4+q25z:A3yyH8v7RcrDkz4+R5z
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\nsj2649.tmp\Aero.dll acprotect -
Executes dropped EXE 18 IoCs
Processes:
RP.exeiIcons.exeW7Patcher_x86.exeW7Patcher_x64.exeW7Patcher_x86.exeW7Patcher_x64.exeW7Patcher_x86.exeW7Patcher_x64.exeric.exeric.exereg64.exeric.exetheme.exeTaskDock.exeTrueTransparency.exeTrueTransparencyx64.exepid process 2168 RP.exe 2672 iIcons.exe 2756 W7Patcher_x86.exe 2792 W7Patcher_x64.exe 2824 W7Patcher_x86.exe 2860 W7Patcher_x64.exe 2892 W7Patcher_x86.exe 2924 W7Patcher_x64.exe 2968 ric.exe 2376 ric.exe 2988 reg64.exe 3020 ric.exe 240 theme.exe 1456 TaskDock.exe 2272 TrueTransparency.exe 2608 TrueTransparencyx64.exe 1196 1120 -
Modifies Installed Components in the registry 2 TTPs 3 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies Shared Task Scheduler registry keys 2 TTPs 2 IoCs
Processes:
reg64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler reg64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{F791A188-699D-4FD4-955A-EB59E89B1907} = "Theme Resource Changer" reg64.exe -
Possible privilege escalation attempt 10 IoCs
Processes:
takeown.exetakeown.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exepid process 2640 takeown.exe 2252 takeown.exe 2648 takeown.exe 3036 icacls.exe 1648 takeown.exe 1064 takeown.exe 2216 icacls.exe 1552 takeown.exe 636 icacls.exe 2144 icacls.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
reg64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\InprocServer32 reg64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\InprocServer32\ThreadingModel = "Apartment" reg64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\InprocServer32\ = "C:\\SkinPack\\ThemeResourceChanger.dll" reg64.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\nsj2649.tmp\Aero.dll upx behavioral1/memory/1504-63-0x0000000074630000-0x000000007463A000-memory.dmp upx -
Loads dropped DLL 64 IoCs
Processes:
SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).execmd.exeW7Patcher_x86.exeW7Patcher_x86.exeW7Patcher_x86.exeric.exeexplorer.exepid process 1504 SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe 1504 SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe 1504 SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe 1504 SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe 1504 SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe 1504 SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe 1504 SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe 1504 SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe 1504 SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe 2724 cmd.exe 2756 W7Patcher_x86.exe 2756 W7Patcher_x86.exe 2756 W7Patcher_x86.exe 2756 W7Patcher_x86.exe 2724 cmd.exe 2824 W7Patcher_x86.exe 2824 W7Patcher_x86.exe 2824 W7Patcher_x86.exe 2824 W7Patcher_x86.exe 2724 cmd.exe 2892 W7Patcher_x86.exe 2892 W7Patcher_x86.exe 2892 W7Patcher_x86.exe 2892 W7Patcher_x86.exe 1504 SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe 2968 ric.exe 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe -
Modifies file permissions 1 TTPs 10 IoCs
Processes:
icacls.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exetakeown.exetakeown.exeicacls.exetakeown.exepid process 636 icacls.exe 2144 icacls.exe 2252 takeown.exe 2216 icacls.exe 2648 takeown.exe 1648 takeown.exe 2640 takeown.exe 1552 takeown.exe 3036 icacls.exe 1064 takeown.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 40 IoCs
Processes:
SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exedescription ioc process File created C:\SkinPack\Themes\10\Windows 11 Dark Mode\Wallpaper\ThemeD\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\7\Windows 11 Dark Mode\Wallpaper\ThemeB\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Wallpaper\ThemeC\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\10\Windows 11 Dark Mode\Wallpaper\ThemeB\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\7\Windows 11 Dark Mode\Media\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\8\Windows 11 Dark Mode\Media\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\8\Windows 11 light\Wallpaper\ThemeC\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Wallpaper\ThemeA\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Wallpaper\ThemeD\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\10\Windows 11 light\Wallpaper\ThemeC\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\7\Windows 11 light\Wallpaper\ThemeA\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\8\Windows 11 light\Wallpaper\ThemeD\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\7\Windows 11 light\Media\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\7\Windows 11 light\Wallpaper\ThemeC\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\8\Windows 11 Dark Mode\Wallpaper\ThemeC\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\8\Windows 11 light\Media\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Wallpaper\ThemeB\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\8\Windows 11 light\Wallpaper\ThemeB\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Media\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\10\Windows 11 