Analysis

  • max time kernel
    9s
  • max time network
    10s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 11:30

Errors

Reason
Machine shutdown

General

  • Target

    a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe

  • Size

    4.3MB

  • MD5

    88803d738899f52422d43240053ba7e0

  • SHA1

    fc02fc3bffd0712ad724e92ee8d9afe6f3efafc4

  • SHA256

    a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bc

  • SHA512

    4580e57143df815867f3c4c8fb8ce9365e87513e3409b760710a5375c410c9d93f6e97a7baf6767c84eb3e4e564e84d906bae375e75c228b63cd8014d83a16f0

  • SSDEEP

    98304:sygXkXYxIaRtFHHvSSSL+eHhXXinaWsEHGmStJyJR6Kg2BflXHxro:YOnaTFv/eHKaWsEHXSyJR3g2BpHxro

Malware Config

Signatures

  • Floxif family
  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • Detects Floxif payload 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Possible privilege escalation attempt 30 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Modifies file permissions 1 TTPs 30 IoCs
  • Modifies system executable filetype association 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 22 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 62 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Modifies File Icons 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies Shortcut Icons 1 IoCs

    Modifies/removes arrow indicator from shortcut icons.

  • Modifies data under HKEY_USERS 19 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 33 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe
    "C:\Users\Admin\AppData\Local\Temp\a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Install.bat" "
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:408
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\001 /V 1 /D "REGEDIT /S C:\Windows\register.reg" /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:4708
      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\wrar391.exe
        C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\wrar391.exe /s
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:4588
        • C:\Program Files (x86)\WinRAR\uninstall.exe
          "C:\Program Files (x86)\WinRAR\uninstall.exe" /setup
          4⤵
          • Executes dropped EXE
          • Modifies system executable filetype association
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:1668
      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\flash.exe
        C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\flash.exe /s
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:2124
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 IEMaximizer.dll /s
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:5024
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Icons" /v 29 /d C:\Windows\System32\imageres.dll,196 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies File Icons
        • Modifies Shortcut Icons
        PID:3608
      • C:\Windows\SysWOW64\reg.exe
        REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "EditionID"
        3⤵
          PID:4572
        • C:\Windows\SysWOW64\findstr.exe
          FINDSTR /I "Starter"
          3⤵
            PID:684
          • C:\Windows\SysWOW64\reg.exe
            REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "EditionID"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3348
          • C:\Windows\SysWOW64\findstr.exe
            FINDSTR /I "HomeBasic"
            3⤵
              PID:116
            • C:\Windows\SysWOW64\reg.exe
              REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "EditionID"
              3⤵
                PID:4388
              • C:\Windows\SysWOW64\findstr.exe
                FINDSTR /I "HomePremium"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2880
              • C:\Windows\SysWOW64\reg.exe
                REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "EditionID"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2368
              • C:\Windows\SysWOW64\findstr.exe
                FINDSTR /I "Professional"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2944
              • C:\Windows\SysWOW64\reg.exe
                REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "EditionID"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1120
              • C:\Windows\SysWOW64\findstr.exe
                FINDSTR /I "Ultimate"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:400
              • C:\Windows\SysWOW64\reg.exe
                REG QUERY HKLM\HARDWARE\ACPI\RSDT
                3⤵
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:2252
              • C:\Windows\SysWOW64\findstr.exe
                FINDSTR /I ACRSYS
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1612
              • C:\Windows\SysWOW64\reg.exe
                REG QUERY HKLM\HARDWARE\ACPI\RSDT
                3⤵
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:1784
              • C:\Windows\SysWOW64\findstr.exe
                FINDSTR /I DSGLTD
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2132
              • C:\Windows\SysWOW64\reg.exe
                REG QUERY HKLM\HARDWARE\ACPI\RSDT
                3⤵
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:4596
              • C:\Windows\SysWOW64\findstr.exe
                FINDSTR /I ALWARE
                3⤵
                  PID:3040
                • C:\Windows\SysWOW64\reg.exe
                  REG QUERY HKLM\HARDWARE\ACPI\RSDT
                  3⤵
                  • Modifies registry key
                  PID:3520
                • C:\Windows\SysWOW64\findstr.exe
                  FINDSTR /I BENQ
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4592
                • C:\Windows\SysWOW64\reg.exe
                  REG QUERY HKLM\HARDWARE\ACPI\RSDT
                  3⤵
                  • Modifies registry key
                  PID:964
                • C:\Windows\SysWOW64\findstr.exe
                  FINDSTR /I DELL
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4624
                • C:\Windows\SysWOW64\reg.exe
                  REG QUERY HKLM\HARDWARE\ACPI\RSDT
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies registry key
                  PID:712
                • C:\Windows\SysWOW64\findstr.exe
                  FINDSTR /I ASUS
                  3⤵
                    PID:4896
                  • C:\Windows\SysWOW64\reg.exe
                    REG QUERY HKLM\HARDWARE\ACPI\RSDT
                    3⤵
                    • Modifies registry key
                    PID:3144
                  • C:\Windows\SysWOW64\findstr.exe
                    FINDSTR /I FOUNDR
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1716
                  • C:\Windows\SysWOW64\reg.exe
                    REG QUERY HKLM\HARDWARE\ACPI\RSDT
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies registry key
                    PID:1312
                  • C:\Windows\SysWOW64\findstr.exe
                    FINDSTR /I FSC
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1332
                  • C:\Windows\SysWOW64\reg.exe
                    REG QUERY HKLM\HARDWARE\ACPI\RSDT
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies registry key
                    PID:3980
                  • C:\Windows\SysWOW64\findstr.exe
                    FINDSTR /I FUJ
                    3⤵
                      PID:3296
                    • C:\Windows\SysWOW64\reg.exe
                      REG QUERY HKLM\HARDWARE\ACPI\RSDT
                      3⤵
                      • Modifies registry key
                      PID:4432
                    • C:\Windows\SysWOW64\findstr.exe
                      FINDSTR /I HPQ
                      3⤵
                        PID:4636
                      • C:\Windows\SysWOW64\reg.exe
                        REG QUERY HKLM\HARDWARE\ACPI\RSDT
                        3⤵
                        • System Location Discovery: System Language Discovery
                        • Modifies registry key
                        PID:1436
                      • C:\Windows\SysWOW64\findstr.exe
                        FINDSTR /I LENOVO
                        3⤵
                          PID:4008
                        • C:\Windows\SysWOW64\reg.exe
                          REG QUERY HKLM\HARDWARE\ACPI\RSDT
                          3⤵
                          • Modifies registry key
                          PID:1084
                        • C:\Windows\SysWOW64\findstr.exe
                          FINDSTR /I MEDION
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:2924
                        • C:\Windows\SysWOW64\reg.exe
                          REG QUERY HKLM\HARDWARE\ACPI\RSDT
                          3⤵
                          • Modifies registry key
                          PID:4480
                        • C:\Windows\SysWOW64\findstr.exe
                          FINDSTR /I MSI
                          3⤵
                            PID:3008
                          • C:\Windows\SysWOW64\reg.exe
                            REG QUERY HKLM\HARDWARE\ACPI\RSDT
                            3⤵
                            • Modifies registry key
                            PID:4888
                          • C:\Windows\SysWOW64\findstr.exe
                            FINDSTR /I NOKIA
                            3⤵
                              PID:4804
                            • C:\Windows\SysWOW64\reg.exe
