Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/08/2024, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
Flash8-en.exe
Resource
win11-20240802-en
General
-
Target
Flash8-en.exe
-
Size
107.8MB
-
MD5
4366b8abb6c5cf54239954a2e89c4e97
-
SHA1
2b769067954561da9b91b87773fe9f1e2483e296
-
SHA256
2cbf59c93f795175f3c729ac37a25ca3d7482ab50b6475f4647ae8a39abf394f
-
SHA512
ddf30dbfb6504f4ebe6cf7a6cb6280a54bfd98bbd69a246757901b9c3e8d575c90b7a848413e018e6e1006524efd4c0c525094191e489b1f33f05b1a9e3c20b0
-
SSDEEP
3145728:JyDSUW50GQiwf64O298IydrvzjxyKGrVKgVl:JcSD50Piwip298IYrL1yKGsgT
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\ = "Macromedia Shockwave Flash" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Locale = "EN" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Version = "8.0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\ComponentID = "Flash" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000} msiexec.exe -
Executes dropped EXE 9 IoCs
pid Process 4776 FL_Client_Installer.exe 2804 IDriver.exe 3388 IDriver.exe 596 IDriver.exe 2340 IDriver.exe 3116 IDriver.exe 244 IDriver.exe 2484 IDriver.exe 412 IDriver.exe -
Loads dropped DLL 64 IoCs
pid Process 3300 MsiExec.exe 564 regsvr32.exe 3380 regsvr32.exe 2436 regsvr32.exe 5060 regsvr32.exe 5080 regsvr32.exe 2096 regsvr32.exe 3300 MsiExec.exe 3300 MsiExec.exe 3300 MsiExec.exe 3388 IDriver.exe 3388 IDriver.exe 3388 IDriver.exe 3388 IDriver.exe 3388 IDriver.exe 3388 IDriver.exe 3388 IDriver.exe 3388 IDriver.exe 3388 IDriver.exe 3300 MsiExec.exe 3300 MsiExec.exe 3300 MsiExec.exe 3300 MsiExec.exe 4604 MsiExec.exe 2284 regsvr32.exe 4644 regsvr32.exe 4728 regsvr32.exe 2772 regsvr32.exe 4524 regsvr32.exe 4672 regsvr32.exe 4604 MsiExec.exe 4604 MsiExec.exe 4604 MsiExec.exe 2340 IDriver.exe 2340 IDriver.exe 2340 IDriver.exe 2340 IDriver.exe 2340 IDriver.exe 2340 IDriver.exe 2340 IDriver.exe 2340 IDriver.exe 2340 IDriver.exe 4604 MsiExec.exe 4604 MsiExec.exe 4604 MsiExec.exe 4604 MsiExec.exe 5056 MsiExec.exe 5056 MsiExec.exe 4604 MsiExec.exe 4604 MsiExec.exe 4604 MsiExec.exe 4604 MsiExec.exe 3300 MsiExec.exe 3300 MsiExec.exe 2244 MsiExec.exe 2184 regsvr32.exe 3184 regsvr32.exe 2396 regsvr32.exe 1960 regsvr32.exe 1092 regsvr32.exe 2236 regsvr32.exe 2244 MsiExec.exe 2244 MsiExec.exe 2244 MsiExec.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 7 3068 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: FL_Client_Installer.exe File opened (read-only) \??\G: FL_Client_Installer.exe File opened (read-only) \??\S: FL_Client_Installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: FL_Client_Installer.exe File opened (read-only) \??\V: FL_Client_Installer.exe File opened (read-only) \??\X: FL_Client_Installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\B: FL_Client_Installer.exe File opened (read-only) \??\H: FL_Client_Installer.exe File opened (read-only) \??\O: FL_Client_Installer.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: FL_Client_Installer.exe File opened (read-only) \??\U: FL_Client_Installer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: FL_Client_Installer.exe File opened (read-only) \??\L: FL_Client_Installer.exe File opened (read-only) \??\R: FL_Client_Installer.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: FL_Client_Installer.exe File opened (read-only) \??\K: FL_Client_Installer.exe File opened (read-only) \??\Z: FL_Client_Installer.exe File opened (read-only) \??\Y: FL_Client_Installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: FL_Client_Installer.exe File opened (read-only) \??\N: FL_Client_Installer.exe File opened (read-only) \??\Q: FL_Client_Installer.exe File opened (read-only) \??\M: FL_Client_Installer.exe File opened (read-only) \??\W: FL_Client_Installer.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Macromed\Flash\flashplayer.xpt msiexec.exe File created C:\Windows\SysWOW64\Macromed\Flash\FlashAuthor.cfg msiexec.exe File created C:\Windows\SysWOW64\QuickTime\FLV.qtx msiexec.exe File created C:\Windows\SysWOW64\QuickTime\MMxptResources.dll msiexec.exe File created C:\Windows\SysWOW64\Macromed\Flash\Flash8.ocx msiexec.exe File created C:\Windows\SysWOW64\Macromed\Flash\NPSWF32.dll msiexec.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Importers\CMap\Adobe-Korea1-H-Mac msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\FP8\ContextMenuItem.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\FP8\Date.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\mx\controls\streamingmedia\behaviors\NamedFrameCuePointListener.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Mobile\Devices\Nokia_6681\Nokia_6681sd.xml msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\HelpPanel\_sharedassets\shim.gif msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\Samples and Tutorials\Tutorial Assets\Creating Graphics\Timeline Animation\animation_finished.fla msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\ActionsPanel\FlashLite1_1\name.xml msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\mx\controls\Label.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Effects\DropShadow.jsfl msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\Samples and Tutorials\Samples\ActionScript\XML_BlogTracker\xml_blogTracker.fla msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\FP8\AsBroadcaster.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\mx\containers\Window.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\HelpPanel\_sharedassets\icons\eraser.gif msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\HelpPanel\_sharedassets\icons\smoothicon.gif msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\mx\data\types\PhoneNumber.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\Samples and Tutorials\Tutorial Assets\Basic Tasks\Use Layout Tools\layout_tools_start.fla msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\FP7\ContextMenu.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\mx\data\components\datasetclasses\Delta.