Dark Mode\Wallpaper\ThemeA\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\10\Windows 11 Dark Mode\Wallpaper\ThemeC\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\10\Windows 11 light\Media\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\10\Windows 11 light\Wallpaper\ThemeD\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\7\Windows 11 Dark Mode\Wallpaper\ThemeD\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\7\Windows 11 light\Wallpaper\ThemeD\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Media\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Wallpaper\ThemeA\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Wallpaper\ThemeB\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\10\Windows 11 Dark Mode\Media\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\10\Windows 11 light\Wallpaper\ThemeB\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\7\Windows 11 Dark Mode\Wallpaper\ThemeA\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\7\Windows 11 Dark Mode\Wallpaper\ThemeC\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\7\Windows 11 light\Wallpaper\ThemeB\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\8\Windows 11 Dark Mode\Wallpaper\ThemeD\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Wallpaper\ThemeC\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Wallpaper\ThemeD\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\10\Windows 11 light\Wallpaper\ThemeA\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\8\Windows 11 Dark Mode\Wallpaper\ThemeA\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\8\Windows 11 light\Wallpaper\ThemeA\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\SkinPack\Themes\8\Windows 11 Dark Mode\Wallpaper\ThemeB\Desktop.ini SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe -
Drops file in System32 directory 7 IoCs
Processes:
W7Patcher_x64.exeSkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exeW7Patcher_x64.exedescription ioc process File opened for modification C:\Windows\System32\imageres.dll W7Patcher_x64.exe File opened for modification C:\Windows\SysWOW64\imageres.dll W7Patcher_x64.exe File created C:\Windows\System32\oobe\info\backgrounds\BACKGROUNDDEFAULT.JPG SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File opened for modification C:\Windows\System32\authui.dll W7Patcher_x64.exe File created C:\Windows\System32\authui.dll W7Patcher_x64.exe File opened for modification C:\Windows\SysWOW64\authui.dll W7Patcher_x64.exe File created C:\Windows\SysWOW64\authui.dll W7Patcher_x64.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" explorer.exe -
Drops file in Windows directory 64 IoCs
Processes:
SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exeW7Patcher_x64.exeexplorer.exedescription ioc process File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Wallpaper\Windows\img0.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\explorer.exe\6805.png SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\ICONS\25.ico SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Screen\Win7 Logon Background Changer.exe SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Shell\NormalColor\shellstyle.dll SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Cursors\aero_move.cur SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\ICONS\123.ico SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Media\Windows Message Nudge.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File opened for modification C:\Windows\rescache\rc0000\ResCache.dir W7Patcher_x64.exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Media\Windows Shutdown.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Wallpaper\ThemeC\img31.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Shell32.dll\24.ico SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Cursors\aero_up.cur SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\ICONS\54.ico SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Media\Windows Notify Email.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Wallpaper\ThemeC\img31.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File opened for modification C:\Windows\rescache\wip W7Patcher_x64.exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\explorerframe.dll\579.png SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\ICONS\55.ico SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Media\Windows Logoff Sound.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Media\Windows Notify System Generic.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Screen\Crear tu imagen de cuenta\GIMP .url SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File opened for modification C:\Windows\rescache\rc0002\Segment0.toc W7Patcher_x64.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe explorer.exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\explorer.exe\6805 oculto.png SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Media\Windows Notify System Generic.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Shell32.dll\634.png SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Cursors\aero_link.cur SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Shell32.dll\263.ico SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Wallpaper\ThemeA\img23.