Analysis
-
max time kernel
9s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 11:30
Behavioral task
behavioral1
Sample
a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe
-
Size
4.3MB
-
MD5
88803d738899f52422d43240053ba7e0
-
SHA1
fc02fc3bffd0712ad724e92ee8d9afe6f3efafc4
-
SHA256
a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bc
-
SHA512
4580e57143df815867f3c4c8fb8ce9365e87513e3409b760710a5375c410c9d93f6e97a7baf6767c84eb3e4e564e84d906bae375e75c228b63cd8014d83a16f0
-
SSDEEP
98304:sygXkXYxIaRtFHHvSSSL+eHhXXinaWsEHGmStJyJR6Kg2BflXHxro:YOnaTFv/eHKaWsEHXSyJR3g2BpHxro
Malware Config
Signatures
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b93-2.dat floxif -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\ = "Adobe Flash Player" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\ComponentID = "Flash" flash.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\IsInstalled = 01000000 flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Version = "10.0.42.34" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Locale = "EN" flash.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000} flash.exe -
Possible privilege escalation attempt 30 IoCs
pid Process 4432 icacls.exe 4140 takeown.exe 2528 takeown.exe 2228 takeown.exe 3452 icacls.exe 3832 icacls.exe 1604 takeown.exe 1532 icacls.exe 3980 icacls.exe 1424 takeown.exe 552 icacls.exe 2464 takeown.exe 4848 takeown.exe 2708 takeown.exe 3712 takeown.exe 2964 takeown.exe 3212 takeown.exe 4640 takeown.exe 4464 takeown.exe 1208 takeown.exe 3368 takeown.exe 2500 takeown.exe 4704 takeown.exe 4512 takeown.exe 4836 icacls.exe 4584 takeown.exe 1636 takeown.exe 1120 icacls.exe 3776 takeown.exe 4412 icacls.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000c000000023b93-2.dat acprotect -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wrar391.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 6 IoCs
pid Process 4588 wrar391.exe 1668 uninstall.exe 2124 flash.exe 3608 GD.exe 4908 GD.exe 3348 GD.exe -
Loads dropped DLL 15 IoCs
pid Process 4520 a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe 2124 flash.exe 2124 flash.exe 2124 flash.exe 2124 flash.exe 2124 flash.exe 2124 flash.exe 2124 flash.exe 2124 flash.exe 2124 flash.exe 2124 flash.exe 2124 flash.exe 2124 flash.exe 5024 regsvr32.exe 4388 shutdown.exe -
Modifies file permissions 1 TTPs 30 IoCs
pid Process 4640 takeown.exe 4512 takeown.exe 3832 icacls.exe 3776 takeown.exe 1604 takeown.exe 1120 icacls.exe 552 icacls.exe 1424 takeown.exe 3212 takeown.exe 4140 takeown.exe 2228 takeown.exe 4432 icacls.exe 3452 icacls.exe 3368 takeown.exe 2528 takeown.exe 4704 takeown.exe 2708 takeown.exe 2464 takeown.exe 4584 takeown.exe 3712 takeown.exe 2964 takeown.exe 1208 takeown.exe 2500 takeown.exe 1532 icacls.exe 4836 icacls.exe 1636 takeown.exe 4848 takeown.exe 4412 icacls.exe 4464 takeown.exe 3980 icacls.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnceEx\001\1 = "REGEDIT /S C:\\Windows\\register.reg" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1AA53EE6-3170-4D34-A020-B6443A53A257} regsvr32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\slmgr.vbs cmd.exe File created C:\Windows\SysWOW64\ko-KR\shell32.dll.mui cmd.exe File created C:\Windows\SysWOW64\Macromed\Flash\Flash10d.ocx flash.exe File opened for modification C:\Windows\SysWOW64\Macromed\Flash\FlashUtil10d.exe flash.exe File created C:\Windows\SysWOW64\Macromed\Flash\uninstall_activeX.exe flash.exe File opened for modification C:\Windows\SysWOW64\ko-KR\themecpl.dll.mui cmd.exe File created C:\Windows\SysWOW64\ko-KR\Display.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\ko-KR\Display.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\Macromed\Flash\Flash10d.ocx flash.exe File created C:\Windows\SysWOW64\systemcpl.dll cmd.exe File created C:\Windows\SysWOW64\winver.exe cmd.exe File created C:\Windows\SysWOW64\user32.dll cmd.exe File opened for modification C:\Windows\SysWOW64\user32.dll cmd.exe File created C:\Windows\SysWOW64\ko-KR\themecpl.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\Macromed\Flash\install.log flash.exe File opened for modification C:\Windows\SysWOW64\systemcpl.dll cmd.exe File created C:\Windows\SysWOW64\sppcomapi.dll cmd.exe File opened for modification C:\Windows\SysWOW64\winver.exe cmd.exe File opened for modification C:\Windows\SysWOW64\ko-KR\shell32.dll.mui cmd.exe File created C:\Windows\SysWOW64\Macromed\Flash\FlashUtil10d.exe flash.exe File created C:\Windows\SysWOW64\slmgr.vbs cmd.exe File opened for modification C:\Windows\SysWOW64\sppcomapi.dll cmd.exe -