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Mobile\Devices\Nokia_6681\Nokia_6681.png msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\HelpPanel\_sharedassets\icons\eraseNormal.gif msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Importers\CMap\GBpc-EUC-UCS2C msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Mobile\Devices\DoCoMo_Fujitsu_F901iC.xml msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Skins\SteelOverPlaySeekMute.swf msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Importers\CMap\UCS2-90pv-RKSJ msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Mobile\Devices\Sony-Ericsson_V800\Sony-Ericsson_V800sd.xml msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Mobile\Devices\Nokia_6600\Nokia_6600.png msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Behaviors\Video_RW.xml msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\FP7\Enumeration.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\Players\Debug\Install Flash Player 8 Plugin.msi msiexec.exe File created C:\Program Files (x86)\Macromedia\Extension Manager\msvcr71.dll msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\FP8\PrintJob.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\mx\xpath\FilterExpr.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Importers\CMap\UCS2-GBK-EUC msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\FP7\Math.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Dictionaries\sscenb2.clx msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\mx\data\types\Str.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\mx\managers\SystemManager.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\Samples and Tutorials\Tutorial Assets\Basic Tasks\FlashBanner\Part1\star.png msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\Samples and Tutorials\Tutorial Assets\ActionScript\Work with Objects and Classes\Drag.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Mobile\Devices\Sony_SO506iC\Sony_SO506iC.png msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\HelpPanel\_sharedassets\icons\arrow_style_1_tool.gif msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\HelpPanel\_sharedassets\icons\line_tool.gif msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\XULControls\URLControls.xml msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Importers\CMap\Adobe-CNS1-H-Host msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Skins\ArcticOverPlaySeekMute.swf msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\HelpPanel\_sharedassets\icons\Screen.gif msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\Samples and Tutorials\Samples\Behaviors\BehaviorsScrapbook\image4.jpg msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Importers\CMap\UniGB-UCS2-V msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\SkinFLA\MojaveOverPlaySeekMute.fla msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\Samples and Tutorials\Samples\ActionScript\Galleries\DCP_0746.jpg msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Icons\icon_9.png msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Importers\CMap\GBT-EUC-H msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\HelpPanel\_sharedassets\icons\PubDialogPlusBtn.gif msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Mobile\Devices\KDDI_Hitachi_W31H PENCK.xml msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Tools\PolyStar.jsfl msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Mobile\Devices\Mitsubishi_D505i\Mitsubishi_D505i_active.png msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\mx\core\ScrollView.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\mx\video\NCManager.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Classes\mx\data\formatters\Dte.as msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\HelpPanel\_sharedassets\icons\mediaout.gif msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\First Run\Keyboard Shortcuts\Flash 5.wfx msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Components\Data\RDBMSResolver.swc msiexec.exe File created C:\Program Files (x86)\Macromedia\Flash 8\en\Configuration\Importers\CMap\B5pc-UCS2 msiexec.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Installer\e58059d.msi msiexec.exe File created C:\Windows\SystemTemp\~DFE9CD30717F43B47A.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI2550.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2FD5.tmp msiexec.exe File opened for modification C:\Windows\Installer\{2BD5C305-1B27-4D41-B690-7A61172D2FEB}\READMESHORTCUTICON.ico msiexec.exe File opened for modification C:\Windows\Installer\MSI112A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1FD9.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5805a3.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI286F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2F76.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF79422CD69C4A7140.TMP msiexec.exe File opened for modification C:\Windows\Downloaded Installations\Macromedia Flash 8\FL_Client_Installer.exe Flash8-en.exe File created C:\Windows\SystemTemp\~DF718F7F51B1A4B8D8.TMP msiexec.exe File opened for modification C:\Windows\Installer\e58059e.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2047.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF588CF2DF1E7965C4.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI512E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI31FB.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF24610E9FDFAC0FD7.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI1E7E.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFCF933B3C2BBAEC14.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF251A2D8940C3BB23.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI592F.tmp msiexec.exe File opened for modification C:\Windows\Installer\{5546CDB5-2CE2-498B-B059-5B3BF81FC41F}\EMARPPRODUCTICON.exe msiexec.exe File created C:\Windows\SystemTemp\~DF0A4DBDC61412FA67.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI23A8.tmp msiexec.exe File created C:\Windows\Installer\e5805ae.mst msiexec.exe File opened for modification C:\Windows\Installer\MSI12A3.tmp msiexec.exe File opened for modification C:\Windows\Downloaded Installations\Macromedia Flash 8\Data1.cab Flash8-en.exe File opened for modification C:\Windows\Installer\MSI1DE1.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5805a8.msi msiexec.exe File created C:\Windows\SystemTemp\~DFB4ADE85A2CDD8546.TMP msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI10BB.tmp msiexec.exe File created C:\Windows\Installer\e5805a2.msi msiexec.exe File created C:\Windows\SystemTemp\~DFF96F05F8B90036FC.TMP msiexec.exe File created C:\Windows\Installer\e5805a7.msi msiexec.exe File created C:\Windows\Installer\e5805ad.msi msiexec.exe File created C:\Windows\SystemTemp\~DF3A621B281E8FF60B.