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\explorerframe.dll\34560.png SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Media\Windows Foreground.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Shell32.dll\63001.ico SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\explorerframe.dll\296.png SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Media\Windows Ding.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Screen\img103.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Wallpaper\ThemeD\img33.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Cursors\SkinPack\aero_pen.cur SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Cursors\aero_nesw.cur SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Media\Windows Error.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Media\Windows Notify Messaging.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light ThemeC.theme SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Wallpaper\ThemeA\img22.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Wallpaper\ThemeA\img22.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File opened for modification C:\Windows\rescache\rc0002\Segment2.toc W7Patcher_x64.exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Media\Windows Foreground.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Media\Windows Logoff Sound.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Media\Windows Proximity Notification.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Shell32.dll\24.ico SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Screen\img4.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Wallpaper\ThemeB\img25.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\explorerframe.dll\34562.png SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Cursors\aero_ns.cur SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\explorer.exe\6805.png SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Media\Windows Hardware Fail.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Shell32.dll\16757.ico SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Wallpaper\ThemeA\img21.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 Dark Mode\Wallpaper\ThemeC\img28.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Cursors\aero_link.cur SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Media\Windows Notify Email.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Media\Windows Proximity Connection.wav SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Cursors\aero_helpsel.cur SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File created C:\Windows\Resources\Themes\Windows 11 light\Wallpaper\ThemeC\img30.jpg SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe File opened for modification C:\Windows\rescache\rc0002 W7Patcher_x64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 844 taskkill.exe 376 taskkill.exe 688 taskkill.exe -
Modifies Control Panel 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Appearance\Schemes rundll32.exe -
Processes:
iexplore.exeexplorer.exeexplorer.exeIEXPLORE.EXEexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FDB8D01-98B0-11ED-8A3F-62E10F117DDC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Desktop\General\WallpaperSource = "C:\\Windows\\Resources\\Themes\\Windows 11 Dark Mode\\wallpaper\\Windows\\img0.jpg" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Desktop\General explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Modifies data under HKEY_USERS 43 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe -
Modifies registry class 31 IoCs
Processes:
explorer.exereg64.exeexplorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\TypeLib\ = "{CFA8AF78-B9E2-4C91-8DB7-2314C781E8A4}" reg64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\InprocServer32\ThreadingModel = "Apartment" reg64.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907} reg64.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000f00000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\ = "CThemeResourceChangerObject Class" reg64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\AppID = "{508AE86B-33BB-4F20-A7F1-7AC86F5DD375}" reg64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\ProgID\ = "ThemeResourceChanger.CThemeChange.1" reg64.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\InprocServer32 reg64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\ProgID reg64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\TypeLib reg64.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\InprocServer32\ = "C:\\SkinPack\\ThemeResourceChanger.dll" reg64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\Programmable reg64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F791A188-699D-4FD4-955A-EB59E89B1907}\Programmable\ reg64.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
chrome.exechrome.exepid process 988 chrome.exe 1716 chrome.exe 1716 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exeexplorer.exepid process 1504 SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe 2268 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