resource yara_rule behavioral2/memory/4520-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/files/0x000c000000023b93-2.dat upx behavioral2/memory/4520-5-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4520-597-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4520-596-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\WinRAR\File_Id.diz wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\WinRAR.chm wrar391.exe File created C:\Program Files (x86)\WinRAR\WinCon.SFX wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\UnRAR.exe wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats\7zxa.dll wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats\iso.fmt wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Default.SFX wrar391.exe File created C:\Program Files (x86)\WinRAR\Formats\z.fmt wrar391.exe File created C:\Program Files (x86)\WinRAR\Default.SFX wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Rar.txt wrar391.exe File created C:\Program Files (x86)\WinRAR\WinRAR.exe wrar391.exe File created C:\Program Files (x86)\WinRAR\WinRAR.chm wrar391.exe File created C:\Program Files (x86)\WinRAR\Formats\arj.fmt wrar391.exe File created C:\Program Files (x86)\WinRAR\Formats\tar.fmt wrar391.exe File created C:\Program Files (x86)\WinRAR\Order.htm wrar391.exe File created C:\Program Files (x86)\WinRAR\UnRAR.exe wrar391.exe File created C:\Program Files (x86)\WinRAR\Formats\bz2.fmt wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats\gz.fmt wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats\tar.fmt wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Order.htm wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\RAR.exe wrar391.exe File created C:\Program Files (x86)\WinRAR\rarnew.dat uninstall.exe File opened for modification C:\Program Files (x86)\WinRAR\RarExt64.dll wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\WinCon.SFX wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\File_Id.diz wrar391.exe File created C:\Program Files (x86)\WinRAR\License.txt wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\RarFiles.lst wrar391.exe File created C:\Program Files (x86)\WinRAR\Uninstall.exe wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats wrar391.exe File created C:\Program Files\Common Files\System\symsrv.dll a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe File created C:\Program Files (x86)\WinRAR\Formats\gz.fmt wrar391.exe File created C:\Program Files (x86)\WinRAR\Formats\uue.fmt wrar391.exe File created C:\Program Files (x86)\WinRAR\Zip_en-US.SFX wrar391.exe File created C:\Program Files (x86)\WinRAR\rarreg.key uninstall.exe File opened for modification C:\Program Files (x86)\WinRAR\rarreg.key uninstall.exe File opened for modification C:\Program Files (x86)\WinRAR\Descript.ion wrar391.exe File created C:\Program Files (x86)\WinRAR\RAR.exe wrar391.exe File created C:\Program Files (x86)\WinRAR\RarExtLoader.exe wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats\7z.fmt wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats\ace.fmt wrar391.exe File created \??\c:\program files\common files\system\symsrv.dll.000 a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe File created C:\Program Files (x86)\WinRAR\Formats\lzh.fmt wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Default_en-US.SFX wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR wrar391.exe File created C:\Program Files (x86)\WinRAR\__tmp_rar_sfx_access_check_240622546 wrar391.exe File created C:\Program Files (x86)\WinRAR\TechNote.txt wrar391.exe File created C:\Program Files (x86)\WinRAR\Formats\ace.fmt wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats\bz2.fmt wrar391.exe File created C:\Program Files (x86)\WinRAR\Formats\UNACEV2.DLL wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats\z.fmt wrar391.exe File created C:\Program Files (x86)\WinRAR\Default_en-US.SFX wrar391.exe File created C:\Program Files (x86)\WinRAR\Descript.ion wrar391.exe File created C:\Program Files (x86)\WinRAR\Uninstall.lst wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\Uninstall.lst wrar391.exe File created C:\Program Files (x86)\WinRAR\RarExt.dll wrar391.exe File created C:\Program Files (x86)\WinRAR\RarExt64.dll wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\WinCon_en-US.SFX wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\TechNote.txt wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\RarExtLoader.exe wrar391.exe File opened for modification C:\Program Files (x86)\WinRAR\RarExt.dll wrar391.exe File created C:\Program Files (x86)\WinRAR\Rar.txt wrar391.exe File created C:\Program Files (x86)\WinRAR\ReadMe.txt wrar391.exe File created C:\Program Files (x86)\WinRAR\Formats\cab.fmt wrar391.exe File created C:\Program Files (x86)\WinRAR\WinCon_en-US.SFX wrar391.exe -
Drops file in Windows directory 62 IoCs