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI115A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI15C2.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{885A63EA-382B-4DD4-A755-14809B8557D6} msiexec.exe File opened for modification C:\Windows\Installer\MSI314E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF81.tmp msiexec.exe File created C:\Windows\Installer\{5546CDB5-2CE2-498B-B059-5B3BF81FC41F}\EMARPPRODUCTICON.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIAA5E.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFBC62AF19B0EA16D3.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF1ECA10A8C8ED9BBA.TMP msiexec.exe File opened for modification C:\Windows\Installer\{2BD5C305-1B27-4D41-B690-7A61172D2FEB}\ARPPRODUCTICONFL8.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIABB8.tmp msiexec.exe File created C:\Windows\Installer\{8BF2C401-02CE-424D-BC26-6C4F9FB446B6}\ARPPRODUCTICONFLV1.exe msiexec.exe File opened for modification C:\Windows\Installer\{8BF2C401-02CE-424D-BC26-6C4F9FB446B6}\ARPPRODUCTICONFLV1.exe msiexec.exe File created C:\Windows\SystemTemp\~DF7C572FE26D23E6D0.TMP msiexec.exe File created C:\Windows\Installer\e5805ac.msi msiexec.exe File opened for modification C:\Windows\Installer\e580599.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI616.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF263A10384863FAA2.TMP msiexec.exe File opened for modification C:\Windows\Installer\e5805ad.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF70.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5805ae.mst msiexec.exe File opened for modification C:\Windows\Installer\MSI266B.tmp msiexec.exe File created C:\Windows\Downloaded Installations\Macromedia Flash 8\FL_Client_Installer.exe Flash8-en.exe File created C:\Windows\Downloaded Installations\Macromedia Flash 8\Macromedia Flash 8.msi Flash8-en.exe File created C:\Windows\Downloaded Installations\Macromedia Flash 8\WindowsInstaller-KB884016-v2-x86.exe Flash8-en.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3652 3388 WerFault.exe 95 3104 2340 WerFault.exe 108 1932 244 WerFault.exe 122 4992 412 WerFault.exe 137 -
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flash8-en.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FL_Client_Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}\ msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Compatibility Flags = "0" msiexec.exe -
Modifies data under HKEY_USERS 7 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\28 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\29 msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ABC466D7-B7AD-4872-8C72-ED582EF279CE}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{78994A88-276B-4F15-BAF6-FB4CD3F9E223}\ = "ISetupReboot2" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DED5FE20-27D3-4F38-8DF3-93659038C417}\ = "IInstallDriverStringTable" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E4FB44E-D416-4243-B811-8E116F9CE39A}\InProcServer32\ = "C:\\PROGRA~2\\COMMON~1\\INSTAL~1\\Driver\\10\\INTEL3~1\\objpscnv.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D1B3880C-54D7-4FE4-8B1B-DA5419081EF1}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{10A6F82A-09E1-4BD1-8231-4B9120AEDAFA} IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppId\{24D495A5-A174-4945-819D-CF294600C500} IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Flash.JSCommandFile\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F26F1EB5-850C-4AF9-BAFD-F388686C21B5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2E30AE6C-8796-4207-968E-FAEFC5DD1818}\ProxyStubClsid32 IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FE238E7E-00DB-4349-9949-2A10E52A6F68}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8919C3B9-E8FF-43A7-86B3-FA09E0201947}\TypeLib\Version = "1.0" IDriver.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5BDC64552EC2B8940B95B5B38FF14CF1\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ABC466D7-B7AD-4872-8C72-ED582EF279CE}\TypeLib IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{82B47390-3D18-4100-B967-7790E0199744}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A351BCFD-F07F-48CB-91A0-AF69317D9D6D}\ProxyStubClsid32\ = "{1E4FB44E-D416-4243-B811-8E116F9CE39A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1F4F8765-2131-46E5-8621-08517089ACE6}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{023F4789-ADC1-4030-9DE3-7ED7F57EA2CA}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ISInstallDriver.InstallDriver IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ABC466D7-B7AD-4872-8C72-ED582EF279CE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B23DEBC2-3C5C-47A6-8FF8-148132D193F4}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\503C5DB272B114D46B09A71671D2F2BE\Flash msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{06DAA70F-FCCD-44E1-A676-716E6234C189}\TypeLib IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5FC8AC65-FD78-4439-90A2-291175681698}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ISInstallDriver.StringTable\ = "InstallShield InstallDriver String Table" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5886B1FD-4C9E-41DF-9098-9A1AB8F02AA9}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FC892E93-C765-4E5B-AE0C-BA2476655532}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DED5FE20-27D3-4F38-8DF3-93659038C417}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash\CurVer\ = "ShockwaveFlash.ShockwaveFlash.8" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{85D3BD85-0A91-438D-B2F9-BC4E31A5DB34}\ = "ISetupFeatures" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F31ADE0D-9319-4067-829A-107D25C1C131}\TypeLib IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2F653E7D-0010-4751-BD83-92EA472E641F}\ = "ISetupStringTable" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\FLAGS\ = "0" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\503C5DB272B114D46B09A71671D2F2BE\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9E8176B8-C130-49DA-AB56-F3378E54ADFD}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{65CD17AF-CCEE-4CD6-B304-A3BD48237B67}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MacromediaFlashPaper.MacromediaFlashPaper\DefaultIcon MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{65CD17AF-CCEE-4CD6-B304-A3BD48237B67}\ProxyStubClsid32 IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{46715E70-0B7D-45BA-A447-AA0951073C78}\ = "ISetupScriptEngine2" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Macromedia.Extension.Package\shell\Open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF0996A6-75B5-457D-B417-49B5FBF97E73} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D354A092-4A8E-4077-A738-8314F6BA0DE6}\ = "ISetupProgress3" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\IDriver2.EXE\AppID = "{D71CBC24-F638-4606-9023-E11891FA52D7}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5886B1FD-4C9E-41DF-9098-9A1AB8F02AA9}\TypeLib IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FA5380BC-76C8-4AD6-A4C4-6F6CB5F32CAE}\TypeLib IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DF2062B2-540A-4B48-A2C7-ABA0B49D44B9}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DBBC99EB-259B-4CD3-B167-3D75539D9E9C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1F74B51C-963F-420E-90FA-FD96FA7712DC} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{566BECBB-A8DF-43EA-8D44-77BCC7B72F21}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\EnableFullPage\.spl MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-shockwave-flash\CLSID = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{06FC2BEF-62EE-4724-8FEB-64C73B939BA3}\ = "ISetupObjects" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9CBF197F-754C-4011-9019-1C632FD2897A} IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4C514B88-F041-4813-82C0-C6BB0627BC3E}\TypeLib IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D1B3880C-54D7-4FE4-8B1B-DA5419081EF1} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9DFAFFD-B547-4387-992F-E5863D4D7E17}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{82B47390-3D18-4100-B967-7790E0199744}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{738891D7-3A18-4839-A5E7-EFD2E7DE002A}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4D3EF9D-0157-4C5F-A74B-BAEE5D6ED3AE}\ = "IMSIMsgHandler" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.7\CLSID MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0624352B-E86A-48B9-B23D-D4BEDA6DF1D9}\ = "ISetupCABFiles" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF0996A6-75B5-457D-B417-49B5FBF97E73}\LocalServer32 IDriver.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2 FL_Client_Installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2\Blob = 5c0000000100000004000000000400007e0000000100000008000000000010c51e92d201620000000100000020000000e7685634efacf69ace939a6b255b7b4fabef42935b50a265acb5cb6027e44e7009000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030119000000010000001000000091161b894b117ecdc257628db460cc04030000000100000014000000742c3192e607e424eb4549542be1bbc53e6174e21d000000010000001000000027b3517667331ce2c1e74002b5ff2298140000000100000014000000e27f7bd877d5df9e0a3f9eb4cb0e2ea9efdb69770b000000010000004600000056006500720069005300690067006e00200043006c006100730073002000330020005000750062006c006900630020005000720069006d00610072007900200043004100000004000000010000001000000010fc635df6263e0df325be5f79cd67670f0000000100000010000000d7c63be0837dbabf881d4fbf5f986ad853000000010000002400000030223020060a2b0601040182375e010130123010060a2b0601040182373c0101030200c07a000000010000000e000000300c060a2b0601040182375e010268000000010000000800000000003db65bd9d5012000000001000000400200003082023c308201a5021070bae41d10d92934b638ca7b03ccbabf300d06092a864886f70d0101020500305f310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e31373035060355040b132e436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479301e170d3936303132393030303030305a170d3238303830313233353935395a305f310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e31373035060355040b132e436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f7269747930819f300d06092a864886f70d010101050003818d0030818902818100c95c599ef21b8a0114b410df0440dbe357af6a45408f840c0bd133d9d911cfee02581f25f72aa84405aaec031f787f9e93b99a00aa237dd6ac85a26345c77227ccf44cc67571d239ef4f42f075df0a90c68e206f980ff8ac235f702936a4c986e7b19a20cb53a585e73dbe7d9afe244533dc7615ed0fa271644c652e816845a70203010001300d06092a864886f70d010102050003818100bb4c122bcf2c26004f1413dda6fbfc0a11848cf3281c67922f7cb6c5fadff0e895bc1d8f6c2ca851cc73d8a4c053f04ed626c076015781925e21f1d1b1ffe7d02158cd6917e3441c9c194439895cdc9c000f568d0299eda290454ce4bb10a43df032030ef1cef8e8c9518ce6629fe69fc07db7729cc9363a6b9f4ea8ff640d64 FL_Client_Installer.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3068 msiexec.exe 3068 msiexec.exe 3068 msiexec.exe 3068 msiexec.exe 3068 msiexec.exe 3068 msiexec.exe 3068 msiexec.exe 3068 msiexec.exe 3068 msiexec.exe 3068 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4776 FL_Client_Installer.exe Token: SeIncreaseQuotaPrivilege 4776 FL_Client_Installer.exe Token: SeSecurityPrivilege 3068 msiexec.exe Token: SeCreateTokenPrivilege 4776 FL_Client_Installer.exe Token: SeAssignPrimaryTokenPrivilege 4776 FL_Client_Installer.exe Token: SeLockMemoryPrivilege 4776 FL_Client_Installer.exe Token: SeIncreaseQuotaPrivilege 4776 FL_Client_Installer.exe Token: SeMachineAccountPrivilege 4776 FL_Client_Installer.exe Token: SeTcbPrivilege 4776 FL_Client_Installer.exe Token: SeSecurityPrivilege 4776 FL_Client_Installer.exe Token: SeTakeOwnershipPrivilege 4776 FL_Client_Installer.exe Token: SeLoadDriverPrivilege 4776 FL_Client_Installer.exe Token: SeSystemProfilePrivilege 4776 FL_Client_Installer.exe Token: SeSystemtimePrivilege 4776 FL_Client_Installer.exe Token: SeProfSingleProcessPrivilege 4776 FL_Client_Installer.exe Token: SeIncBasePriorityPrivilege 4776 FL_Client_Installer.exe Token: SeCreatePagefilePrivilege 4776 FL_Client_Installer.exe Token: SeCreatePermanentPrivilege 4776 FL_Client_Installer.exe Token: SeBackupPrivilege 4776 FL_Client_Installer.exe Token: SeRestorePrivilege 4776 FL_Client_Installer.exe Token: SeShutdownPrivilege 4776 FL_Client_Installer.exe Token: SeDebugPrivilege 4776 FL_Client_Installer.exe Token: SeAuditPrivilege 4776 FL_Client_Installer.exe Token: SeSystemEnvironmentPrivilege 4776 FL_Client_Installer.exe Token: SeChangeNotifyPrivilege 4776 FL_Client_Installer.exe Token: SeRemoteShutdownPrivilege 4776 FL_Client_Installer.exe Token: SeUndockPrivilege 4776 FL_Client_Installer.exe Token: SeSyncAgentPrivilege 4776 FL_Client_Installer.exe Token: SeEnableDelegationPrivilege 4776 FL_Client_Installer.exe