Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows10-1703_x64 -
resource
win10-20220901-es -
resource tags
arch:x64arch:x86image:win10-20220901-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
10-02-2023 17:50
Static task
static1
Behavioral task
behavioral1
Sample
Windows 10 Rounded.exe
Resource
win10-20220901-es
Behavioral task
behavioral2
Sample
Windows 10 Rounded.exe
Resource
win10v2004-20221111-es
General
-
Target
Windows 10 Rounded.exe
-
Size
2.4MB
-
MD5
11ff322997d98d02afe198c20b613ff3
-
SHA1
48e70395f187454bddc01484a6cbcf1c5f1753fc
-
SHA256
9482be3fcb23242751dfc68c1f239c92de3999618ca2d3ae0d7c9f5f596876f4
-
SHA512
11cc64b00f741b44c73c835e6da3c103d4a690e1c6c009cd020967e870967f31bd2ad8851f4e0d2a2c6e964558665e84d33839f82db2e178053d7ffb5b191ee4
-
SSDEEP
49152:DXNPtf+dAGSXAZGxgF3Nr13EfePGBT5OHTdg5K6EnCN11Y:DPxD5g1p9keGLc+SH
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Possible privilege escalation attempt 7 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exepid process 4756 takeown.exe 1048 icacls.exe 2272 takeown.exe 752 icacls.exe 1440 takeown.exe 4692 takeown.exe 4064 icacls.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\nspBACB.tmp\Aero.dll acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Windows 10 Rounded.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\International\Geo\Nation Windows 10 Rounded.exe -
Executes dropped EXE 4 IoCs
Processes:
UXTheme.exeRD.exeric.exetheme.exepid process 3504 UXTheme.exe 992 RD.exe 4260 ric.exe 4544 theme.exe -
Loads dropped DLL 38 IoCs
Processes:
Windows 10 Rounded.exeUXTheme.exeregsvr32.exeregsvr32.exeregsvr32.exeric.exeexplorer.exeexplorer.exetheme.exerundll32.exebrowser_broker.exepid process 2804 Windows 10 Rounded.exe 2804 Windows 10 Rounded.exe 2804 Windows 10 Rounded.exe 2804 Windows 10 Rounded.exe 2804 Windows 10 Rounded.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 3504 UXTheme.exe 4600 regsvr32.exe 4272 regsvr32.exe 3568 regsvr32.exe 2936 4260 ric.exe 4400 explorer.exe 424 explorer.exe 4544 theme.exe 2500 rundll32.exe 4400 explorer.exe 3192 3192 2804 Windows 10 Rounded.exe 3920 browser_broker.exe 2804 Windows 10 Rounded.exe 2804 Windows 10 Rounded.exe -
Modifies file permissions 1 TTPs 7 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exepid process 4692 takeown.exe 4064 icacls.exe 4756 takeown.exe 1048 icacls.exe 2272 takeown.exe 752 icacls.exe 1440 takeown.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{27DD0F8B-3E0E-4ADC-A78A-66047E71ADC5}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{27DD0F8B-3E0E-4ADC-A78A-66047E71ADC5}\InprocServer32\ = "C:\\skinpack\\OldNewExplorer64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{27DD0F8B-3E0E-4ADC-A78A-66047E71ADC5}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\nspBACB.tmp\Aero.dll upx behavioral1/memory/2804-179-0x0000000073CD0000-0x0000000073CDA000-memory.dmp upx behavioral1/memory/2804-288-0x0000000073CD0000-0x0000000073CDA000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27DD0F8B-3E0E-4ADC-A78A-66047E71ADC5} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27DD0F8B-3E0E-4ADC-A78A-66047E71ADC5}\NoInternetExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27DD0F8B-3E0E-4ADC-A78A-66047E71ADC5} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27DD0F8B-3E0E-4ADC-A78A-66047E71ADC5}\NoInternetExplorer = "1" regsvr32.exe -
Drops file in System32 directory 9 IoCs
Processes:
UXTheme.exedescription ioc process File opened for modification C:\Windows\System32\themeui.dll.backup UXTheme.exe File created C:\Windows\System32\themeui.dll.new UXTheme.exe File opened for modification C:\Windows\system32\themeui.dll.new UXTheme.exe File created C:\Windows\System32\uxinit.dll.backup UXTheme.exe File opened for modification C:\Windows\system32\uxinit.dll.old UXTheme.exe File created C:\Windows\System32\themeui.dll.backup UXTheme.exe File opened for modification C:\Windows\system32\themeui.dll.old UXTheme.exe File created C:\Windows\System32\uxinit.dll.new UXTheme.exe File opened for modification C:\Windows\system32\uxinit.dll.new UXTheme.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\web\\wallpaper\\win11.jpg" explorer.exe -
Drops file in Program Files directory 1 IoCs
Processes:
UXTheme.exedescription ioc process File created C:\Program Files (x86)\UltraUXThemePatcher\Uninstall.exe UXTheme.exe -
Drops file in Windows directory 55 IoCs
Processes:
Windows 10 Rounded.exeMicrosoftEdge.exeexplorer.exeMicrosoftEdgeCP.exeSearchUI.exedescription ioc process File created C:\Windows\Cursors\win11\Diagonal Resize 1.cur Windows 10 Rounded.exe File opened for modification C:\Windows\Resources\Themes\win11\Shell\NormalColor Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\Shell\NormalColor\nl-NL\shellstyle.dll.mui Windows 10 Rounded.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File created C:\Windows\Cursors\win11\busy.ani Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\Shell\NormalColor\de-DE\shellstyle.dll.mui Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Move.cur Windows 10 Rounded.exe File opened for modification C:\Windows\Resources\Themes\win11\Shell Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Help Select.cur Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Vertical Resize.ani Windows 10 Rounded.exe File opened for modification C:\Windows\Resources\Themes\win11\en-US Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\Shell\NormalColor\shellstyle_original.dll Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Vertical Resize.cur Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Working In Background.ani Windows 10 Rounded.exe File opened for modification C:\Windows\Resources\Themes\win11\Shell\NormalColor\de-DE Windows 10 Rounded.exe File created C:\Windows\rescache\_merged\2717123927\3950266016.pri explorer.