description ioc Process File opened for modification C:\Windows\IEMaximizer.dll cmd.exe File created C:\Windows\rescache\_merged\1102129660\345889209.pri mcbuilder.exe File created C:\Windows\rescache\_merged\1008669510\1734134314.pri mcbuilder.exe File opened for modification C:\Windows\N7\BD.cmd cmd.exe File created C:\Windows\rescache\_merged\242531539\609458986.pri mcbuilder.exe File created C:\Windows\winsxs\x86_microsoft-windows-shell32.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_2bba41a8e9e5ffdb\shell32.dll.mui cmd.exe File created C:\Windows\rescache\_merged\2285375612\822456485.pri mcbuilder.exe File created C:\Windows\rescache\_merged\2879188601\1382411678.pri mcbuilder.exe File created C:\Windows\rescache\_merged\3983011459\1580804228.pri mcbuilder.exe File created C:\Windows\rescache\_merged\2360802049\1299715264.pri mcbuilder.exe File opened for modification C:\Windows\REGISTER.reg cmd.exe File created C:\Windows\N7\AD.cmd cmd.exe File created C:\Windows\N7\GD.exe cmd.exe File created C:\Windows\rescache\_merged\1910676589\260453855.pri mcbuilder.exe File created C:\Windows\rescache\_merged\2229298842\2338367480.pri mcbuilder.exe File created C:\Windows\rescache\_merged\2263554406\1489458240.pri mcbuilder.exe File created C:\Windows\rescache\_merged\899128513\278537531.pri mcbuilder.exe File created C:\Windows\winsxs\x86_microsoft-windows-themecpl.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_60d6493e5ec01332\themecpl.dll.mui cmd.exe File created C:\Windows\winsxs\amd64_microsoft-windows-display.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_c9a77b62978c68da\Display.dll.mui cmd.exe File created C:\Windows\rescache\_merged\431186354\664160052.pri mcbuilder.exe File created C:\Windows\rescache\_merged\64831148\1708141201.pri mcbuilder.exe File opened for modification C:\Windows\N7\TD.cmd cmd.exe File created C:\Windows\winsxs\amd64_microsoft-windows-themecpl.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_bcf4e4c2171d8468\themecpl.dll.mui cmd.exe File created C:\Windows\rescache\_merged\92721896\1006516967.pri mcbuilder.exe File created C:\Windows\rescache\_merged\3252231599\1102529190.pri mcbuilder.exe File opened for modification C:\Windows\N7\GD.exe cmd.exe File created C:\Windows\N7\BD.cmd cmd.exe File created C:\Windows\rescache\_merged\3214612860\191226432.pri mcbuilder.exe File created C:\Windows\rescache\_merged\2782477206\3183301228.pri mcbuilder.exe File created C:\Windows\rescache\_merged\3200614358\91508946.pri mcbuilder.exe File created C:\Windows\winsxs\x86_microsoft-windows-display.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_6d88dfdedf2ef7a4\Display.dll.mui cmd.exe File created C:\Windows\rescache\_merged\2530935351\2043112024.pri mcbuilder.exe File created C:\Windows\rescache\_merged\1691975690\289124040.pri mcbuilder.exe File created C:\Windows\rescache\_merged\3977956527\660711251.pri mcbuilder.exe File created C:\Windows\rescache\_merged\2965031256\2186393681.pri mcbuilder.exe File created C:\Windows\rescache\_merged\1712550052\1566146761.pri mcbuilder.exe File created C:\Windows\rescache\_merged\3479232320\10984804.pri mcbuilder.exe File opened for modification C:\Windows\N7\AD.cmd cmd.exe File created C:\Windows\rescache\_merged\3937681233\2629454849.pri mcbuilder.exe File created C:\Windows\rescache\_merged\3246022523\1026222830.pri mcbuilder.exe File created C:\Windows\rescache\_merged\1045417640\1970411053.pri mcbuilder.exe File created C:\Windows\N7\TD.cmd cmd.exe File created C:\Windows\rescache\_merged\2939201637\2780454293.pri mcbuilder.exe File created C:\Windows\rescache\_merged\4245263321\972629028.pri mcbuilder.exe File created C:\Windows\REGISTER.reg cmd.exe File created C:\Windows\winsxs\amd64_microsoft-windows-shell32.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_87d8dd2ca2437111\shell32.dll.mui cmd.exe File created C:\Windows\rescache\_merged\1936697710\3765975002.pri mcbuilder.exe File created C:\Windows\rescache\_merged\3970336390\2852777008.pri mcbuilder.exe File created C:\Windows\rescache\_merged\3628602599\4114135626.pri mcbuilder.exe File created C:\Windows\rescache\_merged\2137598169\2220136654.pri mcbuilder.exe File created C:\Windows\rescache\_merged\1945310375\2859827603.pri mcbuilder.exe File created C:\Windows\rescache\_merged\1649057605\2370279289.pri mcbuilder.exe File created C:\Windows\rescache\_merged\1902349548\2095009400.pri mcbuilder.exe File created C:\Windows\IEMaximizer.dll cmd.exe File created C:\Windows\rescache\_merged\205257784\1090160821.pri mcbuilder.exe File created C:\Windows\rescache\_merged\3031988681\2910786296.pri mcbuilder.exe File created C:\Windows\rescache\_merged\2899339121\3421633766.pri mcbuilder.exe File created C:\Windows\rescache\_merged\2928961003\3648374783.pri mcbuilder.exe File created C:\Windows\rescache\_merged\4278325366\997494378.pri mcbuilder.exe File created C:\Windows\rescache\_merged\2181205234\223941317.pri mcbuilder.exe File created C:\Windows\rescache\_merged\942976607\1045346277.pri mcbuilder.exe File created C:\Windows\rescache\_merged\482193516\3536622724.pri mcbuilder.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3596 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flash.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x0002000000022b13-264.dat nsis_installer_1 -