Token: SeManageVolumePrivilege 4776 FL_Client_Installer.exe Token: SeImpersonatePrivilege 4776 FL_Client_Installer.exe Token: SeCreateGlobalPrivilege 4776 FL_Client_Installer.exe Token: SeCreateTokenPrivilege 4776 FL_Client_Installer.exe Token: SeAssignPrimaryTokenPrivilege 4776 FL_Client_Installer.exe Token: SeLockMemoryPrivilege 4776 FL_Client_Installer.exe Token: SeIncreaseQuotaPrivilege 4776 FL_Client_Installer.exe Token: SeMachineAccountPrivilege 4776 FL_Client_Installer.exe Token: SeTcbPrivilege 4776 FL_Client_Installer.exe Token: SeSecurityPrivilege 4776 FL_Client_Installer.exe Token: SeTakeOwnershipPrivilege 4776 FL_Client_Installer.exe Token: SeLoadDriverPrivilege 4776 FL_Client_Installer.exe Token: SeSystemProfilePrivilege 4776 FL_Client_Installer.exe Token: SeSystemtimePrivilege 4776 FL_Client_Installer.exe Token: SeProfSingleProcessPrivilege 4776 FL_Client_Installer.exe Token: SeIncBasePriorityPrivilege 4776 FL_Client_Installer.exe Token: SeCreatePagefilePrivilege 4776 FL_Client_Installer.exe Token: SeCreatePermanentPrivilege 4776 FL_Client_Installer.exe Token: SeBackupPrivilege 4776 FL_Client_Installer.exe Token: SeRestorePrivilege 4776 FL_Client_Installer.exe Token: SeShutdownPrivilege 4776 FL_Client_Installer.exe Token: SeDebugPrivilege 4776 FL_Client_Installer.exe Token: SeAuditPrivilege 4776 FL_Client_Installer.exe Token: SeSystemEnvironmentPrivilege 4776 FL_Client_Installer.exe Token: SeChangeNotifyPrivilege 4776 FL_Client_Installer.exe Token: SeRemoteShutdownPrivilege 4776 FL_Client_Installer.exe Token: SeUndockPrivilege 4776 FL_Client_Installer.exe Token: SeSyncAgentPrivilege 4776 FL_Client_Installer.exe Token: SeEnableDelegationPrivilege 4776 FL_Client_Installer.exe Token: SeManageVolumePrivilege 4776 FL_Client_Installer.exe Token: SeImpersonatePrivilege 4776 FL_Client_Installer.exe Token: SeCreateGlobalPrivilege 4776 FL_Client_Installer.exe Token: SeCreateTokenPrivilege 4776 FL_Client_Installer.exe Token: SeAssignPrimaryTokenPrivilege 4776 FL_Client_Installer.exe Token: SeLockMemoryPrivilege 4776 FL_Client_Installer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4776 FL_Client_Installer.exe 4776 FL_Client_Installer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1028 wrote to memory of 4776 1028 Flash8-en.exe 83 PID 1028 wrote to memory of 4776 1028 Flash8-en.exe 83 PID 1028 wrote to memory of 4776 1028 Flash8-en.exe 83 PID 3068 wrote to memory of 3300 3068 msiexec.exe 87 PID 3068 wrote to memory of 3300 3068 msiexec.exe 87 PID 3068 wrote to memory of 3300 3068 msiexec.exe 87 PID 3300 wrote to memory of 564 3300 MsiExec.exe 88 PID 3300 wrote to memory of 564 3300 MsiExec.exe 88 PID 3300 wrote to memory of 564 3300 MsiExec.exe 88 PID 3300 wrote to memory of 2804 3300 MsiExec.exe 89 PID 3300 wrote to memory of 2804 3300 MsiExec.exe 89 PID 3300 wrote to memory of 2804 3300 MsiExec.exe 89 PID 3300 wrote to memory of 3380 3300 MsiExec.exe 90 PID 3300 wrote to memory of 3380 3300 MsiExec.exe 90 PID 3300 wrote to memory of 3380 3300 MsiExec.exe 90 PID 3300 wrote to memory of 2436 3300 MsiExec.exe 91 PID 3300 wrote to memory of 2436 3300 MsiExec.exe 91 PID 3300 wrote to memory of 2436 3300 MsiExec.exe 91 PID 3300 wrote to memory of 5060 3300 MsiExec.exe 92 PID 3300 wrote to memory of 5060 3300 MsiExec.exe 92 PID 3300 wrote to memory of 5060 3300 MsiExec.exe 92 PID 3300 wrote to memory of 5080 3300 MsiExec.exe 93 PID 3300 wrote to memory of 5080 3300 MsiExec.exe 93 PID 3300 wrote to memory of 5080 3300 MsiExec.exe 93 PID 3300 wrote to memory of 2096 3300 MsiExec.exe 94 PID 3300 wrote to memory of 2096 3300 MsiExec.exe 94 PID 3300 wrote to memory of 2096 3300 MsiExec.exe 94 PID 3388 wrote to memory of 1256 3388 IDriver.exe 99 PID 3388 wrote to memory of 1256 3388 IDriver.exe 99 PID 3388 wrote to memory of 1256 3388 IDriver.exe 99 PID 3068 wrote to memory of 4604 3068 msiexec.exe 100 PID 3068 wrote to memory of 4604 3068 msiexec.exe 100 PID 3068 wrote to memory of 4604 3068 msiexec.exe 100 PID 4604 wrote to memory of 2284 4604 MsiExec.exe 101 PID 4604 wrote to memory of 2284 4604 MsiExec.exe 101 PID 4604 wrote to memory of 2284 4604 MsiExec.exe 101 PID 4604 wrote to memory of 596 4604 MsiExec.exe 102 PID 4604 wrote to memory of 596 4604 MsiExec.exe 102 PID 4604 wrote to memory of 596 4604 MsiExec.exe 102 PID 4604 wrote to memory of 4644 4604 MsiExec.exe 103 PID 4604 wrote to memory of 4644 4604 MsiExec.exe 103 PID 4604 wrote to memory of 4644 4604 MsiExec.exe 103 PID 4604 wrote to memory of 4728 4604 MsiExec.exe 104 PID 4604 wrote to memory of 4728 4604 MsiExec.exe 104 PID 4604 wrote to memory of 4728 4604 MsiExec.exe 104 PID 4604 wrote to memory of 2772 4604 MsiExec.exe 105 PID 4604 wrote to memory of 2772 4604 MsiExec.exe 105 PID 4604 wrote to memory of 2772 4604 MsiExec.exe 105 PID 4604 wrote to memory of 4524 4604 MsiExec.exe 106 PID 4604 wrote to memory of 4524 4604 MsiExec.exe 106 PID 4604 wrote to memory of 4524 4604 MsiExec.exe 106 PID 4604 wrote to memory of 4672 4604 MsiExec.exe 107 PID 4604 wrote to memory of 4672 4604 MsiExec.exe 107 PID 4604 wrote to memory of 4672 4604 MsiExec.exe 107 PID 3068 wrote to memory of 5056 3068 msiexec.exe 111 PID 3068 wrote to memory of 5056 3068 msiexec.exe 111 PID 3068 wrote to memory of 5056 3068 msiexec.exe 111 PID 3388 wrote to memory of 3960 3388 IDriver.exe 112 PID 3388 wrote to memory of 3960 3388 IDriver.exe 112 PID 3388 wrote to memory of 3960 3388 IDriver.exe 112 PID 3068 wrote to memory of 2244 3068 msiexec.exe 113 PID 3068 wrote to memory of 2244 3068 msiexec.exe 113 PID 3068 wrote to memory of 2244 3068 msiexec.exe 113 PID 2244 wrote to memory of 2184 2244 MsiExec.exe 115 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Flash8-en.exe"C:\Users\Admin\AppData\Local\Temp\Flash8-en.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\Downloaded Installations\Macromedia Flash 8\FL_Client_Installer.exe"C:\Windows\Downloaded Installations\Macromedia Flash 8\FL_Client_Installer.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4776
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Boot or Logon Autostart Execution: Active Setup
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E3D0280776140E066CA18891DD6CD7A4 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\_ISRES~1.DLL"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:564
-
-