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\Cursors\win11\Diagonal Resize 1.ani Windows 10 Rounded.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri explorer.exe File opened for modification C:\Windows\Resources\Themes\win11 Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\win11.msstyles Windows 10 Rounded.exe File created C:\Windows\Web\Wallpaper\win11.jpg Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Horizontal Resize.cur Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Normal Select.cur Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\en-US\M-orange_Vs_.msstyles.mui Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\Shell\NormalColor\1.txt Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\Shell\NormalColor\fr-FR\shellstyle.dll.mui Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Diagonal Resize 2.cur Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Handwriting.cur Windows 10 Rounded.exe File opened for modification C:\Windows\Resources\Themes\win11.theme Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\Shell\NormalColor\shellstyle.dll Windows 10 Rounded.exe File opened for modification C:\Windows\Resources\Themes\win11\Shell\NormalColor\en-US Windows 10 Rounded.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri SearchUI.exe File created C:\Windows\rescache\_merged\4032412167\2900507189.pri explorer.exe File created C:\Windows\Cursors\win11\Alternate Select.cur Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Diagonal Resize 2.ani Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Precision Select.cur Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Text Select.cur Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11.theme Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\Shell\shellstyle.dll Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\Shell\NormalColor\en-US\shellstyle.dll.mui Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\Shell\NormalColor\es-ES\shellstyle.dll.mui Windows 10 Rounded.exe File opened for modification C:\Windows\Resources\Themes\win11\Shell\NormalColor\fr-FR Windows 10 Rounded.exe File opened for modification C:\Windows\Resources\Themes\win11\Shell\NormalColor\it-IT Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\cross.cur Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\en-US\aero.msstyles.mui Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Link Select.cur Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\Shell\NormalColor\shellstyle.dll.ak Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\Shell\NormalColor\it-IT\shellstyle.dll.mui Windows 10 Rounded.exe File opened for modification C:\Windows\Resources\Themes\win11\Shell\NormalColor\nl-NL Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Horizontal Resize.ani Windows 10 Rounded.exe File created C:\Windows\Cursors\win11\Unavailable.cur Windows 10 Rounded.exe File created C:\Windows\Resources\Themes\win11\en-US\Tequilla.msstyles.mui Windows 10 Rounded.exe File opened for modification C:\Windows\Resources\Themes\win11\Shell\NormalColor\es-ES Windows 10 Rounded.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2080 2780 WerFault.exe MicrosoftEdgeCP.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Mfg svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
SearchUI.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1708 taskkill.exe -
Modifies Control Panel 58 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\Help = "%SystemRoot%\\Cursors\\win11\\Help Select.cur" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Accessibility\HighContrast\Flags = "126" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\NWPen = "%SystemRoot%\\Cursors\\win11\\Handwriting.cur" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\SizeAll = "%SystemRoot%\\Cursors\\win11\\Move.cur" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\ButtonAlternateFace = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\GradientInactiveTitle = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Accessibility\HighContrast\High Contrast Scheme rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\Hand = "%SystemRoot%\\Cursors\\win11\\Link Select.cur" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\SizeNS = "%SystemRoot%\\Cursors\\win11\\Vertical Resize.cur" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\AppWorkspace = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\TitleText = "247 247 247" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\ButtonShadow = "17 17 17" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\ButtonText = "151 151 151" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\No = "%SystemRoot%\\Cursors\\win11\\Unavailable.cur" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\Scheme Source = "2" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\MenuText = "151 151 151" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\WindowFrame = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\ButtonDkShadow = "17 17 17" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\GradientActiveTitle = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\SizeNWSE = "%SystemRoot%\\Cursors\\win11\\Diagonal Resize 2.cur" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\Menu = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\ButtonFace = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\IBeam = "%SystemRoot%\\Cursors\\win11\\Text Select.cur" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\SizeNESW = "%SystemRoot%\\Cursors\\win11\\Diagonal Resize 1.cur" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\InactiveTitleText = "247 247 247" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\Window = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\WindowText = "151 151 151" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\MenuHilight = "6 91 225" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Accessibility\HighContrast rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Accessibility\HighContrast\Previous High Contrast Scheme MUI Value rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\Crosshair = "%SystemRoot%\\Cursors\\win11\\Precision Select.cur" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\ActiveTitle = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\HotTrackingColor = "6 91 225" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\ActiveBorder = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\Hilight = "6 91 225" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\GrayText = "73 73 73" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\MenuBar = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Appearance\NewCurrent rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\Wait = "%SystemRoot%\\Cursors\\win11\\Busy.ani" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\SizeWE = "%SystemRoot%\\Cursors\\win11\\Horizontal Resize.cur" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\InactiveTitle = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\InactiveBorder = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\InfoText = "247 247 247" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\Scrollbar = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\ButtonLight = "42 42 42" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Appearance\Current rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\HilightText = "247 247 247" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\ButtonHilight = "15 15 15" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\InfoWindow = "18 18 18" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Desktop\UserPreferencesMask = 9e1e078012000000 rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Colors\Background = "32 32 32" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\AppStarting = "%SystemRoot%\\Cursors\\win11\\Working In Background.ani" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\UpArrow = "%SystemRoot%\\Cursors\\win11\\Alternate Select.cur" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\ = "win11" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Appearance rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\Cursors\Arrow = "%SystemRoot%\\Cursors\\win11\\Normal Select.cur" rundll32.exe -
Processes:
explorer.exeMicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeregsvr32.exeSearchUI.exeexplorer.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{27DD0F8B-3E0E-4ADC-A78A-66047E71ADC5}\InprocServer32\ = "C:\\skinpack\\OldNewExplorer64.dll" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "5" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 7bef3f1b21bed801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 7bef3f1b21bed801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 498d4a6f783dd901 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupView = "4294967295" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Pack = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 010000008ad4e0f724c9964e6c173f7dc7a897906a8089917855f15259c27122bfb778179323bbf10ffc1d4b841ee7098eb204a29901327995f082765390ee8e026e8d12ee9fa3ebf7a76e92eaba56a52f8d3c20318de5e838bc46e4dbe6 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 7bef3f1b21bed801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\LastClosedHeight = "600" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668} explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 4400 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Windows 10 Rounded.exeexplorer.exepid process 2804 Windows 10 Rounded.exe 4400 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exepid process 532 MicrosoftEdgeCP.exe 532 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
vssvc.exetakeown.exetakeown.exetaskkill.exesrtasks.exeexplorer.exedescription pid process Token: SeBackupPrivilege 5112 vssvc.exe Token: SeRestorePrivilege 5112 vssvc.exe Token: SeAuditPrivilege 5112 vssvc.exe Token: SeTakeOwnershipPrivilege 4692 takeown.exe Token: SeTakeOwnershipPrivilege 4756 takeown.exe Token: SeDebugPrivilege 1708 taskkill.exe Token: SeBackupPrivilege 4576 srtasks.exe Token: SeRestorePrivilege 4576 srtasks.exe Token: SeSecurityPrivilege 4576 srtasks.exe Token: SeTakeOwnershipPrivilege 4576 srtasks.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeBackupPrivilege 4576 srtasks.exe Token: SeRestorePrivilege 4576 srtasks.exe Token: SeSecurityPrivilege 4576 srtasks.exe Token: SeTakeOwnershipPrivilege 4576 srtasks.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe Token: SeShutdownPrivilege 4400 explorer.exe Token: SeCreatePagefilePrivilege 4400 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
explorer.exepid process 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
explorer.exepid process 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe 4400 explorer.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