                              REG QUERY HKLM\HARDWARE\ACPI\RSDT
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Modifies registry key
                              PID:4408
                            • C:\Windows\SysWOW64\findstr.exe
                              FINDSTR /I SECCSD
                              3⤵
                                PID:4428
                              • C:\Windows\SysWOW64\reg.exe
                                REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                3⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies registry key
                                PID:3584
                              • C:\Windows\SysWOW64\findstr.exe
                                FINDSTR /I Sony
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4876
                              • C:\Windows\SysWOW64\reg.exe
                                REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                3⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies registry key
                                PID:2768
                              • C:\Windows\SysWOW64\findstr.exe
                                FINDSTR /I TOSASU
                                3⤵
                                  PID:2764
                                • C:\Windows\SysWOW64\reg.exe
                                  REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry key
                                  PID:1996
                                • C:\Windows\SysWOW64\findstr.exe
                                  FINDSTR /I TOSCPL
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1076
                                • C:\Windows\SysWOW64\reg.exe
                                  REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                  3⤵
                                  • Modifies registry key
                                  PID:1848
                                • C:\Windows\SysWOW64\findstr.exe
                                  FINDSTR /I TOSINV
                                  3⤵
                                    PID:3200
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                    3⤵
                                    • Modifies registry key
                                    PID:4552
                                  • C:\Windows\SysWOW64\findstr.exe
                                    FINDSTR /I TOSQCI
                                    3⤵
                                      PID:1372
                                    • C:\Windows\SysWOW64\reg.exe
                                      REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry key
                                      PID:920
                                    • C:\Windows\SysWOW64\findstr.exe
                                      FINDSTR /I AVERATEC
                                      3⤵
                                        PID:4048
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                        3⤵
                                        • Modifies registry key
                                        PID:2452
                                      • C:\Windows\SysWOW64\findstr.exe
                                        FINDSTR /I JOOYON
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2292
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                        3⤵
                                        • Modifies registry key
                                        PID:2472
                                      • C:\Windows\SysWOW64\findstr.exe
                                        FINDSTR /I LG
                                        3⤵
                                          PID:2140
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                          3⤵
                                          • Modifies registry key
                                          PID:4384
                                        • C:\Windows\SysWOW64\findstr.exe
                                          FINDSTR /I NEC
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4260
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry key
                                          PID:3680
                                        • C:\Windows\SysWOW64\findstr.exe
                                          FINDSTR /I SHARP
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5080
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                          3⤵
                                          • Modifies registry key
                                          PID:2316
                                        • C:\Windows\SysWOW64\findstr.exe
                                          FINDSTR /I TCL
                                          3⤵
                                            PID:4104
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies registry key
                                            PID:4768
                                          • C:\Windows\SysWOW64\findstr.exe
                                            FINDSTR /I HASEE
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3024
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                            3⤵
                                            • Modifies registry key
                                            PID:1492
                                          • C:\Windows\SysWOW64\findstr.exe
                                            FINDSTR /I GBT
                                            3⤵
                                              PID:4292
                                            • C:\Windows\SysWOW64\reg.exe
                                              REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                              3⤵
                                              • Modifies registry key
                                              PID:4332
                                            • C:\Windows\SysWOW64\findstr.exe
                                              FINDSTR /I haier
                                              3⤵
                                                PID:2596
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                                3⤵
                                                • Modifies registry key
                                                PID:3660
                                              • C:\Windows\SysWOW64\findstr.exe
                                                FINDSTR /I QUANMX
                                                3⤵
                                                  PID:3264
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry key
                                                  PID:1900
                                                • C:\Windows\SysWOW64\findstr.exe
                                                  FINDSTR /I THTFPC
                                                  3⤵
                                                    PID:976
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG QUERY HKLM\HARDWARE\ACPI\RSDT
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies registry key
                                                    PID:4832
                                                  • C:\Windows\SysWOW64\findstr.exe
                                                    FINDSTR /I TRIGEM
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1164
                                                  • C:\Windows\SysWOW64\cscript.exe
                                                    cscript C:\Windows\System32\slmgr.vbs -ipk
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2588
                                                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\GD.exe
                                                    data\N7\Tasks\GD.exe /y
                                                    3⤵
                                                    • Executes dropped EXE
                                                    PID:3608
                                                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\GD.exe
                                                    data\N7\Tasks\GD.exe /m
                                                    3⤵
                                                    • Executes dropped EXE
                                                    PID:4908
                                                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\GD.exe
                                                    data\N7\Tasks\GD.exe /d
                                                    3⤵
                                                    • Executes dropped EXE
                                                    PID:3348
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f C:\Windows\N7\AD.cmd
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2964
                                                  • C:\Windows\SysWOW64\icacls.exe
                                                    icacls C:\Windows\N7\AD.cmd /deny everyone:f
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    PID:1532
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f C:\Windows\N7\BD.cmd
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    PID:3212
                                                  • C:\Windows\SysWOW64\icacls.exe