C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IDriver.exe"C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IDriver.exe" /RegServer3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2804
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IUserCnv.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3380
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\ISRT.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\objpscnv.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5060
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IScrCnv.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5080
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\iGdiCnv.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A624CAD025A1A5004B38BFD13027F4EC2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\_ISRES~1.DLL"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IDriver.exe"C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IDriver.exe" /RegServer3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:596
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IUserCnv.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\ISRT.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\objpscnv.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2772
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IScrCnv.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4524
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\iGdiCnv.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4672
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A9D04B26C1C7A35B26B2742922F29392 E Global\MSI00002⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5056
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3B5CCAFC4BDB0DD0076FC197E2138A612⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\_ISRES~1.DLL"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IDriver.exe"C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IDriver.exe" /RegServer3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3116
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IUserCnv.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3184
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\ISRT.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\objpscnv.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IScrCnv.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1092
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\iGdiCnv.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2236
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E96A7E7082AAC3FAF2ACDD864759BC5A E Global\MSI00002⤵
- System Location Discovery: System Language Discovery
PID:3104
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1733108D4A240511E2FA297AF54C32A32⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1592
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A8C2E452E26E1FEC7FE65BCF9CF698F72⤵
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\_ISRES~1.DLL"3⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IDriver.exe"C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IDriver.exe" /RegServer3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2484
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IUserCnv.dll"3⤵
- System Location Discovery: System Language Discovery
PID:5040
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\ISRT.dll"3⤵
- System Location Discovery: System Language Discovery
PID:3156
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\objpscnv.dll"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4280
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IScrCnv.dll"3⤵
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\iGdiCnv.dll"3⤵
- System Location Discovery: System Language Discovery
PID:388
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:2136
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EFDC93FBF7A39270E65A9215A7C2D5222⤵
- System Location Discovery: System Language Discovery
PID:2076
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding BAA37957E1C917C1E76E11A92B868314 E Global\MSI00002⤵
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IDriver.exeC:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IDriver.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 11682⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i C:\Users\Admin\AppData\Local\Temp\{2BD5C305-1B27-4D41-B690-7A61172D2FEB}\Macromedia_Extension_Manager.msi /qn MM_STUDIO=0 MACROMEDIA="C:\Program Files (x86)\Macromedia"2⤵
- System Location Discovery: System Language Discovery
PID:1256
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\{2BD5C305-1B27-4D41-B690-7A61172D2FEB}\Macromedia Flash 8 Video Encoder.msi" /qn MM_STUDIO=0 MACROMEDIA="C:\Program Files (x86)\Macromedia"2⤵
- System Location Discovery: System Language Discovery
PID:3960
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\{2BD5C305-1B27-4D41-B690-7A61172D2FEB}\Install Flash Player 8 ActiveX.msi" /qn MM_STUDIO=0 MACROMEDIA="C:\Program Files (x86)\Macromedia"2⤵
- System Location Discovery: System Language Discovery
PID:3924
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\{2BD5C305-1B27-4D41-B690-7A61172D2FEB}\Install Flash Player 8 Plugin.msi" /qn MM_STUDIO=0 MACROMEDIA="C:\Program Files (x86)\Macromedia"2⤵
- System Location Discovery: System Language Discovery
PID:988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3388 -ip 33881⤵PID:2184
-
C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IDriver.exeC:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IDriver.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 11962⤵
- Program crash
PID:3104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2340 -ip 23401⤵PID:1904
-
C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IDriver.exeC:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IDriver.exe -Embedding1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 244 -s 11802⤵
- Program crash
PID:1932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 244 -ip 2441⤵PID:1860
-
C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IDriver.exeC:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IDriver.exe -Embedding1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 11762⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 412 -ip 4121⤵PID:4708
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5657822cc9b0a6080a86fe4ad1e0b9120
SHA15187c232ae2c5a4be8a7ae3cfc25ca594b7f9f29