SearchUI.exeexplorer.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 4924 SearchUI.exe 4400 explorer.exe 3608 MicrosoftEdge.exe 532 MicrosoftEdgeCP.exe 532 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
Windows 10 Rounded.exeUXTheme.exeRD.exeregsvr32.exeric.execmd.exetheme.exeMicrosoftEdgeCP.exedescription pid process target process PID 2804 wrote to memory of 3504 2804 Windows 10 Rounded.exe UXTheme.exe PID 2804 wrote to memory of 3504 2804 Windows 10 Rounded.exe UXTheme.exe PID 2804 wrote to memory of 3504 2804 Windows 10 Rounded.exe UXTheme.exe PID 3504 wrote to memory of 4692 3504 UXTheme.exe takeown.exe PID 3504 wrote to memory of 4692 3504 UXTheme.exe takeown.exe PID 3504 wrote to memory of 4064 3504 UXTheme.exe icacls.exe PID 3504 wrote to memory of 4064 3504 UXTheme.exe icacls.exe PID 3504 wrote to memory of 4756 3504 UXTheme.exe takeown.exe PID 3504 wrote to memory of 4756 3504 UXTheme.exe takeown.exe PID 3504 wrote to memory of 1048 3504 UXTheme.exe icacls.exe PID 3504 wrote to memory of 1048 3504 UXTheme.exe icacls.exe PID 2804 wrote to memory of 992 2804 Windows 10 Rounded.exe RD.exe PID 2804 wrote to memory of 992 2804 Windows 10 Rounded.exe RD.exe PID 2804 wrote to memory of 992 2804 Windows 10 Rounded.exe RD.exe PID 992 wrote to memory of 4600 992 RD.exe regsvr32.exe PID 992 wrote to memory of 4600 992 RD.exe regsvr32.exe PID 992 wrote to memory of 4600 992 RD.exe regsvr32.exe PID 992 wrote to memory of 4272 992 RD.exe regsvr32.exe PID 992 wrote to memory of 4272 992 RD.exe regsvr32.exe PID 992 wrote to memory of 4272 992 RD.exe regsvr32.exe PID 4272 wrote to memory of 3568 4272 regsvr32.exe regsvr32.exe PID 4272 wrote to memory of 3568 4272 regsvr32.exe regsvr32.exe PID 2804 wrote to memory of 4260 2804 Windows 10 Rounded.exe ric.exe PID 2804 wrote to memory of 4260 2804 Windows 10 Rounded.exe ric.exe PID 2804 wrote to memory of 4260 2804 Windows 10 Rounded.exe ric.exe PID 4260 wrote to memory of 3196 4260 ric.exe cmd.exe PID 4260 wrote to memory of 3196 4260 ric.exe cmd.exe PID 4260 wrote to memory of 3196 4260 ric.exe cmd.exe PID 3196 wrote to memory of 1708 3196 cmd.exe taskkill.exe PID 3196 wrote to memory of 1708 3196 cmd.exe taskkill.exe PID 3196 wrote to memory of 1708 3196 cmd.exe taskkill.exe PID 3196 wrote to memory of 2272 3196 cmd.exe takeown.exe PID 3196 wrote to memory of 2272 3196 cmd.exe takeown.exe PID 3196 wrote to memory of 2272 3196 cmd.exe takeown.exe PID 3196 wrote to memory of 752 3196 cmd.exe icacls.exe PID 3196 wrote to memory of 752 3196 cmd.exe icacls.exe PID 3196 wrote to memory of 752 3196 cmd.exe icacls.exe PID 3196 wrote to memory of 1440 3196 cmd.exe takeown.exe PID 3196 wrote to memory of 1440 3196 cmd.exe takeown.exe PID 3196 wrote to memory of 1440 3196 cmd.exe takeown.exe PID 3196 wrote to memory of 4400 3196 cmd.exe explorer.exe PID 3196 wrote to memory of 4400 3196 cmd.exe explorer.exe PID 2804 wrote to memory of 424 2804 Windows 10 Rounded.exe explorer.exe PID 2804 wrote to memory of 424 2804 Windows 10 Rounded.exe explorer.exe PID 2804 wrote to memory of 4544 2804 Windows 10 Rounded.exe theme.exe PID 2804 wrote to memory of 4544 2804 Windows 10 Rounded.exe theme.exe PID 2804 wrote to memory of 4544 2804 Windows 10 Rounded.exe theme.exe PID 4544 wrote to memory of 2500 4544 theme.exe rundll32.exe PID 4544 wrote to memory of 2500 4544 theme.exe rundll32.exe PID 4544 wrote to memory of 2500 4544 theme.exe rundll32.exe PID 532 wrote to memory of 2780 532 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 532 wrote to memory of 2780 532 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 532 wrote to memory of 2780 532 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 532 wrote to memory of 2780 532 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 532 wrote to memory of 2780 532 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 532 wrote to memory of 2780 532 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 532 wrote to memory of 2780 532 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 532 wrote to memory of 2780 532 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 532 wrote to memory of 2780 532 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 532 wrote to memory of 2780 532 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Windows 10 Rounded.exe"C:\Users\Admin\AppData\Local\Temp\Windows 10 Rounded.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\nspBACB.tmp\UXTheme.exe"C:\Users\Admin\AppData\Local\Temp\nspBACB.tmp\UXTheme.exe" /S2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /f "C:\Windows\system32\themeui.dll"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" "C:\Windows\system32\themeui.dll" /grant Admin:(d,wdac)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /f "C:\Windows\system32\uxinit.dll"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" "C:\Windows\system32\uxinit.dll" /grant Admin:(d,wdac)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\SkinPack\RD.exe"C:\SkinPack\RD.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s C:\skinpack\OldNewExplorer32.dll3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s C:\skinpack\OldNewExplorer64.dll3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/s C:\skinpack\OldNewExplorer64.dll4⤵
- Loads dropped DLL
- Registers COM server for autorun
- Installs/modifies Browser Helper Object
- Modifies registry class
-