                                                    icacls C:\Windows\N7\BD.cmd /deny everyone:f
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    PID:552
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f C:\Windows\N7\GD.exe
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2464
                                                  • C:\Windows\SysWOW64\icacls.exe
                                                    icacls C:\Windows\N7\GD.exe /deny everyone:f
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    PID:1120
                                                  • C:\Windows\SysWOW64\sc.exe
                                                    sc config sppsvc start= demand
                                                    3⤵
                                                    • Launches sc.exe
                                                    PID:3596
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /delete /tn "\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask" /f
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2252
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /create /tn "\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask1" /xml data\N7\Tasks\SvcRestartTask1.xml /ru System /f
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3472
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /create /tn "\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask2" /xml data\N7\Tasks\SvcRestartTask2.xml /ru System /f
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1784
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /create /tn "\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask3" /xml data\N7\Tasks\SvcRestartTask3.xml /ru System /f
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3676
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /create /tn "\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask4" /xml data\N7\Tasks\SvcRestartTask4.xml /ru System /f
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1512
                                                  • C:\Windows\SysWOW64\netsh.exe
                                                    C:\Windows\System32\netsh.exe interface tcp set global autotuninglevel=highlyrestricted
                                                    3⤵
                                                    • Event Triggered Execution: Netsh Helper DLL
                                                    PID:2868
                                                  • C:\Windows\SysWOW64\regedit.exe
                                                    regedit /s data\Option\Prefetch1.reg
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Runs .reg file with regedit
                                                    PID:1428
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f C:\Windows\Temp /r /d y
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    PID:4848
                                                  • C:\Windows\SysWOW64\icacls.exe
                                                    icacls C:\Windows\Temp /t /grant everyone:f
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    PID:3980
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f C:\Windows\System32\slmgr.vbs
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4640
                                                  • C:\Windows\SysWOW64\icacls.exe
                                                    icacls C:\Windows\System32\slmgr.vbs /grant everyone:f
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    PID:4432
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f C:\Windows\System32\systemcpl.dll
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4512
                                                  • C:\Windows\SysWOW64\icacls.exe
                                                    icacls C:\Windows\System32\systemcpl.dll /grant everyone:f
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3452
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f C:\Windows\System32\sppcomapi.dll
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1424
                                                  • C:\Windows\SysWOW64\icacls.exe
                                                    icacls C:\Windows\System32\sppcomapi.dll /grant everyone:f
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    PID:3832
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f C:\Windows\System32\winver.exe
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3776
                                                  • C:\Windows\SysWOW64\icacls.exe
                                                    icacls C:\Windows\System32\winver.exe /grant everyone:f
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4836
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f C:\Windows\System32\user32.dll
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4584
                                                  • C:\Windows\SysWOW64\icacls.exe
                                                    icacls C:\Windows\System32\user32.dll /grant everyone:f
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4412
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f "C:\Windows\System32\ko-kr\shell32.dll.mui"
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4464
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f "C:\Windows\SysWOW64\ko-kr\shell32.dll.mui"
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4140
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f "C:\Windows\System32\ko-kr\themecpl.dll.mui"
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1208
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f "C:\Windows\SysWOW64\ko-kr\themecpl.dll.mui"
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3368
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f "C:\Windows\System32\ko-kr\Display.dll.mui"
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2500
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f "C:\Windows\SysWOW64\ko-kr\Display.dll.mui"
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2528
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f "C:\Windows\winsxs\x86_microsoft-windows-shell32.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_2bba41a8e9e5ffdb"
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4704
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f "C:\Windows\winsxs\amd64_microsoft-windows-shell32.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_87d8dd2ca2437111"
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1636
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f "C:\Windows\winsxs\x86_microsoft-windows-themecpl.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_60d6493e5ec01332"
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1604
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f "C:\Windows\winsxs\amd64_microsoft-windows-themecpl.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_bcf4e4c2171d8468"
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2708
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f "C:\Windows\winsxs\x86_microsoft-windows-display.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_6d88dfdedf2ef7a4"
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2228
                                                  • C:\Windows\SysWOW64\takeown.exe
                                                    takeown /f "C:\Windows\winsxs\amd64_microsoft-windows-display.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_c9a77b62978c68da"
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3712
                                                  • C:\Windows\SysWOW64\regedit.exe
                                                    regedit /s data\Shortcut\MuiCache.reg
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies data under HKEY_USERS
                                                    • Modifies registry class
                                                    • Runs .reg file with regedit
                                                    PID:1188
                                                  • C:\Windows\SysWOW64\mcbuilder.exe
                                                    C:\Windows\System32\mcbuilder.exe
                                                    3⤵
                                                    • Drops file in Windows directory
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2636
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /S /D /c" echo y "
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2828
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /S /D /c" del C:\Windows\Prefetch\*.* 1>nul"
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3536
                                                  • C:\Windows\SysWOW64\shutdown.exe
                                                    SHUTDOWN -R -F -T 00
                                                    3⤵
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4388
                                              • C:\Windows\system32\LogonUI.exe
                                                "LogonUI.exe" /flags:0x4 /state0:0xa38e2855 /state1:0x41c64e6d
                                                1⤵
                                                • Modifies data under HKEY_USERS
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2368