vssvc.exeDrvInst.exeW7Patcher_x64.exeW7Patcher_x64.exeW7Patcher_x64.exetaskkill.exeexplorer.exeAUDIODG.EXEtaskkill.exetakeown.exeexplorer.exetaskkill.exetakeown.exedescription pid process Token: SeBackupPrivilege 2348 vssvc.exe Token: SeRestorePrivilege 2348 vssvc.exe Token: SeAuditPrivilege 2348 vssvc.exe Token: SeRestorePrivilege 2532 DrvInst.exe Token: SeRestorePrivilege 2532 DrvInst.exe Token: SeRestorePrivilege 2532 DrvInst.exe Token: SeRestorePrivilege 2532 DrvInst.exe Token: SeRestorePrivilege 2532 DrvInst.exe Token: SeRestorePrivilege 2532 DrvInst.exe Token: SeRestorePrivilege 2532 DrvInst.exe Token: SeLoadDriverPrivilege 2532 DrvInst.exe Token: SeLoadDriverPrivilege 2532 DrvInst.exe Token: SeLoadDriverPrivilege 2532 DrvInst.exe Token: SeDebugPrivilege 2792 W7Patcher_x64.exe Token: SeSecurityPrivilege 2792 W7Patcher_x64.exe Token: SeTakeOwnershipPrivilege 2792 W7Patcher_x64.exe Token: SeRestorePrivilege 2792 W7Patcher_x64.exe Token: SeBackupPrivilege 2792 W7Patcher_x64.exe Token: SeShutdownPrivilege 2792 W7Patcher_x64.exe Token: SeDebugPrivilege 2860 W7Patcher_x64.exe Token: SeSecurityPrivilege 2860 W7Patcher_x64.exe Token: SeTakeOwnershipPrivilege 2860 W7Patcher_x64.exe Token: SeRestorePrivilege 2860 W7Patcher_x64.exe Token: SeBackupPrivilege 2860 W7Patcher_x64.exe Token: SeShutdownPrivilege 2860 W7Patcher_x64.exe Token: SeDebugPrivilege 2924 W7Patcher_x64.exe Token: SeSecurityPrivilege 2924 W7Patcher_x64.exe Token: SeTakeOwnershipPrivilege 2924 W7Patcher_x64.exe Token: SeRestorePrivilege 2924 W7Patcher_x64.exe Token: SeBackupPrivilege 2924 W7Patcher_x64.exe Token: SeShutdownPrivilege 2924 W7Patcher_x64.exe Token: SeDebugPrivilege 844 taskkill.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: 33 2136 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2136 AUDIODG.EXE Token: 33 2136 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2136 AUDIODG.EXE Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeDebugPrivilege 376 taskkill.exe Token: SeTakeOwnershipPrivilege 2640 takeown.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeDebugPrivilege 688 taskkill.exe Token: SeTakeOwnershipPrivilege 2648 takeown.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exeexplorer.exeexplorer.exepid process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exeexplorer.exeexplorer.exeexplorer.exepid process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
explorer.exeTaskDock.exeTrueTransparency.exeTrueTransparencyx64.exeiexplore.exeIEXPLORE.EXEpid process 2624 explorer.exe 2624 explorer.exe 1456 TaskDock.exe 1456 TaskDock.exe 1456 TaskDock.exe 2272 TrueTransparency.exe 2272 TrueTransparency.exe 2608 TrueTransparencyx64.exe 2608 TrueTransparencyx64.exe 1952 iexplore.exe 1952 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1716 wrote to memory of 1440 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1440 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1440 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1340 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 988 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 988 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 988 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 536 1716 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe"C:\Users\Admin\AppData\Local\Temp\SkinPack Windows 11 Dark y Light Mode (Windows 7 8.1 y 10).exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
-
C:\SkinPack\RP.exe"C:\SkinPack\RP.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\SkinPack\RP.vbs"3⤵
-
C:\SkinPack\iIcons.exe"C:\SkinPack\iIcons.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\SkinPack\installer.cmd" "3⤵
- Loads dropped DLL
-
C:\SkinPack\W7Patcher_x86.exe"W7Patcher_x86.exe" -PBIN34⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\SkinPack\W7Patcher_x64.exe"W7Patcher_x64.exe" -PBIN35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\SkinPack\W7Patcher_x86.exe"W7Patcher_x86.exe" -PBIN74⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\SkinPack\W7Patcher_x64.exe"W7Patcher_x64.exe" -PBIN75⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\SkinPack\W7Patcher_x86.exe"W7Patcher_x86.exe" -P "Resources" -BN "SkinPack_backup" -LOG "C:\skinpack\Install.log"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\SkinPack\W7Patcher_x64.exe"W7Patcher_x64.exe" -P "Resources" -BN "SkinPack_backup" -LOG "C:\skinpack\Install.log"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
-
C:\SkinPack\ric.exe"C:\SkinPack\ric.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ric.bat" "3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\takeown.exetakeown /f ""C:\Users\Admin\AppData\Local\IconCache.db""4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls ""C:\Users\Admin\AppData\Local\IconCache.db"" /grant administrators:F /t4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer" /grant administrators:F /t4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\explorer.exeC:\Windows\explorer.exe4⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
-