C:\SkinPack\ric.exe"C:\SkinPack\ric.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ric.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\takeown.exetakeown /f ""C:\Users\Admin\AppData\Local\IconCache.db""4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls ""C:\Users\Admin\AppData\Local\IconCache.db"" /grant administrators:F /t4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\explorer.exeC:\Windows\explorer.exe4⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Loads dropped DLL
-
C:\SkinPack\theme.exe"C:\SkinPack\theme.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\themecpl.dll,OpenThemeAction C:\Windows\Resources\Themes\win11.theme3⤵
- Loads dropped DLL
- Modifies Control Panel
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system32\rundll32.exerundll32.exe uxtheme.dll,#64 C:\Windows\resources\themes\Aero\Aero.msstyles?NormalColor?NormalSize1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2780 -s 36722⤵
- Program crash
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\SkinPack\RD.exeFilesize
458KB
MD5070b21f16a8ceb711175f88282d6a8d9
SHA109450d2262d72caeed79d8f032c45e234c943e96
SHA256f718d68bde68ef3d869ca6a381d68c0211ea05f42d6008467d6c8089503207a3
SHA512e86446194bd9b35dabfee16ace8f659ee1066ee067aa2e87f1dce1a8a62d23c097e332fef5cde3ae07c9f494444849b601e69862507e60160deaf901aed2ed44
-
C:\SkinPack\rd.exeFilesize
458KB
MD5070b21f16a8ceb711175f88282d6a8d9
SHA109450d2262d72caeed79d8f032c45e234c943e96
SHA256f718d68bde68ef3d869ca6a381d68c0211ea05f42d6008467d6c8089503207a3
SHA512e86446194bd9b35dabfee16ace8f659ee1066ee067aa2e87f1dce1a8a62d23c097e332fef5cde3ae07c9f494444849b601e69862507e60160deaf901aed2ed44
-
C:\SkinPack\ric.exeFilesize
185KB
MD5865fee81ba24570833e6bdf36872fb5a
SHA130be1b8be25c9d3640c212cedfd7ec38e1a512f3
SHA2566468653a01d17bd925174a17991b159b8b36640a636d0abd412131bc552c5508
SHA512f9029bf0de97ecde880afc63e20960adbcb7ebde8f4dab7218b9a381883ba981d934872efb38ed8f0be03ab4c781cdfd0d628cf34c5f4bed12d7afdae29fe4d2
-
C:\SkinPack\ric.exeFilesize
185KB
MD5865fee81ba24570833e6bdf36872fb5a
SHA130be1b8be25c9d3640c212cedfd7ec38e1a512f3
SHA2566468653a01d17bd925174a17991b159b8b36640a636d0abd412131bc552c5508
SHA512f9029bf0de97ecde880afc63e20960adbcb7ebde8f4dab7218b9a381883ba981d934872efb38ed8f0be03ab4c781cdfd0d628cf34c5f4bed12d7afdae29fe4d2
-
C:\SkinPack\theme.exeFilesize
250KB
MD5709f8624f01ba7117b4c67a0f011d149
SHA13c8ce0ad9ce24cbed692e5c81ca810bd1ebedd0b
SHA256083b0982d03a7b38b5dfaddad8d6add0882312c5eb6089d7a7d42a79f950f708
SHA512c47b3f4136bbec08646064365a795e98e5b9b2f34fc844381b07b27b038e0a550fe4df7b8445459f77fcf0457d3fac3b4c3a42dd50028a6e8a0a9ae93f870f89
-
C:\SkinPack\theme.exeFilesize
250KB
MD5709f8624f01ba7117b4c67a0f011d149
SHA13c8ce0ad9ce24cbed692e5c81ca810bd1ebedd0b
SHA256083b0982d03a7b38b5dfaddad8d6add0882312c5eb6089d7a7d42a79f950f708
SHA512c47b3f4136bbec08646064365a795e98e5b9b2f34fc844381b07b27b038e0a550fe4df7b8445459f77fcf0457d3fac3b4c3a42dd50028a6e8a0a9ae93f870f89
-
C:\Users\Admin\AppData\Local\Temp\nspBACB.tmp\UXTheme.exeFilesize
158KB
MD514044c6159982ac9bce2da9a354ceaaf
SHA1790dfe5aeb3607ab7d9ea8a06eda6e35330995fb
SHA256826186b0c1aa55646dfd2d7699a05192d78f7f0b76413a6525effa894cf83bf2
SHA512f14bb5e6ec7232b13cc13003d66df38e2a14228bb0cd32a203c30fff11bc975913c2f60aa0e90044f064774c8f133a03cfb0332c470084597e4a6f2593d2e995
-
C:\Users\Admin\AppData\Local\Temp\nspBACB.tmp\UXTheme.exeFilesize
158KB
MD514044c6159982ac9bce2da9a354ceaaf
SHA1790dfe5aeb3607ab7d9ea8a06eda6e35330995fb
SHA256826186b0c1aa55646dfd2d7699a05192d78f7f0b76413a6525effa894cf83bf2
SHA512f14bb5e6ec7232b13cc13003d66df38e2a14228bb0cd32a203c30fff11bc975913c2f60aa0e90044f064774c8f133a03cfb0332c470084597e4a6f2593d2e995
-
C:\Users\Admin\AppData\Local\Temp\ric.batFilesize
808B
MD515e97d095d6e3516171f8071adf57422
SHA1f25bce3d261351bd26380c3fbd57aeb716dbbd71
SHA25642ed432f0b3388a0b7b1acf191f4fdea8c07a6869f7f325960848775f8310f0a
SHA512ee8bb7a8456815112173bd147f81f13b8052d68b4481668cfcc62c263909ad87c40af48177d873f6f6ed2b902f42175c4dba599cd427ff83d62afab3d944046f
-
C:\Windows\Cursors\win11\Alternate Select.curFilesize
4KB
MD5f39bbc4b3ed4d522e80168563daa3d0e
SHA1b74d5a0c841f57f7087511078ae82f2139594e9d
SHA256d4b810d35b36dd9564d7ca56580812a7c595dbfd7a995ab42ee72495c6b2be83
SHA51292813aa8114dc81627cc1d401a87c87acdf8ec89eba381793f81a21fe8f11de188a2c1a95d0380423ecd3e472c8ae5b4fcb57b94325e90fd757c1fec5e7c0def
-
C:\Windows\Cursors\win11\Busy.aniFilesize
88KB
MD51b2ce00c3393fdb634a6f72dd39e9464
SHA1bb096b201490bfc6a80d89255162234bfa9fa6b2
SHA256d65b05aea602279558e33d4cb413b5066d8f64857f0a375324fe26cbb7919f33
SHA512e964e25bd2e1e1c87634fa4056cc7582c786e0f1a3afa516fb924bdd372a58a718c1e2654e7afd2949839e060de30236f483fb785787b39cdfa1502c515f6b81
-
C:\Windows\Cursors\win11\Diagonal Resize 1.curFilesize
4KB
MD597ac94dedad718b0870c830131f1b1b6
SHA191bad9493ecc95f0dbc805f76caf69f7be6a512d
SHA256355d649821e0762a5bfc9a62283cbc2517cd8581bb2eac90fb7ec8458c108580
SHA5125922cbd6039aa8ad20d3fc7a8f02e66c9c7a651159bb1a35a532eea18b2f9484b7f8a6e2f2d6df37aa009c0a2fe57c10a7bc2ae55e01579a4b444d99d9680e42
-
C:\Windows\Cursors\win11\Diagonal Resize 2.curFilesize
4KB
MD521ddd61f124db7beb1348d2ce01a76cc
SHA1c6bd6df38384d215e065b28e9f5c3f7dd6f0699a
SHA256b012ad8185ff1b59fb1a369a14eb07e5d7bd3a0ac338db91bf0c3bbb0d89e348
SHA51215efea80c9daf35ac8562a64e80f3b55cb94be4ba0789d335d7e8d54903757162c8ceef80be270ba8b5fdb007279977fd0c1bfbbe99e85d572076f0b32078636
-
C:\Windows\Cursors\win11\Handwriting.curFilesize
4KB
MD565c1a0e6f95908c8abefbd30e70127f8
SHA17074c46b77ba7ecc980b1c3a4bfd70a5ef636fe7
SHA25674fe2ec4670a13c1fde29c64fb9cf6c23e532915edac5dcd4bc3eeb35602a754
SHA5127138546a52d6f9779c5cc319057ad3e6eb40a9792be5453eca4cca7b8c419d84b16d1d385b8aaa51b71c6bb07dc1b3146d9c90a3a0204359325c2093e40b0bcc
-