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Program Files (x86)\WinRAR\Rar.txt

                                                Filesize

                                                70KB

                                                MD5

                                                e8ec8d1e5f0e78752a8b82822bb75f76

                                                SHA1

                                                eae3513a3e56e8b99761a0cd44c1f9828e2da293

                                                SHA256

                                                7c1fe0d8f6c802da18aa0f37902c1559a29c5073246e28258eb89f7983aaa643

                                                SHA512

                                                d7b84eb535762ca6b422e2cab59fcc3c02cd07b03ff432f68212aa5c8eac879567ffcb21ed3aacd655d58d18307f9f343df4013a9fbeb5d168184ddd69089ee8

                                              • C:\Program Files (x86)\WinRAR\Uninstall.exe

                                                Filesize

                                                117KB

                                                MD5

                                                49799aa663bf45a3c37dd739a5116d81

                                                SHA1

                                                ac088d8134ccbd9d1df3794c16f9778a3d588c56

                                                SHA256

                                                369e163608ecc4edec6a476ae5935b16230210de2f637b1eff03565214277632

                                                SHA512

                                                c525396822b23d4a11866239cdce33aa1c8e5d373f0ccb36a2196e5dcd9a9e5b287caa8aeb542e079b397018a45973c01ab3326a5228d2f607bdbffbd1446cd6

                                              • C:\Program Files (x86)\WinRAR\WinRAR.chm

                                                Filesize

                                                309KB

                                                MD5

                                                66a2ed9fa095a68fdbed52151d096bbf

                                                SHA1

                                                49d8a6375078deb929070643dd205b276a77d82c

                                                SHA256

                                                bd58f7952f7e92ef7ae0367f1ec0090473ab4587e27e83d4856c650325bb71da

                                                SHA512

                                                3dc4c603ba044c7fcaa5d4187ffa10952771f5694ca114c69057f99d3fdc56b79647d833285083419842822e64329115a26066866fdd814268d6392689c07c63

                                              • C:\Program Files (x86)\WinRAR\WinRAR.exe

                                                Filesize

                                                999KB

                                                MD5

                                                31ae4919723e41ae26a0ca390489c508

                                                SHA1

                                                c36b00ad8bc7486a95935c4fb1bb45a70b4e4f92

                                                SHA256

                                                68937e03154d4957e7280ad29951047509ddbd0a00210570478270a84cc12096

                                                SHA512

                                                bd0c5e32159929ba1b0f966fed8a9d96ffed8ad080c359e65c39705025328627682f3d6ba507a5d1b96f9d5ad72ebdd6e68fd0a021cc39d31f9ac6918ab78a96

                                              • C:\Program Files\Common Files\System\symsrv.dll

                                                Filesize

                                                67KB

                                                MD5

                                                7574cf2c64f35161ab1292e2f532aabf

                                                SHA1

                                                14ba3fa927a06224dfe587014299e834def4644f

                                                SHA256

                                                de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

                                                SHA512

                                                4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\AVERATEC .XRM-MS

                                                Filesize

                                                2KB

                                                MD5

                                                172c78e78366f8dcbe4c4a5546bad60b

                                                SHA1

                                                67022b142bd1a0248206d1d10da3d51f88b4e1ef

                                                SHA256

                                                4a99e456460a326f2659706f031efe268d0dfabfb40f77d84dde6a5ba0e6e664

                                                SHA512

                                                4dc34aad5783835ac64328b9b351af8f1dfa6372ea5403582d62bc48398e5d56a169aef4fcce24e28ec04c64fbee1352ff433645f0e8faae438dd392e15fa6a4

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\IEMaximizer.dll

                                                Filesize

                                                48KB

                                                MD5

                                                8bda56f78a481b0b82cbee68b0e21e6b

                                                SHA1

                                                738c4cac60703a918b7be5f3024b93662f2803e1

                                                SHA256

                                                98d17e31e263dce151255413a73dc8db0d6ba9a3325cc9b243a516caa3b5d7d9

                                                SHA512

                                                8b5426b231bedeffb4e9f7c3896fd5cc56299830e6a6d0975d4b7c211cb1bc14ce48619867baec3a707199f5fd175eed6f6331b34a196d93929480ce100bbbe1

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Install.bat

                                                Filesize

                                                18KB

                                                MD5

                                                9c671c46f977dd5967c95d110c022c6e

                                                SHA1

                                                42bafcbe214731c82e5199a7a6b918204ae8874e

                                                SHA256

                                                7088a6d70b9b90638ff569cafcab4f15466f4157e48f59301e266c39fb7981d0

                                                SHA512

                                                14080eccef9103323722d7abe4ad2e17920313ca3763be7238bf20cb76b0f55de64638b71dcff9a971b5b5bdbc0f4392bf214f6e1937c857157ea6cb3be33373