C:\SkinPack\ric.exe"C:\SkinPack\ric.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ric.bat" "3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\takeown.exetakeown /f ""C:\Users\Admin\AppData\Local\IconCache.db""4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer" /grant administrators:F /t4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\explorer.exeC:\Windows\explorer.exe4⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
-
C:\SkinPack\reg64.exe"C:\SkinPack\reg64.exe" /S "trc.reg"2⤵
- Executes dropped EXE
- Modifies Shared Task Scheduler registry keys
- Registers COM server for autorun
- Modifies registry class
-
C:\SkinPack\ric.exe"C:\SkinPack\ric.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ric.bat" "3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\takeown.exetakeown /f ""C:\Users\Admin\AppData\Local\IconCache.db""4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer" /grant administrators:F /t4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\explorer.exeC:\Windows\explorer.exe4⤵
- Modifies Installed Components in the registry
- Sets desktop wallpaper using registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
-
C:\SkinPack\theme.exe"C:\SkinPack\theme.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\system32\desk.cpl desk,@Themes /Action:OpenTheme /file:"C:\Windows\Resources\Themes\Windows11DarkMode.theme"3⤵
- Modifies Control Panel
-
C:\SkinPack\TaskDock\TaskDock.exe"C:\SkinPack\TaskDock\TaskDock.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\SkinPack\TrueTransparency\TrueTransparency.exe"C:\SkinPack\TrueTransparency\TrueTransparency.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\SkinPack\TrueTransparencyx64\TrueTransparencyx64.exe"C:\SkinPack\TrueTransparencyx64\TrueTransparencyx64.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/channel/UCkoU791N2s8q1epO6vmOLvA2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f04f50,0x7fef6f04f60,0x7fef6f04f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1048,11822482600380584402,1878044136810663511,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1048,11822482600380584402,1878044136810663511,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1048,11822482600380584402,1878044136810663511,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1784 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,11822482600380584402,1878044136810663511,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2088 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,11822482600380584402,1878044136810663511,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1980 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1048,11822482600380584402,1878044136810663511,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1048,11822482600380584402,1878044136810663511,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3252 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,11822482600380584402,1878044136810663511,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1048,11822482600380584402,1878044136810663511,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=976 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1048,11822482600380584402,1878044136810663511,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3592 /prefetch:82⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005AC" "000000000000058C"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5841⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\SkinPack\RP.exeFilesize
207KB
MD519b3c986323e8130728fcf842fe52f52
SHA1cccfc7d42f30aec6a9d67a2574587497502586c1
SHA2567d4db9b1ce078f028755dd729830e5a0ea16ed1f0f82f282fe68de118ee04343
SHA512db254c0213e21583f7553e73a69881610e0327f5ee429c6492d1ffe8fc2de52e5cc4f6decf0fe9954fdb1ab977c20452ad664a625d666d361e457dcf52ef9442
-
C:\SkinPack\RP.vbsFilesize
386B
MD58edd615f3eafd0ba2c6a06d1b985c1d2
SHA1049ca4a40c0f66b0833466c1575cae1d972ede5b
SHA256ab1d81651e7d67ad10de277bdf5f68321daad851205b82c5a59990cb49b6b594
SHA51296de9456cd7d2e6e04361896d31d6ee4b2e0dae63d2634710523c14bd3b0b9187db7b4c984aaa569f0a02e94eb36f1765e9fd3a1f7772c6d79f13b5a85d597c8
-
C:\SkinPack\Resources\Windows\SysWOW64\imageres.dll.resFilesize
14.9MB
MD5d19606554ac4da67256abf23810a1554
SHA167c169fec76407feb474aa0bd33088f24b9504cf
SHA256533c40a7520a4a0b438cff27d51b02f394bbf57aba765f86ed9cd467f8aaa7ef
SHA5129f52fd4a08a82df3531476fa774c165f59a0a158a04a990d9a953710e6f1ff3689108d34fa82b63807ab65c2696840effdcbef03e8b7126282dac41d1ed39724
-
C:\SkinPack\Resources\Windows\System32\imageres.dll.resFilesize
14.9MB
MD5d19606554ac4da67256abf23810a1554
SHA167c169fec76407feb474aa0bd33088f24b9504cf
SHA256533c40a7520a4a0b438cff27d51b02f394bbf57aba765f86ed9cd467f8aaa7ef
SHA5129f52fd4a08a82df3531476fa774c165f59a0a158a04a990d9a953710e6f1ff3689108d34fa82b63807ab65c2696840effdcbef03e8b7126282dac41d1ed39724
-
C:\SkinPack\W7Patcher_x64.exeFilesize
192KB
MD5ff6be5f1eab128e149202b8e9659eca7
SHA1980da1b84e2bb02d4fd44835badc2d4350f1ffe8
SHA2567af31d8576db81e63a1b0cefd737c42a28412c565126780c9a8f8fde43d84536
SHA512d1e06e37c8fb86200eb5574e3aa76f87e00e4748f59f9183eb029e5deee7a72d15f6293754a9921113457b8b974bfb85892b07b86967c8fb2f23e5415a2ad6b1
-
C:\SkinPack\W7Patcher_x64.exeFilesize
192KB
MD5ff6be5f1eab128e149202b8e9659eca7