C:\Windows\Cursors\win11\Help Select.curFilesize
4KB
MD59b084525a560d248dd6e512be26f4b00
SHA19003d52d53a2dbb25380c7487e6066faf9b9d83c
SHA256998d63f5996af6834e5240f9b44b904a53a873121f1e7f746322971007273824
SHA512035a7b2bb067bd9a9efd31926b75737a6948fb8f27be2e52233415e1611d77b48f4587c058b5e1e108f5d86a8420f237cc1aacc65ab58c39b4922f91f20957bb
-
C:\Windows\Cursors\win11\Horizontal Resize.curFilesize
4KB
MD5aa3058f215f71fba2c3569490ad11962
SHA1ec7934d0a54e7f8d111c9a7ea2c6ea2908c0006d
SHA256eefac9602637c8779ba39087341546c1675ee8a2e00c92c6b5d9c072e7bcea32
SHA512f2c29a3746ce8348dde2a84d4275c9e217d7f8a7765263d9a15b6a79da6fdce493070cd526698e024fd5487690785bf3ae82256ec2c7a76a0401dff1308acac7
-
C:\Windows\Cursors\win11\Link Select.curFilesize
4KB
MD562440644dc2e7c3e9544b9b023a70200
SHA11346cf9b5bf0ad2bc69052c2d45e9c900ecdbcde
SHA256b4c58497ab46702ecc767fe8034c35bc53664b0936b2c32140ad950445a331d3
SHA512f0bc31b3bb4bbb626e1873d4910ac611606b0e8db76cf939a03a5a2a6b036def7252fe88e7190dfc8739a1a8ca8eea1144f5eb6443e021118a9d91824d5aa1a6
-
C:\Windows\Cursors\win11\Move.curFilesize
4KB
MD520061f34cb3720889faf5d3da9dce418
SHA1cddee12fa753a2a00d88f759a5c784d8e49da005
SHA256eaa76961999078700aa75a7f96daecfdc83871091c0dc4821cbaf4a4d52f1443
SHA512813ee67598067f1458732721f23b4251025667057ebd1d531b054ab545bd56d5aab5a3cbf33e4cfffa184b62c8230f4094abed83f32ddf4655ccc9f71bd64b0a
-
C:\Windows\Cursors\win11\Normal Select.curFilesize
4KB
MD5428f75b1a4002ad9ca4c40508b48c00b
SHA102c20a32ab116a6f41c395998d30e590c594e986
SHA256024f64380d2856846800f440bf00425dcf4c9636b21864846b5d4fe4b62db087
SHA5128939a80884e6cac3257b7acc8b04db8c0b4d8b8fa19b3001da1d0ba77e0e38e8ccfacfd6414775533a71054ca42e5ddf5d3bfc7d6d9523d22ca3b58c7d1c18ad
-
C:\Windows\Cursors\win11\Precision Select.curFilesize
4KB
MD5f7e9cdc270fdb7ae1104b3ffd9f21ab2
SHA1bb4965830392db5d83d7da4872a7db1d3aaea45d
SHA256d09135b6ef1438b83ed241ce2af269afaa6ac2c192f2348416043b947d2db60e
SHA512f18a844d3b24df6cad4e6a69bc083d43b7bd190b256848f7eff1199561eb3c9732b622c6626101e3a8932abff1e29dc347aab2a2e31f09d35d369d26a3983fdf
-
C:\Windows\Cursors\win11\Text Select.curFilesize
4KB
MD57f5447324171124c955542823165bf76
SHA19b4dcdf0f8d0ddf29dd122b6251df652ad6ca16f
SHA25635e2699ccc54543a1695c5fd94f8f99e097f37d3c2535a09c4220411a822ee91
SHA512e0f24d76fc72cc6bf10790a6dfc3dbf8491e62b197f41b47215e61fc29f4e752a898d45391c76f6b25a79f8f1627b568ddc7154d508d9f6117e0f1cf7984b33c
-
C:\Windows\Cursors\win11\Unavailable.curFilesize
4KB
MD5035f705096a5c9e1f96ecf0f65709ece
SHA1c28683d3d766ece4a87780188f573dd1e3a74a99
SHA256b8924fa66af797962b1784b74c2eb46fa27c2a97b5296c205ef4af81728474d8
SHA51293baefe0f5fe055d40cb9bbabbc70000b1a6d75b7f04ae580cf863daa908a0756128215602188bee7b50ca7e9e5faddcc0956716782a519ce4fa3f9b8fea9d4d
-
C:\Windows\Cursors\win11\Vertical Resize.curFilesize
4KB
MD5ae6fbde374a52fbef2756435cace1283
SHA1891e0728c50840d8686107fd8a1018d48f1ec5a8
SHA256d6623e00b3ca9f8900f8e0353b845bb191bfa8d301509cef44b7bb0a88c45ae8
SHA5122e462c7fed43b120d9bba25b445d1fe50f5c86c14fc7a3bc3314bb3a6585f5cf40d678e7064974b8ea275643746ee73d56ab7c8ebf6aa2c78510b7e61a515939
-
C:\Windows\Cursors\win11\Working In Background.aniFilesize
88KB
MD5f32b8318d87b8faab23000470b62e656
SHA10c72413613a8cbf04d5c705949bf1a0ee60ee4ed
SHA2563b2e335e6f7de136fb8c5decebcda73aad31ec339b3faf65264526fbb83ffb92
SHA512b6bdedb6b9631c4867c26b1b29d568b8e09e71af8a717e416a8f33c45193f2c9c6ce381276dbefca62def8025f988faa9304040ac873c90afa73c19bae2b1abe
-
C:\Windows\Resources\Themes\win11.themeFilesize
2KB
MD5a5f56f2e08098c85191104802251c8dd
SHA1e3da2b90624c79f0d19ca0883b09875d3a2d0310
SHA25654e02dfeb11fbf746b7ec179ca17720960b6be2f9c35cd55860045811a30c958
SHA5123f6b48569bbdc8e7b52668751b7b83654ece21bac1da1ed475c60a8026bff97ed299b87d05a8bf52b0c6570fc13e7ef8c0487bf08bbfae5270e1bc6859f37aec
-
C:\Windows\Resources\Themes\win11\win11.msstylesFilesize
1.1MB
MD5bcdd87bb20fec0bda02ed72a582cdeec
SHA1dd68b0ae10f51419a3ccbeb5321027ce2ec3c3da
SHA256b5291f676d7558b74080dd26aa40678d4d41f5d272b640a0a7c1eff5410f6f9f
SHA51237c37afb4b921010539a6754a40541939b5abff9bd8c10191b9c4ebc0cc91570dcb2a983586bb379975cc187537d433d0987836911527d6d352f0ba5c555e100
-
C:\Windows\system32\themeui.dllFilesize
2.7MB
MD53350fb97f17d354efaf67bd969b7a0d5
SHA1213bcc525e91dd1cc3e2468d52d51deca6c923aa
SHA256de6abddc242d9debf0d2b89d962a1c45cf41a57f6b9659eeedc6748f1b4d0ac6
SHA5120c18d373781876a61d018c19b0c3060746cc0c9b8d053877a7d7d3427eb64cae33245c9c4074c8150088e617bfc37946868be362ae10f705a2a43b9908be5d4f
-
C:\Windows\web\wallpaper\win11.jpgFilesize
456KB
MD5887438194820c7eff2fa55cece1a4661
SHA185ae1c33d53b5c9ed4ffadff930430b3fc62ca56
SHA2563973f423d1477630840dc60d43ece2a397c722b4b4c82a6d66618a3b4edfba08
SHA512c64773119464361d6ddbd2d23ccc61cc0e7c4523826fa7fee83801a223bab2cc1e98fb9cb8fae59bf2a5597fbc828c0b1da44afcc058bdfbf25503a4848c2dca
-
C:\skinpack\OldNewExplorer32.dllFilesize
249KB
MD5a72e302c3f4e4dc8eaa365592aef97c8
SHA183000d226d885e71ba3cfa4603c26768c6ec03c7
SHA25676f3780b3a124f17dbaa369fb8ff54fe6d69f9297795af0cee720a7de213a92a
SHA5122d0dd7b4f28da1ce6074361c5ff34b93183b6e81ba5d092e44e8f22726cc85cdfe0d8c01ceaf6a8bb37f72dcc7bb60e869172ec18b9dcf0607e5ed6389bd3848
-
C:\skinpack\OldNewExplorer64.dllFilesize
255KB
MD5fcf194e3b9101064939a000075149f29
SHA17a3767dabba5368da9092ea17b0dcbdd23b23bfb
SHA25621e76d101c19571d254e649c86f2588c7a46e7fb8f0911880ebbbadc7acf4d18
SHA512e3fc693f1e7f7ac80d45f3b3d6df6c659f8e5aca5ef02d6a020d351927b684f71be4aba7c27aca2f82893cd98f431a89b21f5e78a7c35207964b161749fc4d24
-
\SkinPack\OldNewExplorer32.dllFilesize
249KB
MD5a72e302c3f4e4dc8eaa365592aef97c8
SHA183000d226d885e71ba3cfa4603c26768c6ec03c7