SHA256cd6b902dd06839f65702381ebf89e464778a23551c16b62d9384efbc1f5b0a68
SHA51220ed5a762741ea12cea19f4ff315fb36493649115df6da4de6f3fed203d79a1fcae4b1c3c41158ad037e2f58da873032c5d67d0ab51284e301ba28ca07b0442d
-
Filesize
12KB
MD5c9c4e860b1760970d20ef981ed3cca8e
SHA16ecebd178e797b8db8a38d5798529030aeed5f1d
SHA256ceafd20249f53c53b0b9c37d12995782cd46eaf03314cddda850633e96643457
SHA512fb17723ab778e2e5f4ea3f792e79d8101be685cd482793b5bc886e20d5a63dcc7329fae62b15cfce9fbc7e91e656cb080b6c339bff7e351f1b15097c02d6d434
-
Filesize
10KB
MD5e11b40485f7fc00b09304466a5ef5a12
SHA1ac1d41437653bf39ac3d5c99d8769161acc68665
SHA2564dacde46bbef4e2525c7cafc1be6ffc4b1914d1d5f4d8eaca40dca07e64a6a15
SHA5122591ea51be20735e0a6fe40ff877317c14c54c8fd1219e63eff63fae7bb50c7c01090390dabd13b1d086276de4c27f85b4de67eee6add000759273563daf8bee
-
Filesize
9KB
MD579d9cc105f5b631c373cb8aabd3f94dc
SHA1dca4e9f040d22e08ceaa656f346d0e4402475cf3
SHA256a371355713eb5f64a53caf3042cf71f4e5eadd9f1e60f11f95f18572e2b74874
SHA512e68deb058207d09cb4394e6c9c053958656367fc2bd28f0962887af3d89fcf5dbd7857465207497b631b28795715cac9caaf46d0ab8c7bc58879ba6accd1ee75
-
Filesize
894KB
MD54a85e59ac36651b2aec17e0edb3c0460
SHA1b7e88154a6723ec2c4fdd05c4d194fa76257a6c6
SHA256096bf89fb7ab72252743d8334c6313d2c350f01ba16e9f4dbbdeaf19aa22771e
SHA51261948d258de7a104ba76adf36030775b9009935b52d556e0fc676f971aba3adc0662092220d8fc82a26c940079660012c1440018d0721472422ed9cec9d0f6db
-
Filesize
744KB
MD5a9d3658c5be72816812a5a32e4560ba3
SHA1649003292ee74d2407fae441fb92b605a0d91f90
SHA256b2527d1e2297506796f898e90907fb4c8c7e063f2898194e74152fa9ca21923f
SHA512b80283aafbe8cd59720979d51a5524a1d53b001e59c6fe9693c754b238101ac6058122130e0be97ce22dc4f7edce9cd84aa4fde869bf728cff8fba1733638c5b
-
Filesize
32KB
MD5aba70b81a5811e7b140271595d66f06f
SHA142ef824151e67cf921d861d83872c9ef13b500e6
SHA25626d4765c2461fccd669e455d33659397d6f82fe261ece256c3f19b831dcfa0ba
SHA5128780d68124e309b8ec2dbbbac18be3291fefabfd6ed9154645eddfb4dd8076e2fda97168d7c5ea9b378b54ee900f75bd409736cfc1262e0d167e0ff62078de0a
-
Filesize
528KB
MD58f287079d126ad3b2487d704844ce497
SHA1c42c7b96714750c497ae9bc2a4d4c64141ea7058
SHA25614d8231e716b79e66d2ef1a971f74ff6244af0c89717977e7131e7cf7de2072b
SHA512f56e39852fb60ce94a7040644c5368cb15110b56e5b774edea14c4f2286d2087191276b4af860b320fe875f72f8df5214457ea12a7152e419b8848e578ffff54
-
Filesize
744KB
MD55e73b8fb3ddbba8565d9c4705c14ba3d
SHA1ffce57f44298ebfea425f42696227054d5c5cd0b
SHA256e398cb00486e49de8f3dfa278cce395fd4c02a4795fb61b2e73653cbcdb75eea
SHA5128bc0261c0a92d9caa76ec90583ea01a4ab743a084f0e4e0f6debdaf0bfdc252d95d6929e3ec66be5ad95ae593685fb50da2b9be0a1d457b8acb7c137e3cdab79
-
Filesize
168KB
MD507096e9f097b44b3c24c15a6724de866
SHA1a4cd6828554e295d0758ef2e35e35b0569afd44a
SHA256820a03405d4a7a0ddc20f7be3c79266d1bbc6a7778c791c6de260ac9c51e77ec
SHA5122f3e7ce2b0d51100b2a61b5b0d4a3b5434095a411f92360818a0e3926d6203e85ec2b54d4a5ac01405aeaf1a570dc1d5a088f1654210d7cdbacae5b566092e6e
-
Filesize
400KB
MD522ee6fa7a604a5e7298acd95bc7c80f7
SHA131e6809bd9929b594d087b7cac8558b8117484c9
SHA256dce057a7eeea266a1cbc630505d08eed458284b30e25dab4f7c7ae142835b660
SHA5123e13f7e2032228f1d6a84566b49cb5aa6845ee9bcc83d350eba382492db19c3cdeac8ab75ea285b1b1f285c373fc829a2c9571b0b64e22c216470875458a56a5
-
Filesize
32KB
MD53f84ebead9f9dbbaeb27bac67e585c17
SHA187ec9c20274e6b48e75fd0e3e12df0bdc263d1dd
SHA256dbe6d61dbd15894aa2a304d36c2a6ec0e8e3e78438df35124ba2bd58df9e6e6a
SHA5124a64a0d9fc37f96a045652c67f48fdc943ccd4b84c6c81dc9571ed20105ca7e8bbbe4a46c849d9fa6d9e27c04254de85a044e1a8e8be7ba1ac0bb4f2e6ed8fe9
-
Filesize
256KB
MD5926a5bfcf2173b178a4d080d47efbf2a
SHA1c24a62c2b26e12879a9c013c3d0b8054828e8ac5
SHA25602a761aa2c05fe1b3f95284557bd55ac9d6a82ab72a18de70dac1820c6f03751
SHA5124a5fe52827068e9852e65a5570c105b183fa35dba342e715850ada258cb440b033dcc47047b59eac83401d9690979f661c77200fae0ea69a9944558b5265b1b3
-
Filesize
176KB
MD5771bd5c8b8f219f5d9af0cb1a406a399
SHA11ded7e1eaeba25961aca784174f05755f6770a31
SHA256aa86d6fa20a0be2d41aec48a47b5d94f316acb4c4b7d8c6054d9988b27d108d7
SHA5125c843ddfee3a808bf4ba189243cda130557d7527416636a00586818ffa73b941fb0a34024966fb3316f6c913e73f2615927606258288dbb821736aeb645cfd39
-
C:\ProgramData\Macromedia\Flash 8\en\Configuration\HelpPanel\Help\FlashLiteGettingStarted\help_index.html
Filesize211B
MD59e9cbe0e9fba744c428efd518630fc6e
SHA1deb7080609d1ebdba5c147f58cf91630a3f95f23
SHA256dfa7355ebb49e0f36e287487a9555d1e2231644d394e86d28a36077448600b57
SHA512f3462e9f9f5dcbc9e420a9c41abf3f9e323f53071e26093a5f9e6f9b3229ddd159c9421d1a2e84c6af2d3e0c8a3ccd4c07265277e17c77797a6f738cea910940
-
C:\ProgramData\Macromedia\Flash 8\en\Configuration\HelpPanel\Help\FlashLiteGettingStarted\images\000_titlepager.jpg
Filesize1KB
MD5250018f0885104e38757e92784719566
SHA12250285c2774754c19ff81aadd55826d9c86afda
SHA256fa9560640a1d41f76ae8d0ca4d92c23a04c61c77b75119b561d2515d2f3d103a
SHA512762f5624feda5320bca6fee09f9bdadfcc956ff7ea66817eae082c5fb87998100f6bfa09dd971c99b9c52e93c41c6281b79a66c5fd0f34f578d624d9ca1b0b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_1D7D62F1001EE8A81D1AB699EF682B11
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
76KB
MD5de19ccdac19f2e454719f3f59e51169c
SHA10479204efaa2076d5c12dca17ea2c37154aeb1fe
SHA25683cc9b0d75ce4a843f28f79fe9471aac8e34ae3683484c9cb024e2292d432662
SHA512c4f09a76e60ebdfb13ecc3f5e07c4440259514ad130e9aef70d844097988d8f010d64c818d74c56e2fd56696bf118e5a81e7e0726f9f879070972b75f3de8f1b
-
Filesize
108KB
MD59478ddb628b317ce7e95097511cd898b
SHA11edc57f15628fbd5bc86d0a480f89b027984be4a
SHA256970d8dbed67b3fd79e20077ab80650f9851985c6179d8d71f9108526c9303cf4
SHA512794a9659d929390c15aff8e72f2b241f75c463dd17a3783530b1590ddf8a857e8335d81e9e2ca63bb32fb5e7fefa96848d6fa240d563fb50b02a8fb925cafd92
-
Filesize
48KB
MD5fa13aa9996fe8d85aa680e9f5e4f23e8
SHA1cbc23243a9a595b6d91431c4c275c1ab2adc6642
SHA2568f40c1dc28323a3c5310bf21372b9756ca547c20c7cf63197e071a9e1e66b31b
SHA5129f4bd08583dbaadaec281d05d79c11a1dc1651d2d96cc4ecddd68e74178c3eec843e43bea14c546ba18b371177684dde0c21211e8fdb0369bbeeb5e31fdbe87e
-
Filesize
5KB
MD59efcc61a0baa38a6d7c67a05a97c7b87
SHA172b713a72ef7e972dfd5be5f79da8e9aacedb296
SHA2567ccb3a50ca08c66a220e4da614cbaba1d05157359edd174223c788b86d929edf
SHA512ac57100b76826af9f7650417dd765c23b522e31a1f3b44bfe9e70ed520bf6c6eb1978118a8147c99487b05a7a4c4afc964f457b79f921ff8236e4d60561b1238
-
Filesize
362B
MD562361c106b120e78aef61d7268519d65
SHA10ecb7b4a2d3238572422189224f919153e5114f6