SHA1980da1b84e2bb02d4fd44835badc2d4350f1ffe8
SHA2567af31d8576db81e63a1b0cefd737c42a28412c565126780c9a8f8fde43d84536
SHA512d1e06e37c8fb86200eb5574e3aa76f87e00e4748f59f9183eb029e5deee7a72d15f6293754a9921113457b8b974bfb85892b07b86967c8fb2f23e5415a2ad6b1
-
C:\SkinPack\W7Patcher_x64.exeFilesize
192KB
MD5ff6be5f1eab128e149202b8e9659eca7
SHA1980da1b84e2bb02d4fd44835badc2d4350f1ffe8
SHA2567af31d8576db81e63a1b0cefd737c42a28412c565126780c9a8f8fde43d84536
SHA512d1e06e37c8fb86200eb5574e3aa76f87e00e4748f59f9183eb029e5deee7a72d15f6293754a9921113457b8b974bfb85892b07b86967c8fb2f23e5415a2ad6b1
-
C:\SkinPack\W7Patcher_x64.exeFilesize
192KB
MD5ff6be5f1eab128e149202b8e9659eca7
SHA1980da1b84e2bb02d4fd44835badc2d4350f1ffe8
SHA2567af31d8576db81e63a1b0cefd737c42a28412c565126780c9a8f8fde43d84536
SHA512d1e06e37c8fb86200eb5574e3aa76f87e00e4748f59f9183eb029e5deee7a72d15f6293754a9921113457b8b974bfb85892b07b86967c8fb2f23e5415a2ad6b1
-
C:\SkinPack\W7Patcher_x64.logFilesize
2KB
MD5bffe557638756925a082af855ed9aa0d
SHA16011c488c96fecd7743c2b67d2c308ccf7bab04b
SHA256e98e5be832d767f1088dba30193bb63159acd4414529340097dbbaa2c42e5de7
SHA5122d50fb1ebdecee32027e2d3e85e0f63689a5d9d95b923e09afbf8cc0cbe9c8d1cfc8cd988addfe0630e10aa265943e84dd459f32e6256ca692ef4285945ed151
-
C:\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
C:\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
C:\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
C:\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
C:\SkinPack\W7Patcher_x86.logFilesize
2KB
MD5e1ee1602cf250910ce7cd8a465d97182
SHA18b2e2c210e5ce3f358c083db76efad8c17361c2e
SHA256153be88869892e27794cdafb13795aed1e4cd4c567e5f5dd1fe8ea62804754b3
SHA5126414727c616d58abb545a0a4258c56e0fce083eaa13cc5a7b3df30781cdf5e6b8e0a936b64d3f21c29755c0d9e1fb648932ad72931914fdd687a6027607e4760
-
C:\SkinPack\iIcons.exeFilesize
225KB
MD52f6f11b50390ec967773bc3aa623ad94
SHA1d54d19d4dc7e9bf73b1ddce7f14c3e4fcb3a406e
SHA2561de36afb8ae41981a8429e4c17e8cbd95e3f9d185a75bd177df7d1aa1cec0227
SHA51224c2daa4e1ddc9797f2c0ba0744ac49e86ca23b82b3ef25ab327e8e523e8602c7d23f2697b747cb08281e167c34e582cf40414df443aa59158c991508735d31b
-
C:\SkinPack\iIcons.exeFilesize
225KB
MD52f6f11b50390ec967773bc3aa623ad94
SHA1d54d19d4dc7e9bf73b1ddce7f14c3e4fcb3a406e
SHA2561de36afb8ae41981a8429e4c17e8cbd95e3f9d185a75bd177df7d1aa1cec0227
SHA51224c2daa4e1ddc9797f2c0ba0744ac49e86ca23b82b3ef25ab327e8e523e8602c7d23f2697b747cb08281e167c34e582cf40414df443aa59158c991508735d31b
-
C:\SkinPack\installer.cmdFilesize
395B
MD517c344a05d49143e828e424c57d8edad
SHA1978537f83081e12b44681792bb538c22833af418
SHA256bfdfe89ddb2169027c5b563087fe40edf0bd04c5f65203958d89079b9654c857
SHA5124f4ce840d023b9b840ea6d50b197f0d1c2c83fcf9fadcafe96777fc0cb067498c226cff66c7dd3202f2dfbca33dd6daeb472835251a4a22b4cc8d6631d621ae3
-
C:\SkinPack\ric.exeFilesize
185KB
MD5865fee81ba24570833e6bdf36872fb5a
SHA130be1b8be25c9d3640c212cedfd7ec38e1a512f3
SHA2566468653a01d17bd925174a17991b159b8b36640a636d0abd412131bc552c5508
SHA512f9029bf0de97ecde880afc63e20960adbcb7ebde8f4dab7218b9a381883ba981d934872efb38ed8f0be03ab4c781cdfd0d628cf34c5f4bed12d7afdae29fe4d2
-
C:\SkinPack\ric.exeFilesize
185KB
MD5865fee81ba24570833e6bdf36872fb5a
SHA130be1b8be25c9d3640c212cedfd7ec38e1a512f3
SHA2566468653a01d17bd925174a17991b159b8b36640a636d0abd412131bc552c5508
SHA512f9029bf0de97ecde880afc63e20960adbcb7ebde8f4dab7218b9a381883ba981d934872efb38ed8f0be03ab4c781cdfd0d628cf34c5f4bed12d7afdae29fe4d2
-
C:\SkinPack\rp.exeFilesize
207KB
MD519b3c986323e8130728fcf842fe52f52
SHA1cccfc7d42f30aec6a9d67a2574587497502586c1
SHA2567d4db9b1ce078f028755dd729830e5a0ea16ed1f0f82f282fe68de118ee04343
SHA512db254c0213e21583f7553e73a69881610e0327f5ee429c6492d1ffe8fc2de52e5cc4f6decf0fe9954fdb1ab977c20452ad664a625d666d361e457dcf52ef9442
-
C:\Users\Admin\AppData\Local\Temp\ric.batFilesize
808B
MD515e97d095d6e3516171f8071adf57422
SHA1f25bce3d261351bd26380c3fbd57aeb716dbbd71
SHA25642ed432f0b3388a0b7b1acf191f4fdea8c07a6869f7f325960848775f8310f0a
SHA512ee8bb7a8456815112173bd147f81f13b8052d68b4481668cfcc62c263909ad87c40af48177d873f6f6ed2b902f42175c4dba599cd427ff83d62afab3d944046f
-
C:\skinpack\Install.logFilesize
2KB
MD59ab6d27f03ed43fa419d6a649741ff23
SHA1c0e4da955761e4c4127a50f87f949b7ba406ec54
SHA256c92153fa41113218eff77b3a56e5798164106ee35b6352c3d94edb6442937b31
SHA51272b99770ea159d1164dd15a4471f164bb6bd03c2a73adea3cfaa34865c90a2d5829f2f8f12532d634b47542271169ea91c4167398fb563b7931b460499b03694
-
\??\pipe\crashpad_1716_KKDPZKZEIBGMHVCWMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\SkinPack\W7Patcher_x64.exeFilesize
192KB
MD5ff6be5f1eab128e149202b8e9659eca7
SHA1980da1b84e2bb02d4fd44835badc2d4350f1ffe8
SHA2567af31d8576db81e63a1b0cefd737c42a28412c565126780c9a8f8fde43d84536
SHA512d1e06e37c8fb86200eb5574e3aa76f87e00e4748f59f9183eb029e5deee7a72d15f6293754a9921113457b8b974bfb85892b07b86967c8fb2f23e5415a2ad6b1
-
\SkinPack\W7Patcher_x64.exeFilesize
192KB
MD5ff6be5f1eab128e149202b8e9659eca7
SHA1980da1b84e2bb02d4fd44835badc2d4350f1ffe8
SHA2567af31d8576db81e63a1b0cefd737c42a28412c565126780c9a8f8fde43d84536
SHA512d1e06e37c8fb86200eb5574e3aa76f87e00e4748f59f9183eb029e5deee7a72d15f6293754a9921113457b8b974bfb85892b07b86967c8fb2f23e5415a2ad6b1
-