SHA25676f3780b3a124f17dbaa369fb8ff54fe6d69f9297795af0cee720a7de213a92a
SHA5122d0dd7b4f28da1ce6074361c5ff34b93183b6e81ba5d092e44e8f22726cc85cdfe0d8c01ceaf6a8bb37f72dcc7bb60e869172ec18b9dcf0607e5ed6389bd3848
-
\SkinPack\OldNewExplorer32.dllFilesize
249KB
MD5a72e302c3f4e4dc8eaa365592aef97c8
SHA183000d226d885e71ba3cfa4603c26768c6ec03c7
SHA25676f3780b3a124f17dbaa369fb8ff54fe6d69f9297795af0cee720a7de213a92a
SHA5122d0dd7b4f28da1ce6074361c5ff34b93183b6e81ba5d092e44e8f22726cc85cdfe0d8c01ceaf6a8bb37f72dcc7bb60e869172ec18b9dcf0607e5ed6389bd3848
-
\SkinPack\OldNewExplorer32.dllFilesize
249KB
MD5a72e302c3f4e4dc8eaa365592aef97c8
SHA183000d226d885e71ba3cfa4603c26768c6ec03c7
SHA25676f3780b3a124f17dbaa369fb8ff54fe6d69f9297795af0cee720a7de213a92a
SHA5122d0dd7b4f28da1ce6074361c5ff34b93183b6e81ba5d092e44e8f22726cc85cdfe0d8c01ceaf6a8bb37f72dcc7bb60e869172ec18b9dcf0607e5ed6389bd3848
-
\SkinPack\OldNewExplorer32.dllFilesize
249KB
MD5a72e302c3f4e4dc8eaa365592aef97c8
SHA183000d226d885e71ba3cfa4603c26768c6ec03c7
SHA25676f3780b3a124f17dbaa369fb8ff54fe6d69f9297795af0cee720a7de213a92a
SHA5122d0dd7b4f28da1ce6074361c5ff34b93183b6e81ba5d092e44e8f22726cc85cdfe0d8c01ceaf6a8bb37f72dcc7bb60e869172ec18b9dcf0607e5ed6389bd3848
-
\SkinPack\OldNewExplorer64.dllFilesize
255KB
MD5fcf194e3b9101064939a000075149f29
SHA17a3767dabba5368da9092ea17b0dcbdd23b23bfb
SHA25621e76d101c19571d254e649c86f2588c7a46e7fb8f0911880ebbbadc7acf4d18
SHA512e3fc693f1e7f7ac80d45f3b3d6df6c659f8e5aca5ef02d6a020d351927b684f71be4aba7c27aca2f82893cd98f431a89b21f5e78a7c35207964b161749fc4d24
-
\SkinPack\OldNewExplorer64.dllFilesize
255KB
MD5fcf194e3b9101064939a000075149f29
SHA17a3767dabba5368da9092ea17b0dcbdd23b23bfb
SHA25621e76d101c19571d254e649c86f2588c7a46e7fb8f0911880ebbbadc7acf4d18
SHA512e3fc693f1e7f7ac80d45f3b3d6df6c659f8e5aca5ef02d6a020d351927b684f71be4aba7c27aca2f82893cd98f431a89b21f5e78a7c35207964b161749fc4d24
-
\SkinPack\OldNewExplorer64.dllFilesize
255KB
MD5fcf194e3b9101064939a000075149f29
SHA17a3767dabba5368da9092ea17b0dcbdd23b23bfb
SHA25621e76d101c19571d254e649c86f2588c7a46e7fb8f0911880ebbbadc7acf4d18
SHA512e3fc693f1e7f7ac80d45f3b3d6df6c659f8e5aca5ef02d6a020d351927b684f71be4aba7c27aca2f82893cd98f431a89b21f5e78a7c35207964b161749fc4d24
-
\SkinPack\OldNewExplorer64.dllFilesize
255KB
MD5fcf194e3b9101064939a000075149f29
SHA17a3767dabba5368da9092ea17b0dcbdd23b23bfb
SHA25621e76d101c19571d254e649c86f2588c7a46e7fb8f0911880ebbbadc7acf4d18
SHA512e3fc693f1e7f7ac80d45f3b3d6df6c659f8e5aca5ef02d6a020d351927b684f71be4aba7c27aca2f82893cd98f431a89b21f5e78a7c35207964b161749fc4d24
-
\SkinPack\OldNewExplorer64.dllFilesize
255KB
MD5fcf194e3b9101064939a000075149f29
SHA17a3767dabba5368da9092ea17b0dcbdd23b23bfb
SHA25621e76d101c19571d254e649c86f2588c7a46e7fb8f0911880ebbbadc7acf4d18
SHA512e3fc693f1e7f7ac80d45f3b3d6df6c659f8e5aca5ef02d6a020d351927b684f71be4aba7c27aca2f82893cd98f431a89b21f5e78a7c35207964b161749fc4d24
-
\SkinPack\OldNewExplorer64.dllFilesize
255KB
MD5fcf194e3b9101064939a000075149f29
SHA17a3767dabba5368da9092ea17b0dcbdd23b23bfb
SHA25621e76d101c19571d254e649c86f2588c7a46e7fb8f0911880ebbbadc7acf4d18
SHA512e3fc693f1e7f7ac80d45f3b3d6df6c659f8e5aca5ef02d6a020d351927b684f71be4aba7c27aca2f82893cd98f431a89b21f5e78a7c35207964b161749fc4d24
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\SysRestore.dllFilesize
5KB
MD54310bd09fc2300b106f0437b6e995330
SHA1c6790a68e410d4a619b9b59e7540b702a98ad661
SHA256c686b4df9b4db50fc1ddb7be4cd50d4b1d75894288f4dc50571b79937d7c0d7e
SHA51249e286ccd285871db74867810c9cf243e3c1522ce7b4c0d1d01bafe72552692234cf4b4d787b900e9c041b8a2c12f193b36a6a35c64ffd5deef0e1be9958b1f7
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\System.dllFilesize
12KB
MD5564bb0373067e1785cba7e4c24aab4bf
SHA17c9416a01d821b10b2eef97b80899d24014d6fc1
SHA2567a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5
SHA51222c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nseEAE4.tmp\nsisFile.dllFilesize
5KB
MD5b7d0d765c151d235165823b48554e442
SHA1fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SHA256a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
SHA5125d801c24dfa1b7326f72f9c0acf3a330ef0cc3fce25ceee200bb12eab8c2b653025602e610e0cecda1e7cbd851ce1b66252531220b557a378ddb0b4a1741fa66
-
\Users\Admin\AppData\Local\Temp\nspBACB.tmp\Aero.dllFilesize
6KB
MD5243bf44688b131c3171f2827a93e39dc
SHA107e9c7bd16ae47953e42c06ae2606de188386f35
SHA25604a577df50431eb0ff6fb103566402bf66c50415bcc1f8a86b9c235053131455
SHA512a1a8c21d38c54a43d1c6c394f481dfbddcb359c617e9928ecca8f84d47354616a78d20735a1fe7bebd21626c21cf96d0e1a69e3e98f6b35f2a774cc0244f9516
-
\Users\Admin\AppData\Local\Temp\nspBACB.tmp\System.dllFilesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c
-
\Users\Admin\AppData\Local\Temp\nspBACB.tmp\advsplash.dllFilesize
5KB
MD5176ec6dc75972ce900793396723ed374
SHA1551f8cab48da2b2770442d10e3e18edc44760357
SHA256f568ebb5792b5054cd871cbe128e6f409b097e79be7366d409189e0a1c1f9f83
SHA5128ea30e09fc1db2616b4946b65a0136afce96991764693725f956a5aa1cfc871595ea2101cfbd3b3280aba803a1dd8199ba7245b5925ecb0c00e641eca1d64b5f
-
\Users\Admin\AppData\Local\Temp\nspBACB.tmp\nsDialogs.dllFilesize
9KB
MD51c8b2b40c642e8b5a5b3ff102796fb37
SHA13245f55afac50f775eb53fd6d14abb7fe523393d
SHA2568780095aa2f49725388cddf00d79a74e85c9c4863b366f55c39c606a5fb8440c
SHA5124ff2dc83f640933162ec8818bb1bf3b3be1183264750946a3d949d2e7068ee606277b6c840193ef2b4663952387f07f6ab12c84c4a11cae9a8de7bd4e7971c57
-
\Users\Admin\AppData\Local\Temp\nspBACB.tmp\nsExec.dllFilesize
6KB
MD509c2e27c626d6f33018b8a34d3d98cb6
SHA18d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954
-