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\REGISTER.reg

                                                Filesize

                                                9KB

                                                MD5

                                                63020cbe973fa1ad07d932f7b1ffe54b

                                                SHA1

                                                43e7cef771362ba633c0f8ef569b42dacb3c8f62

                                                SHA256

                                                ba66da2025be4dfab3ffd08c4b4b2f5bc0511e9d784a993f4e6b9854a98cce3e

                                                SHA512

                                                ee3c135d7e527f9b877e22fbcae20f667511600a1ffd1b11e40ffac032291ee3180480f407f2232689ceebc5d481759a7fe1804e88a6abdc4b1707775eda9dd8

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\AD.cmd

                                                Filesize

                                                958B

                                                MD5

                                                54d60650b4eb2f3ef4e751b08ef7c625

                                                SHA1

                                                9a612c4387eb5ab685f216826ba7d678817291ca

                                                SHA256

                                                6b1b29b19c4b1fde2503aa71f52c46643ad6267d835bbeef4fa2b4178ef50da2

                                                SHA512

                                                e29c6a939eedbaee591f37b65e4658210eab081b752394deb20856e0f9913f5f437ce479a81ee27aea824c06cfec5b4984bc42d25988d2349ada54ae646129f3

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\BD_Tail.cmd

                                                Filesize

                                                261B

                                                MD5

                                                64f19535d32b3df27bd0e4c8988eb90c

                                                SHA1

                                                79671f917cd93f5d44d5d63458474c433e279648

                                                SHA256

                                                bbe6e8ed9a625ed8364374b92dff3c1dd032177ce797857f851aa081ef1e89ee

                                                SHA512

                                                041d52db4602d446bcc92ce1380ae76e40e2108fac8fe031a46f4eb6cc654af5bdb4e1d5c48fa74bf83bd58b317e316080d91d2782dc412f1c636785163b761c

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\GD.exe

                                                Filesize

                                                188KB

                                                MD5

                                                849c3feba650d42a5a7ac46062d59c54

                                                SHA1

                                                a4396db103cd5841915a37a52cc827e90c4c368f

                                                SHA256

                                                623adc6fa585a467cfe67ca27629bf1ae2a9056103f3edcc71ca07fd223b8512

                                                SHA512

                                                a1b6ecfa25d31389dee930fea400ccb7085fbcb52f193d7a8fb768be7ccafe73747a7980caf56de2e1e762f4ef7660fb4659e74dd7288135e77cefa330edaa67

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\SvcRestartTask1.xml

                                                Filesize

                                                3KB

                                                MD5

                                                4999ae501e729ed8c34a0f6984b8b83a

                                                SHA1

                                                336f033bce30edcff75a696252ffcc19f368ba5f

                                                SHA256

                                                476ca80be8e0921303fabfa69c941c1c3019754f70eb5f2ab0820af6f4e5d4a3

                                                SHA512

                                                e2060469be064242539c55b6c7dbec22cbdce6d1feaad56ffec3d56b7045fab60df683c06afd54a73c45a5ebe9e1e8b5d1f8e73b897945da941ab3cf08eb8112

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\SvcRestartTask2.xml

                                                Filesize

                                                3KB

                                                MD5

                                                01027180a6a26c5a2e3bf551f1dc7c44

                                                SHA1

                                                9b01c13025713a3fb00467e3d0176c742240c4f0

                                                SHA256

                                                b2ffd969413c208f1a69812055182506c887c7769794ca686ce68e66a2e87bf6

                                                SHA512

                                                bba113a44768731ad6e6a64839c07d026e03be14359749850bdd9549b9714f0336d6c27bab0d725913f1cbfdfbec694269d224807066ae68a50e1aa66c522f5d

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\SvcRestartTask3.xml

                                                Filesize

                                                3KB

                                                MD5

                                                a293dbb2f8d2b1cf104cc5069bdc72e0

                                                SHA1

                                                42ef5370901fbac970633f44d11312670a2b4781

                                                SHA256

                                                a0ee763e8ca1a446d13a34cc14348c897b90053903fcf4bc415c6c20ecf3ef99

                                                SHA512

                                                9331f66eccbefc19b66bd983bf26c830901a9bb5ca33fbeeb821fc36c1722484cf9301e0d732133738b134461c537bd4a350fbf2d4be5ea07bb668cff389b4e1

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\SvcRestartTask4.xml

                                                Filesize

                                                3KB

                                                MD5

                                                a34211b7e172d80ac6db1d1ab87fbb6d

                                                SHA1

                                                a7979e0a0d2122430081c4a06d73526095b54580

                                                SHA256

                                                bdd78e2045f43717423b66a338b0a5815359c13eedca5a6a70b79c3440682689

                                                SHA512

                                                d0285a77f7dc2042f49da61ba0d3d336024375d43b0b64bdc3e94ce47ba96b9b415ddcd90da43fd99381a0f3082f6f418e47163b1d683dd062e006eb82c263b4

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\TD.cmd

                                                Filesize

                                                395B

                                                MD5

                                                bdad2ade38f1dc5981087777b338e327

                                                SHA1

                                                0699e002c935d9b46df7a35bc8f0ec8b031e1027

                                                SHA256

                                                892d46ea5fd5547fa057fbbc09ef7ea8eca66d513cb80652310d9524b95dfc3f

                                                SHA512

                                                98c5a1c0f1aa9f5255034a8d34e45a6a913e53f704dc185c7032933b8f9af0eec7bca87b5b806103bc84b62aaebc15f92efccc1c44bcc93a5eb2d3ccc9018d99