\SkinPack\W7Patcher_x64.exeFilesize
192KB
MD5ff6be5f1eab128e149202b8e9659eca7
SHA1980da1b84e2bb02d4fd44835badc2d4350f1ffe8
SHA2567af31d8576db81e63a1b0cefd737c42a28412c565126780c9a8f8fde43d84536
SHA512d1e06e37c8fb86200eb5574e3aa76f87e00e4748f59f9183eb029e5deee7a72d15f6293754a9921113457b8b974bfb85892b07b86967c8fb2f23e5415a2ad6b1
-
\SkinPack\W7Patcher_x64.exeFilesize
192KB
MD5ff6be5f1eab128e149202b8e9659eca7
SHA1980da1b84e2bb02d4fd44835badc2d4350f1ffe8
SHA2567af31d8576db81e63a1b0cefd737c42a28412c565126780c9a8f8fde43d84536
SHA512d1e06e37c8fb86200eb5574e3aa76f87e00e4748f59f9183eb029e5deee7a72d15f6293754a9921113457b8b974bfb85892b07b86967c8fb2f23e5415a2ad6b1
-
\SkinPack\W7Patcher_x64.exeFilesize
192KB
MD5ff6be5f1eab128e149202b8e9659eca7
SHA1980da1b84e2bb02d4fd44835badc2d4350f1ffe8
SHA2567af31d8576db81e63a1b0cefd737c42a28412c565126780c9a8f8fde43d84536
SHA512d1e06e37c8fb86200eb5574e3aa76f87e00e4748f59f9183eb029e5deee7a72d15f6293754a9921113457b8b974bfb85892b07b86967c8fb2f23e5415a2ad6b1
-
\SkinPack\W7Patcher_x64.exeFilesize
192KB
MD5ff6be5f1eab128e149202b8e9659eca7
SHA1980da1b84e2bb02d4fd44835badc2d4350f1ffe8
SHA2567af31d8576db81e63a1b0cefd737c42a28412c565126780c9a8f8fde43d84536
SHA512d1e06e37c8fb86200eb5574e3aa76f87e00e4748f59f9183eb029e5deee7a72d15f6293754a9921113457b8b974bfb85892b07b86967c8fb2f23e5415a2ad6b1
-
\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
\SkinPack\W7Patcher_x86.exeFilesize
161KB
MD5fb5fdd4f5146ced89d20b06828a0dcc7
SHA150deb582755c0c5a491f59f65130d3dfcf86f6cc
SHA2561f6c61840051f366f019755be7a7447cc55142534e5ffe9b3fdbf57406fe6716
SHA51295dd80ea7e514a201862ffe333ec41414e9f6468c243821324e92f41414b9172c475b328e0cdf6f07925e39cc06400c903dc1ed697391fb20334b4fc8e595b47
-
\SkinPack\iIcons.exeFilesize
225KB
MD52f6f11b50390ec967773bc3aa623ad94
SHA1d54d19d4dc7e9bf73b1ddce7f14c3e4fcb3a406e
SHA2561de36afb8ae41981a8429e4c17e8cbd95e3f9d185a75bd177df7d1aa1cec0227
SHA51224c2daa4e1ddc9797f2c0ba0744ac49e86ca23b82b3ef25ab327e8e523e8602c7d23f2697b747cb08281e167c34e582cf40414df443aa59158c991508735d31b
-
\SkinPack\ric.exeFilesize
185KB
MD5865fee81ba24570833e6bdf36872fb5a
SHA130be1b8be25c9d3640c212cedfd7ec38e1a512f3
SHA2566468653a01d17bd925174a17991b159b8b36640a636d0abd412131bc552c5508
SHA512f9029bf0de97ecde880afc63e20960adbcb7ebde8f4dab7218b9a381883ba981d934872efb38ed8f0be03ab4c781cdfd0d628cf34c5f4bed12d7afdae29fe4d2
-
\SkinPack\ric.exeFilesize
185KB
MD5865fee81ba24570833e6bdf36872fb5a
SHA130be1b8be25c9d3640c212cedfd7ec38e1a512f3
SHA2566468653a01d17bd925174a17991b159b8b36640a636d0abd412131bc552c5508
SHA512f9029bf0de97ecde880afc63e20960adbcb7ebde8f4dab7218b9a381883ba981d934872efb38ed8f0be03ab4c781cdfd0d628cf34c5f4bed12d7afdae29fe4d2
-
\SkinPack\rp.exeFilesize
207KB
MD519b3c986323e8130728fcf842fe52f52
SHA1cccfc7d42f30aec6a9d67a2574587497502586c1
SHA2567d4db9b1ce078f028755dd729830e5a0ea16ed1f0f82f282fe68de118ee04343
SHA512db254c0213e21583f7553e73a69881610e0327f5ee429c6492d1ffe8fc2de52e5cc4f6decf0fe9954fdb1ab977c20452ad664a625d666d361e457dcf52ef9442
-
\Users\Admin\AppData\Local\Temp\nsj2649.tmp\Aero.dllFilesize
6KB
MD5243bf44688b131c3171f2827a93e39dc
SHA107e9c7bd16ae47953e42c06ae2606de188386f35
SHA25604a577df50431eb0ff6fb103566402bf66c50415bcc1f8a86b9c235053131455
SHA512a1a8c21d38c54a43d1c6c394f481dfbddcb359c617e9928ecca8f84d47354616a78d20735a1fe7bebd21626c21cf96d0e1a69e3e98f6b35f2a774cc0244f9516
-
\Users\Admin\AppData\Local\Temp\nsj2649.tmp\Fusion.dllFilesize
1.1MB
MD5c4a685398fa237cac1c3134e2a6d637b
SHA1819bc4d5072b033bfed5d76d621ebf645cfad5fd
SHA256c2ba9c7361669f301b71a673652ffce56f60c70ae77635176d1c3dfc0feae390
SHA512da06def48e1f030af7c432d34ec23c75da4c0fd5c094edbc03dcdc8094d5404f1d3bb3588d3fe45529262e382a2227ffc80a927378821e5dd097b5ac1ca79a31
-
\Users\Admin\AppData\Local\Temp\nsj2649.tmp\Math.dllFilesize
66KB
MD5860fd51502250540960134e1b5b69aac
SHA15282c905a66afc6def1a91e38096cfa6847f32d1
SHA256190ea3009f91969a1202ae42cd236abe2912709cd583661faeb7ca79087adf6c
SHA512817340a25190f78731c0f208ea044114aa0ac6007ccfc6b74026440e84f0025e2c311b3e9acfcd4bd9c42e4a140a8b9bda1b7bc7afb50a9d92f71099f066073b
-
\Users\Admin\AppData\Local\Temp\nsj2649.tmp\System.dllFilesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6
-
\Users\Admin\AppData\Local\Temp\nsj2649.tmp\advsplash.dllFilesize
5KB
MD515d8eee287329e2030c34c6bb3e62c87
SHA11de23c0883f7a80a489e140c55b16970dd0264ab
SHA2569bf33690090655e91389469beb5dbdd45942192f2e2486c9fa82fa6d74a0f88b
SHA5126ee495dcefd131ca490d6f3077643f49598184c3a49f1f66ed7a6d1559ebb9266c8c87cf49c06cdde8a6cd0643fb46f83d13aa5f27ba0c90de4791cb8bad29c0
-
\Users\Admin\AppData\Local\Temp\nsj2649.tmp\nsDialogs.dllFilesize
9KB
MD5b3070cf20db659fdfb3cb2ed38130e8d
SHA1aa234b0620bebddde1414ff6b0840d883890b413
SHA256f2c1409faf2952c1c91f4b5495158ef5c7d1a1db6eea4a18f163574bd52fcad0
SHA5124849a4cf24ea8a26cd04eb132d479cc093d4e204ed3866a77646d03778f4c128e20722a0c3cd62ea98a37deea4ce505fe632420158c71a10b0c8c5e32b38e3f1
-
\Users\Admin\AppData\Local\Temp\nsj2649.tmp\nsExec.dllFilesize
6KB
MD5b5a1f9dc73e2944a388a61411bdd8c70
SHA1dc9b20df3f3810c2e81a0c54dea385704ba8bef7
SHA256288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884
SHA512b9c8d71b5da00f2aff7847b9ec3bd8a588afeb525f47a0df235b52f7b2233edb3928a2c8e0b493f287c923cc52a340ad6fee99822595d6591df0e97870de92a8