SHA2568ae30a64aed3b28ff365066f1e435d0b182b1897738ee07d31c62c315a8ed58a
SHA512d896bd2919bb87bde1c153f478a68f618c3112206681a9b8e7044fd754802cd4c8863b5449333ddc5fc7f6df71c16adfa1b52d19723bc4429d24a7805b13114c
-
C:\Users\Admin\AppData\Local\Temp\{2BD5C305-1B27-4D41-B690-7A61172D2FEB}\Macromedia_Extension_Manager.msi
Filesize5.6MB
MD5bcc9728f9fca259d8e3bcc330949209f
SHA1d32dc74cf5464d9e9b391ccbe161b14a66fe56ec
SHA256dfedb15dab49a8f335ffb6117e04d4baca09639c685b3040e4d38cac97ab30bb
SHA512310429dd09f64228f20875f676b43c330bad4cc97c9c26e09ae9f18b7b7a051849df933810a2ed6f885266ab38a24d9fa6cbec0aacfee812ffc903c2e5f5305d
-
Filesize
95KB
MD5f546ab518190982e7b91367f3606d3ad
SHA19abe582e10a1fb3b2dbde084e7aea785ff6a23ac
SHA256cdc1fae9e2d849f46110f4561f1698bcd5b557a8cf573bc08cad6e08b6dea55f
SHA512d4a36a0f71fa862857fb1553cde41c1c61245494938d1f24feded2159db3472e50442a50ec3d56f07271ab6941fa5caffbd2ea70bd67cef97a12b17ed3be4dac
-
Filesize
287KB
MD520b1f50b5760bd1c3510690a350a5432
SHA18a0289cb8ccee48b0c259106c5b50ea09cf8ae02
SHA2562b69e53eaa83a483d8b2ab80f88a396f050a34dda0a84bd75b03f1d2ad840094
SHA5126df7f078fae20699f3c0221835a99fd039cfcf08dc3ee2ec899025e562e38401ff5a709872134c9b47d35bdbd2cec2215676909a4a007b9af75e9b6d602fa4f6
-
Filesize
239KB
MD52d7444437af5a4990f6f6daca3518d6b
SHA1b0394b5e153d95dae267985e9ae4fc5459f2eb00
SHA2564c235afa7c5a5f1d6aac5681836562b561be6bb5f91e7eaee1598e91c5ce5b7b
SHA5123ab7b5fe01610af498602b03b69f20d1788c2296c22d7385633a6f3403507828d31784c6b9be43a6fa53e273a152be4aa36e9529e7b6e6cfca2120d8e47e39bd
-
Filesize
400KB
MD5db28ca3ba3c2045aa7b6e59aa9831c68
SHA155b44ea55f3a04b916339c81e1cc3f3db62d54cc
SHA256ca41725fb64338211a9f9740f45f1b0c4d80e6c7e84a1d2e5580dcecbf87e489
SHA51282c409611e61acad6b2986372ff72682e611b7ee5a88e74fec9c7864ce50c7494adba4165a44f2cc99b93daee33ad67320aed4fd5f85ef2fbc4779bf69f55efb
-
Filesize
260KB
MD5f6aabdf85821a9c61c61dec9408f40cc
SHA1ddac695de73be7a67357aea89c7b9c2ca21fc4e1
SHA2569ee23586d456db53d59fbaa8669e817461aeaf94f81237ead3f2c23cac8c40fa
SHA51273d2e4352c4055c8d08ad5499fc4495ff6fa7613970f9c0a3cf73dae645fc9102e62cf9c7dd046d6bc3c909cbafd06a30812d1d9bcf8f34c4a253c09d628b538
-
Filesize
168KB
MD5197c2ce7cf2a98ae895ece98d88b8245
SHA1f734d8dc508138501e79b384fe1a689920c6ba93
SHA256260924991dff4fbd2f691913007aee1f3136708671ef3309b4f9ec8687da6f1e
SHA512a7ff5f0d56a13d340d9ec1b977f9e995bf7dc61f6bf4b8ecd7369793d39032a43e587146e6b9a9084be5a9cc709876bf971983a218c2af631d3950cd3391cd47
-
Filesize
528KB
MD51c1332bf83f505cb60e06c76fe111cdd
SHA13c80e9bd5a41ac3f8fa129d61261ea07db29f801
SHA2569602fafb7de17b14a3474c64944db928ef6c23e20935c0e82e918fa2447cc979
SHA512bd7cb4113f5b6067c55e7df1f6dac6b4058a0bdc9b0e7d6875f1718bdcc84d315ea8a2d373a45c47c82326a74cbce41a508f493eac59db99f7cd5e4f33ac575f
-
Filesize
176KB
MD5afdfec6679ce99596261ff182afbe9e6
SHA13289711e3ce8bb72bd84bb0bc33f95d958648f4c
SHA25681b931aaf908e1e372802db04dfbe5256209d488bfe88d58841fc13acadedfd6
SHA512c8ce4617d03084f37b8766f0505922a8f380e0d2745658864197535c43c3b2f985c4a2bac2228752857782181cd41167bfa4b784c7ce3e8a94932d58d099753a
-
Filesize
392B
MD5b815251ad9240f4287d8fd34793fb5fa
SHA1242b468219c26ac14c5292c5914d84e2705639b3
SHA2563cfc161ee8fc1b2c729c6649ad10a606e9b1e0e9cd7e554129601ba098a0200b
SHA51200dbd892fe76eed8a8f49208ab92c6be92d5450e4c7d2e2018ac34bbb87621c65495c4ae1343f4847ad070f638679bd0d1e759c30de7ab5dc4bd23cbfe2ae6fc
-
Filesize
386B
MD5dd6221f42f5c1ba8c5035493ab5cb499
SHA1634c02647d7a8b97a9c307adf4e341e0a6ce449c
SHA2564d73373bf30d813eed7a82877c42e561c437e0c99f7bc7ef5e7887e8cb36946c
SHA51206733bf1185264fc5ef8a591f2973af12e202936c9f02a365d4f7ab48bc172a3cf80849ad0ae2a2cca6594c9660a9e4b45d90193767dbe37801d96dbf92f84fa
-
Filesize
397B
MD508d8d2e34e865bcac49031a880e151e5
SHA17e9b1553b89a2d0e8c6bc239a1ca05c400864041
SHA2568bb27cd63389255f8184f340421d6f7501007e7e1ad85d9a7845e1384ce5aeba
SHA5122b044e2291636e13b5e10f4e243c36295c2586bc566a1685c21b200afa577b140c50b946701f710d316a11d6cbb9b95f3c8bd99aee2fca523531f119c8b7ba1e
-
Filesize
117KB
MD57c7f6ecbea0a9efa788a1721a97ed3c1
SHA19c57fbad160dc7e79fa238b0381a17e993ac2d3a
SHA25676c7b68a7406763ddf348e0adcf69d1224f2344574022178ac0b01402aeaf5a0
SHA512491fbc1cdfa68796402b57606782e189edea57749dcfae8c764f15a41886777fb363d6ce04f2ef3a3cd58d27c418d1f3c69ecf8d119c59acf2e244f985d359a3
-
Filesize
22.8MB
MD576f5202cc91e743aca5fcd8406d3b822
SHA13db06724cbb8846befc7e5160e38a77076258226
SHA25694c3625c061675d69cef758d7269e108867b39566fc678b03a9a70cc39caea46
SHA512a449fb5eead86390fb1326c2f69afbeb300c7419aa512726581106bc1f9e4f9e85c676e72988a5ee2b468983c1698357b64a6d599b51c3449e9a4b0da6c5b171
-
Filesize
104KB
MD541c809ec8fd59ffcbfff35da8d9cf41b
SHA1c6e8b1ef8fcd49ac88ce097157beaeff4d7468e2
SHA256fe9b3c74f09a6c66dab66269550f277c8aa82c7e93b5e9963a116c44619d55b2
SHA512e51ecdba17d0aa037ea6e229e66879e50317b677e2b4760a4dcb7883ab49598b3b166e9b26dcfab5a1904373d70af6234899092bc7a614b9fca14cfbed0ad42d
-
Filesize
108KB
MD5fd431b66df8c14c817c830118ffe138c
SHA1f12384abcf2e07c0bdd7d9ec85b30bf20d5368a0
SHA2567778c3f44f62e339cea9153c44cb467ff9733beb7791fe1433adba26602ba358
SHA51265f95eaa5c24717a9f5d184a1600cf56d664b2e57e4959a6f92c865d2d37e22e5a55dc19445993d2b49d6570bdb633c179e1e87310d269d8642a715e9388fb21
-
Filesize
6.6MB
MD52cdc9a6f4e33a91ed48d4da1f06e3bac
SHA12f8cc53983de9b00ab8abcf63a35d20a2e476c63
SHA256b3a1cab13bb06c484764c3f31561b189fd3dd804d015a50bbf3009ed9f884738
SHA5128178d0d684be6711aa5c9c4fc118ee02515c6bcc9d7ca8181ebb35dc5c5dedc6ba683ccc732636f5c51e46b91c2d445464c7c7c3d429b57d47cff0c3dde15510
-
Filesize
1.6MB
MD504675d9ded0dbc18e0a3b6e67f123efd
SHA11c34a8eb14172d7402c5a76c7c93f7badcd898f4
SHA25685b6df1fd28feec183047e7b483e79209b90f1b42d288bfef41c373723c5f9dc
SHA512ad3a54945570f491e6616aedf8ca9b4cf0061789c1ecb4bb77fd8403a73b641b2b7e2532a08becbaa87f999e04adfc34ebf92f8f81b908e0974db7f223864a49
-
Filesize
4.4MB
MD5c685550a5f8dd6bdfeece67e8175d05f
SHA14334b9de1678ba9a4321e1cb538bbefc4d03d95e
SHA256234656ea67d31dff6c576595321737e0ee6e6439cee57311d0d75c256e32a12c
SHA51207478a9c35a2e7613a5dae465065ba0a15c003a91c930c89ca04e100f8a9d119bed4fe80eb701d803c574f35cf6aea2ab30e3f369f9c225df1bb8521943b2227
-
Filesize
64KB
MD5f3d83ede7612c6fd5d2454ad3a4d5ca5
SHA1db396a0a1360b7117830c845ec89367ab71148ab
SHA25686680560caed8c31cb378adbee9285ee968ca91f50e53f7e668a03defb7c7426
SHA5128415c6bcf41c06cd4e7b6d740488dba09d4935d0801312b698e3dfcdc64d30a912c2e02029c6d14e2d15492399d8a34aeb7528b95030eeb044d541ee44674ed0