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\x64\sppcomapi.dll

                                                Filesize

                                                1024B

                                                MD5

                                                69d9d1785ec1f5032538f2696210e2e2

                                                SHA1

                                                7dacc1c0fb5ca9e92fc1fcd90a23d74b75042c00

                                                SHA256

                                                444d4dfb574dcc145067b19763befd65d0e6ad9a7bb1423c92ef4ff4f6638145

                                                SHA512

                                                82839d76bc10dbc8849fc3879b3c776e218ed4d8496a40226116aa64798bdac41173a2dada4cc4478776c82af69cc5de541cd71fdc03eeb0301768dec0ef9e53

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\x64\systemcpl.dll

                                                Filesize

                                                410KB

                                                MD5

                                                911eb55f9f74a6383983e0a6a8a2772d

                                                SHA1

                                                5f40c2e1ff4e6a544ed160b355b6673925d66741

                                                SHA256

                                                3ab580c2f8d5588ced041a96b686c88987f8217283066e408d5092f0eac7c079

                                                SHA512

                                                0cec6c11552936c9af72b9eb8ac7d12abfde1caea99471e421375926705a4427df4727b0645663c6a267d2957ad741e29c5f74950bfa6adeaf1754eb061b390a

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\x64\user32.dll

                                                Filesize

                                                985KB

                                                MD5

                                                e573bd9ab55c8e333c202b9e255f972e

                                                SHA1

                                                460bde795885134b48465dc73797db695af33e1f

                                                SHA256

                                                79bec0da770265d1a525330b2e732e055edde617bcc2848c2742492f9dbc881e

                                                SHA512

                                                bcae097591cbc66e20771ef69e6544e5f951e0821b8d2a4779e524c542e5ad1d75ff683a15a76f5577e1e1389f4058cd36da7d0c785c504b2305cc144dc7b4bf

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\x64\winver.EXE

                                                Filesize

                                                12KB

                                                MD5

                                                7941f0c4bd4004269b268e66752dac9b

                                                SHA1

                                                6accf1d9b5981eb12a22c530c3d37be9ca54c415

                                                SHA256

                                                06c59055bd2d5bc2fc1950abb377b0aa33f74d8faab3ee074d54a2f8a93e38d2

                                                SHA512

                                                c8a720341ffeb39939d18c7d9f1c298554db5768d34bb24bfdf6f9f66ddbfb1884b7b20c30229cacc674856acf032081d55be4738bd7be7e1acbd781b25272a9

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\Option\Prefetch1.reg

                                                Filesize

                                                582B

                                                MD5

                                                f2e7e95075c04b3bec89118952aeacf9

                                                SHA1

                                                669fcdbe70dced5524c91b631d7241b9ec0e1d8d

                                                SHA256

                                                a568d9604a56f35a3726636cd33c69ad48f607f55744565ba613addc432f1165

                                                SHA512

                                                a3121c0ea0afdae0a231df264745f90ae7660107ff24145e87d722a61b8497bdffc45cb9e2f13e4b5c0e96f577ac08b105a57015b14f8cc8575343d341776b56

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\Shortcut\MuiCache.reg

                                                Filesize

                                                862B

                                                MD5

                                                91bd16ffa806694171e89ce6bf40ce5f

                                                SHA1

                                                4d776c6e5b565a2002f8559f77b5320fa8420b72

                                                SHA256

                                                06b91106a4169ee981a38915e694b6409f7c8cf11fef3ee845d218c32d71e509

                                                SHA512

                                                c9ed43ad2d7b0c7373fab8f14bf3a50b8541d730598cda4ef6af36724ed6a65ae2e5a81567de196f30f90b073a48ac61b3fc72ca14908f63a45092f33e48e61d

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\Shortcut\x64\SysWOW64\ko-KR\Display.dll.mui

                                                Filesize

                                                10KB

                                                MD5

                                                7e74f142b1aaca35c3c6cf28b6a40b86

                                                SHA1

                                                5fb838b42fd9268f95769a301ea214519f144768

                                                SHA256

                                                3bb9a3802f2a5aae367d46d39d478f0cd15fd7b1208acbbb7fca5426fdc6aba8

                                                SHA512

                                                c5f3b19330d8f61a721fe1f94d39477a3ed45406ce9cef92dd599dd860381081ed211fd37b13457c5a8b4ca6db466f22e91a1e72a67f3444804a076a67084019

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\Shortcut\x64\System32\ko-KR\shell32.dll.mui

                                                Filesize

                                                288KB

                                                MD5

                                                1ffdf30fd8c8a747fd9add1497530072

                                                SHA1

                                                63954a4f3703a07e126a4dc345ac6ea1ac090d77

                                                SHA256

                                                7dc85b3a6324c3b5ad8b5b6be9ffb87b7cf15c6f0b0ff2376a8fa1242e791208

                                                SHA512

                                                99729dc858d885c258af44ad3492456644eb84ce0a772137ce1a9d4ca0e5765eb1d5d49351c943e4e21456f9a5775404effdc5649a8cc53e4c972d5b05be0961

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\Shortcut\x64\winsxs\amd64_microsoft-windows-display.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_c9a77b62978c68da\Display.dll.mui

                                                Filesize

                                                10KB

                                                MD5

                                                827d5f1094f6fb7ac4252dbeb193e9e9

                                                SHA1

                                                10e3b1eb59cdda5aa79f5d78dfc5269d1c8c15c3

                                                SHA256

                                                a6fd479ff612d294eb72597f434aed310ae06a6226de49368af077fe843a0bff

                                                SHA512

                                                717ca7697c66c94d1874fae1202db37a2269a63df0235705def1e05289a2f56c400d0f55ae68333aa3386e2625857f844d38cf9eadea09850da36287cb5d18a0

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\Shortcut\x64\winsxs\amd64_microsoft-windows-themecpl.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_bcf4e4c2171d8468\themecpl.dll.mui