-
\Windows\System32\imageres.dllFilesize
34.2MB
MD5ecc80244e20f46c3e201256dba9518e1
SHA1481c29655968f2cfac3c7b7f9b9e3cb6a7c74bd6
SHA256052a4c07ed8d0a7beadf3acb9e8a3dabdce7ac57175b389d13b8982e63214cf9
SHA5127f3726f5e83e35eed0cfc8b9afd1b6cb0b3298bced765a8a8b317b4ec19140308dfa4a93f9081e0bb418022cf2b9e12f48aba10cdf62fd7b6585eaac88401c09
-
\Windows\System32\imageres.dllFilesize
34.2MB
MD5ecc80244e20f46c3e201256dba9518e1
SHA1481c29655968f2cfac3c7b7f9b9e3cb6a7c74bd6
SHA256052a4c07ed8d0a7beadf3acb9e8a3dabdce7ac57175b389d13b8982e63214cf9
SHA5127f3726f5e83e35eed0cfc8b9afd1b6cb0b3298bced765a8a8b317b4ec19140308dfa4a93f9081e0bb418022cf2b9e12f48aba10cdf62fd7b6585eaac88401c09
-
\Windows\System32\imageres.dllFilesize
34.2MB
MD5ecc80244e20f46c3e201256dba9518e1
SHA1481c29655968f2cfac3c7b7f9b9e3cb6a7c74bd6
SHA256052a4c07ed8d0a7beadf3acb9e8a3dabdce7ac57175b389d13b8982e63214cf9
SHA5127f3726f5e83e35eed0cfc8b9afd1b6cb0b3298bced765a8a8b317b4ec19140308dfa4a93f9081e0bb418022cf2b9e12f48aba10cdf62fd7b6585eaac88401c09
-
\Windows\System32\imageres.dllFilesize
34.2MB
MD5ecc80244e20f46c3e201256dba9518e1
SHA1481c29655968f2cfac3c7b7f9b9e3cb6a7c74bd6
SHA256052a4c07ed8d0a7beadf3acb9e8a3dabdce7ac57175b389d13b8982e63214cf9
SHA5127f3726f5e83e35eed0cfc8b9afd1b6cb0b3298bced765a8a8b317b4ec19140308dfa4a93f9081e0bb418022cf2b9e12f48aba10cdf62fd7b6585eaac88401c09
-
\Windows\System32\imageres.dllFilesize
34.2MB
MD5ecc80244e20f46c3e201256dba9518e1
SHA1481c29655968f2cfac3c7b7f9b9e3cb6a7c74bd6
SHA256052a4c07ed8d0a7beadf3acb9e8a3dabdce7ac57175b389d13b8982e63214cf9
SHA5127f3726f5e83e35eed0cfc8b9afd1b6cb0b3298bced765a8a8b317b4ec19140308dfa4a93f9081e0bb418022cf2b9e12f48aba10cdf62fd7b6585eaac88401c09
-
\Windows\System32\imageres.dllFilesize
34.2MB
MD5ecc80244e20f46c3e201256dba9518e1
SHA1481c29655968f2cfac3c7b7f9b9e3cb6a7c74bd6
SHA256052a4c07ed8d0a7beadf3acb9e8a3dabdce7ac57175b389d13b8982e63214cf9
SHA5127f3726f5e83e35eed0cfc8b9afd1b6cb0b3298bced765a8a8b317b4ec19140308dfa4a93f9081e0bb418022cf2b9e12f48aba10cdf62fd7b6585eaac88401c09
-
\Windows\System32\imageres.dllFilesize
34.2MB
MD5ecc80244e20f46c3e201256dba9518e1
SHA1481c29655968f2cfac3c7b7f9b9e3cb6a7c74bd6
SHA256052a4c07ed8d0a7beadf3acb9e8a3dabdce7ac57175b389d13b8982e63214cf9
SHA5127f3726f5e83e35eed0cfc8b9afd1b6cb0b3298bced765a8a8b317b4ec19140308dfa4a93f9081e0bb418022cf2b9e12f48aba10cdf62fd7b6585eaac88401c09
-
memory/240-172-0x0000000000000000-mapping.dmp
-
memory/376-146-0x0000000000000000-mapping.dmp
-
memory/636-135-0x0000000000000000-mapping.dmp
-
memory/688-160-0x0000000000000000-mapping.dmp
-
memory/844-126-0x0000000000000000-mapping.dmp
-
memory/1064-136-0x0000000000000000-mapping.dmp
-
memory/1456-174-0x0000000000000000-mapping.dmp
-
memory/1504-63-0x0000000074630000-0x000000007463A000-memory.dmpFilesize
40KB
-
memory/1504-58-0x0000000005270000-0x0000000005383000-memory.dmpFilesize
1.1MB
-
memory/1504-60-0x0000000004550000-0x000000000456A000-memory.dmpFilesize
104KB
-
memory/1504-54-0x0000000075C81000-0x0000000075C83000-memory.dmpFilesize
8KB
-
memory/1552-162-0x0000000000000000-mapping.dmp
-
memory/1648-134-0x0000000000000000-mapping.dmp
-
memory/1976-139-0x000007FEFB3C1000-0x000007FEFB3C3000-memory.dmpFilesize
8KB
-
memory/1976-138-0x0000000000000000-mapping.dmp
-
memory/2076-124-0x0000000000000000-mapping.dmp
-
memory/2116-159-0x0000000000000000-mapping.dmp
-
memory/2124-169-0x0000000000000000-mapping.dmp
-
memory/2144-137-0x0000000000000000-mapping.dmp
-
memory/2168-67-0x0000000000000000-mapping.dmp
-
memory/2216-149-0x0000000000000000-mapping.dmp
-
memory/2216-71-0x0000000000000000-mapping.dmp
-
memory/2240-140-0x0000000000000000-mapping.dmp
-
memory/2252-148-0x0000000000000000-mapping.dmp
-
memory/2268-166-0x00000000FF610000-0x00000000FF8D0000-memory.dmpFilesize
2.8MB
-
memory/2268-167-0x000007FEF94A0000-0x000007FEF9694000-memory.dmpFilesize
2.0MB
-
memory/2268-168-0x000007FEFBD90000-0x000007FEFBE82000-memory.dmpFilesize
968KB
-
memory/2268-164-0x0000000000000000-mapping.dmp
-
memory/2272-179-0x0000000000000000-mapping.dmp
-
memory/2332-152-0x0000000000000000-mapping.dmp
-
memory/2376-141-0x0000000000000000-mapping.dmp
-
memory/2432-176-0x0000000000000000-mapping.dmp
-
memory/2432-184-0x0000000071A21000-0x0000000071A23000-memory.dmpFilesize
8KB
-
memory/2568-144-0x0000000000000000-mapping.dmp
-
memory/2608-183-0x0000000000000000-mapping.dmp
-
memory/2624-150-0x0000000000000000-mapping.dmp
-
memory/2624-151-0x000007FEF94A1000-0x000007FEF94A3000-memory.dmpFilesize
8KB
-
memory/2640-147-0x0000000000000000-mapping.dmp
-
memory/2648-161-0x0000000000000000-mapping.dmp
-
memory/2672-75-0x0000000000000000-mapping.dmp
-
memory/2724-79-0x0000000000000000-mapping.dmp
-
memory/2756-83-0x0000000000000000-mapping.dmp
-
memory/2792-91-0x0000000000000000-mapping.dmp
-
memory/2824-94-0x0000000000000000-mapping.dmp
-
memory/2860-102-0x0000000000000000-mapping.dmp
-
memory/2892-106-0x0000000000000000-mapping.dmp
-
memory/2924-113-0x0000000000000000-mapping.dmp
-
memory/2968-119-0x0000000000000000-mapping.dmp
-
memory/2988-155-0x0000000000000000-mapping.dmp
-
memory/3020-156-0x0000000000000000-mapping.dmp
-
memory/3036-163-0x0000000000000000-mapping.dmp