\Windows\System32\themeui.dllFilesize
2.7MB
MD53350fb97f17d354efaf67bd969b7a0d5
SHA1213bcc525e91dd1cc3e2468d52d51deca6c923aa
SHA256de6abddc242d9debf0d2b89d962a1c45cf41a57f6b9659eeedc6748f1b4d0ac6
SHA5120c18d373781876a61d018c19b0c3060746cc0c9b8d053877a7d7d3427eb64cae33245c9c4074c8150088e617bfc37946868be362ae10f705a2a43b9908be5d4f
-
\Windows\System32\themeui.dllFilesize
2.7MB
MD53350fb97f17d354efaf67bd969b7a0d5
SHA1213bcc525e91dd1cc3e2468d52d51deca6c923aa
SHA256de6abddc242d9debf0d2b89d962a1c45cf41a57f6b9659eeedc6748f1b4d0ac6
SHA5120c18d373781876a61d018c19b0c3060746cc0c9b8d053877a7d7d3427eb64cae33245c9c4074c8150088e617bfc37946868be362ae10f705a2a43b9908be5d4f
-
memory/424-665-0x0000000000000000-mapping.dmp
-
memory/752-624-0x0000000000000000-mapping.dmp
-
memory/992-306-0x0000000000000000-mapping.dmp
-
memory/1048-299-0x0000000000000000-mapping.dmp
-
memory/1440-638-0x0000000000000000-mapping.dmp
-
memory/1708-557-0x0000000000000000-mapping.dmp
-
memory/2272-600-0x0000000000000000-mapping.dmp
-
memory/2500-738-0x0000000000000000-mapping.dmp
-
memory/2804-149-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-165-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-120-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-160-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-891-0x0000000073CD0000-0x0000000073CDA000-memory.dmpFilesize
40KB
-
memory/2804-121-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-164-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-162-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-122-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-186-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-184-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-182-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-181-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-179-0x0000000073CD0000-0x0000000073CDA000-memory.dmpFilesize
40KB
-
memory/2804-178-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-175-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-176-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-159-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-288-0x0000000073CD0000-0x0000000073CDA000-memory.dmpFilesize
40KB
-
memory/2804-123-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-124-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-125-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-174-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-173-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-158-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-157-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-126-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-156-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-155-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-127-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-154-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-153-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-128-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-152-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-151-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-129-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-132-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-136-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-141-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-131-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-144-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-172-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-171-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-170-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-168-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-130-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-147-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-167-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-133-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-150-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-163-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-148-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-146-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-145-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-166-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-143-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-142-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-140-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-161-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-139-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-138-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-137-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-135-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/2804-134-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/3196-543-0x0000000000000000-mapping.dmp
-
memory/3504-189-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/3504-191-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/3504-190-0x0000000077BF0000-0x0000000077D7E000-memory.dmpFilesize
1.6MB
-
memory/3504-187-0x0000000000000000-mapping.dmp
-
memory/3568-467-0x0000000000000000-mapping.dmp
-
memory/4064-297-0x0000000000000000-mapping.dmp
-
memory/4260-475-0x0000000000000000-mapping.dmp
-
memory/4272-424-0x0000000000000000-mapping.dmp
-
memory/4400-661-0x0000000000000000-mapping.dmp
-
memory/4544-666-0x0000000000000000-mapping.dmp
-
memory/4600-375-0x0000000000000000-mapping.dmp
-
memory/4692-296-0x0000000000000000-mapping.dmp
-
memory/4756-298-0x0000000000000000-mapping.dmp