                                                Filesize

                                                9KB

                                                MD5

                                                c6e7e1674fd77fe944dc40ccf5fb8ab3

                                                SHA1

                                                70dfa87edeb19f11a4f8c423a32749c43df580b1

                                                SHA256

                                                9bd7b658137b2320eb25af1fdfd3f439fb57a5893f6d8429bd785ee468e66e78

                                                SHA512

                                                fd2ce2b54e1fa446461eda5f1c4c93e8de0fe2ea0b76d3f29afaf1fa8d01796ac3e865b5ee526d17b31a42bcab67e5a3b7abd2a1edcaba89e05f9d6f282e7d8e

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\Shortcut\x64\winsxs\x86_microsoft-windows-themecpl.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_60d6493e5ec01332\themecpl.dll.mui

                                                Filesize

                                                9KB

                                                MD5

                                                f7f931c5ac61c58a794b1cc7b064e095

                                                SHA1

                                                84adfebd384a8c0821188d0c724469835fe7f574

                                                SHA256

                                                a94c0c8aeef54296a3662a744be2ab6f8c078a216c044aed047ac2555f1f71f5

                                                SHA512

                                                819099165a84162bc9f91d5ef9da9c029c0606d4e43e4e29068af021960eb41ff3700358fc29760333c2879cb41a6a95ccb170d6a8638c2449917eca5cba0ca3

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\Shortcut\x86\System32\ko-KR\shell32.dll.mui

                                                Filesize

                                                288KB

                                                MD5

                                                388ab00bc5a69f77f6ed8d1fd8ace855

                                                SHA1

                                                549b86c3087e98c13cb7cf4b7e718c6fbb8e92cb

                                                SHA256

                                                beeb3badd1b569dbcf601d5cd02527c8a57ede2c5a9f6d42e1a6d02f8cb1c12e

                                                SHA512

                                                bf3319ffd33c6a6483351496382792129f5f23acaf55a9a380b056860913a2eb5957e4f9dd842972e0d15e0e18f6846ac0618df71362ac501036ad0c7dd6cec0

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\flash.exe

                                                Filesize

                                                1.9MB

                                                MD5

                                                128ada8119b4f860e1aca1891e8abde2

                                                SHA1

                                                f4ec0e95099e354fd01cd3bb27c202f54932dc70

                                                SHA256

                                                016b77d19d9fde6f7d5b477eb7008df80c51ff02acb5f950c986e45a0c2a78d3

                                                SHA512

                                                33df2213fb8580fa2f377f0f9a5d8c526a0e018998bd64e85a0b3db6aedc5536224b87097e8af75f3845e45ce0032174f08346b154e5de94578cfbfba9c4375f

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rarreg.key

                                                Filesize

                                                509B

                                                MD5

                                                a508f08707b56a83b2e17c88694cf9f6

                                                SHA1

                                                eb767de79732e94769d146ddd70dbd94db390ab5

                                                SHA256

                                                510929488b7ef3827fde8860369cd867b2b02d48c7e4bbb86db48eb833bcee4a

                                                SHA512

                                                45a0b54bbd5281a9e392aa051c5e601e015496da4f4c5aef841e9eb10bbee03dbec88f3d6c901f29f5962fb05cd16efdd7cb19fa6bd99718a6e57cf77b8af83e

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\wrar391.exe

                                                Filesize

                                                1.4MB

                                                MD5

                                                9fd58d13b4543c52685d4f77bebb34c1

                                                SHA1

                                                9b227de95bfbf859abeb22502a447948f2e6f5ac

                                                SHA256

                                                7548334ef0a06989c22003af8a9bfd9a74e8026fa422bbc7dfeddc42d2221712

                                                SHA512

                                                f580500c0154f606bed5a914ec86ebbe72c0064892c980ee8e9d65b53ea5e37da9523616901c168846aca91f4b7ce4cf5a30bd67406c739939b8bbc9f3ef930e

                                              • C:\Users\Admin\AppData\Local\Temp\nsz9E55.tmp\NSISArray.dll

                                                Filesize

                                                17KB

                                                MD5

                                                2b8574f6a8f5de9042baa43c069d20ba

                                                SHA1

                                                07959da0c6b7715b51f70f1b0aea1f56ba7a4559

                                                SHA256

                                                38654eef0ee3715f4b1268f4b4176a6b487a0a9e53a27a4ec0b84550ea173564

                                                SHA512

                                                f034f71b6a18ee8024d40acd3c097d95c8fd8e128d75075cc452e71898c1c0322f21b54bd39ca72d053d7261ffbab0c5c1f820602d52fc85806513a6fe317e88

                                              • C:\Users\Admin\AppData\Local\Temp\nsz9E55.tmp\System.dll

                                                Filesize

                                                10KB

                                                MD5

                                                16ae54e23736352739d7ab156b1965ba

                                                SHA1

                                                14f8f04bed2d6adc07565d5c064f6931b128568f

                                                SHA256

                                                c11ffa087c6848f3870e6336d151f0ba6298c0e1e30ccddf2da25a06d36a61fc

                                                SHA512

                                                15dbfcdc5dc34cb20066120045e3250f8df9e50b91de043f2ada33ac0235907d98668e248828a7ed9c75e25dfb5103b7248867530ce73ee36f6a35c30b4afa9f

                                              • C:\Users\Admin\AppData\Local\Temp\nsz9E55.tmp\UserInfo.dll

                                                Filesize

                                                4KB

                                                MD5

                                                68d73a95c628836b67ea5a717d74b38c

                                                SHA1

                                                935372db4a66f9dfd6c938724197787688e141b0

                                                SHA256

                                                21a373c52aaecce52b41aebe6d0224f53760fc3e5c575e821175eee3a1f7f226

                                                SHA512

                                                0e804deab4e647213132add4173c1d2c554c628816f56e21e274a40e185d90254e29c8bfc6fbfdfea2a492d43d23c0bfa4b276252a3f5e1993ab80ff832c4914

                                              • C:\Users\Admin\AppData\Local\Temp\nsz9E55.tmp\fpinstall.dll

                                                Filesize

                                                8KB

                                                MD5

                                                071b6233c92f69ffa1c24243328c3b94

                                                SHA1

                                                bb583c00e87cdc65e6254c7148d37afc1bbb3095

                                                SHA256

                                                5f6c63cb0ba539d692c5461730f057d0ec6c60639d772fbdc3753c3c6e746c43

                                                SHA512

                                                7fc2db406350488ee86ccffe1e99a91e0f509ef0429063336bf6f96aab07127df352db77fe9d00ddc3aa2db7886dfbac08b6acf6a5c647859956111ca47c24f1

                                              • C:\Windows\N7\BD.cmd

                                                Filesize

                                                319B

                                                MD5

                                                daefed22cbba32c7ee5937807699b553

                                                SHA1

                                                20c33b1a6cbd66db296cbda2d296506a8817c192

                                                SHA256

                                                7cbce31ecc67b6aec0bfaabeaca9bd0575a3094dc189907154729b144cc265b6

                                                SHA512

                                                0b422520b03530ffe189a010e6f6361765dbfcfc30ba35faf59afec5a2b32badf08fbb827bea5d124c541da9dfc8fb5dbf9869fde22b92dec8cddda5088e61a8

                                              • C:\Windows\SysWOW64\Macromed\Flash\Flash10d.ocx

                                                Filesize

                                                3.8MB

                                                MD5

                                                3e5c5ed3eaec55aba27f68440360ae05

                                                SHA1

                                                af372129cd7e6fa3b99cd5b6ebfba034afc8de65

                                                SHA256

                                                57937c093124bd488a449d855076a5bd359ecf9ded8533838833032e7efaca45

                                                SHA512

                                                5d484bce66eda05b545a161c82b848403b11801399d6ac3475e504e593d1d3a8eb7107180454f6cf02b1e7092ba506c322a6931c22508ce22d9a24db74603361

                                              • C:\Windows\SysWOW64\ko-KR\shell32.dll.mui

                                                Filesize

                                                288KB

                                                MD5

                                                0ea010da48315b44d3befceca3ddda0f

                                                SHA1

                                                19bd13e64a03f0d4ab0b90a266cb25b40ebc580c

                                                SHA256

                                                3cf494e14bee4d4370db50d3700a8b338c4b78e6001a3beb395c817bb9910fc7

                                                SHA512

                                                fc5ea974c78ae45def1388a7098e4167d55c924ec91211b568677a312d22786c12fee19e6bf2ca529934db378773397510f0a2710c76f4b9c659c5f231fdb2ec

                                              • C:\Windows\SysWOW64\ko-KR\shell32.dll.mui

                                                Filesize

                                                288KB

                                                MD5

                                                6bbc2ca29605dc83bd8f86eee2a98539

                                                SHA1

                                                1e0c4b316426be15c289c1a9e486e9b3e3095f0e

                                                SHA256

                                                e037bafa4dcca2f458b91bbbb1b6eae0604c0ab89d2622dabcf06c8c2328887f

                                                SHA512

                                                9fc7139eef0a35f3c754251871b512d2fdf5f063ded8171f7a27fef0b465d0396437c04506c210adc3d82b2a1b8604e766220957aa5a09792c25e96ef352a6d9

                                              • C:\Windows\SysWOW64\slmgr.vbs

                                                Filesize

                                                107KB

                                                MD5

                                                574e64a8373ee84bef032e205725527e

                                                SHA1

                                                4e3f5b2f3330f3735cd019f764ef856f5208ac13

                                                SHA256

                                                f188be045a388b2c028592cd61399d6d082099c35c05b620e396faa5a20ff04a

                                                SHA512

                                                dad8d2a1e6ba7d9c0bb447dba365b3d41c09925b1bb5566dd9ac7ab9fcfea4c4e906ef0d01c7666e2b8f85249281d3cb08b34f518b799670d2203eeb08a1b857

                                              • C:\Windows\Temp\17329.tmp

                                                Filesize

                                                1.6MB

                                                MD5

                                                5870ea0d6ba8dd6e2008466bdd00e0f4

                                                SHA1

                                                d41bf60d0dedff90e3cfc1b41b7e1a73df39a7d5

                                                SHA256

                                                5a7dac8c8b5d7cf1115246dfaf994e7f50e16a7eac1488642396f5e23fddfe0d

                                                SHA512

                                                0c620d5e7383adcf979feccc3b1bad584a5cec8b3d74d0ace8bb786f1f04ba87fa70d59d041dc3833977d44a75f2070181d4054c7c0b9c4ce2d66249b4b3c837

                                              • memory/4520-5-0x0000000010000000-0x0000000010030000-memory.dmp

                                                Filesize

                                                192KB

                                              • memory/4520-0-0x0000000000400000-0x0000000000429000-memory.dmp

                                                Filesize

                                                164KB

                                              • memory/4520-597-0x0000000010000000-0x0000000010030000-memory.dmp

                                                Filesize

                                                192KB

                                              • memory/4520-596-0x0000000000400000-0x0000000000429000-memory.dmp

                                                Filesize

                                                164KB

                                              • memory/4520-594-0x0000000076830000-0x00000000769D0000-memory.dmp

                                                Filesize

                                                1.6MB