Modifies File Icons 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Shell Icons reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}\Policy = "3" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}\AppPath = "C:\\Windows\\SysWow64\\Macromed\\Flash" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}\AppName = "FlashUtil10d.exe" flash.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000} flash.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Compatibility Flags = "0" flash.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32} flash.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Shell Icons\29 = "C:\\Windows\\System32\\imageres.dll,196" reg.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 regedit.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "194" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E regedit.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\MuiCached regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\WinRAR32 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r06 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DC12326E-E897-4E2E-A51C-25F07F8A57BE}\1.0\HELPDIR\ = "C:\\Windows" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID\ = "ShockwaveFlash.ShockwaveFlash" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DC12326E-E897-4E2E-A51C-25F07F8A57BE}\1.0\ = "IEMaximizer 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDA9221C-1B37-4562-B26A-3DED14C8FDDA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command\ = "\"C:\\Program Files (x86)\\WinRAR\\WinRAR.exe\" \"%1\"" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\Macromed\\Flash" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\TypeLib\Version = "1.1" flash.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r26 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mfp flash.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}\TypeLib flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.7z\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bz2\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MacromediaFlashPaper.MacromediaFlashPaper\CLSID flash.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.7z uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} flash.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r13 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\ = "RAR ?? ??" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.3\ = "Shockwave Flash Object" flash.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000} flash.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\FLAGS flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r27 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cab\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\ = "FlashBroker" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\ = "IFlashAccessibility" flash.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR32 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\TypeLib flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1AA53EE6-3170-4D34-A020-B6443A53A257}\ = "IEMaximizerObj Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r19 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r19\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bz\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.1\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.spl\ = "ShockwaveFlash.ShockwaveFlash" flash.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.4 flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}\ = "IFlashBroker3" flash.exe Key deleted \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\MuiCache regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-shockwave-flash\CLSID = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r22 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.lzh uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r20 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rar\ShellNew\FileName = "C:\\Program Files (x86)\\WinRAR\\rarnew.dat" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\ = "IShockwaveFlash" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\Macromed\\Flash\\FlashUtil10d.exe" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r23\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.1\ = "Shockwave Flash Object" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\TypeLib\ = "{D27CDB6B-AE6D-11CF-96B8-444553540000}" flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\TypeLib\ = "{D27CDB6B-AE6D-11CF-96B8-444553540000}" flash.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MacromediaFlashPaper.MacromediaFlashPaper\shell\open\command flash.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0 flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.4\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" flash.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash flash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\TypeLib\Version = "1.0" flash.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32 flash.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DC12326E-E897-4E2E-A51C-25F07F8A57BE}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe -
Modifies registry key 1 TTPs 33 IoCs
pid Process 3980 reg.exe 1996 reg.exe 2452 reg.exe 3680 reg.exe 1492 reg.exe 2252 reg.exe 1784 reg.exe 4888 reg.exe 4708 reg.exe 2768 reg.exe 4832 reg.exe 4596 reg.exe 1312 reg.exe 1084 reg.exe 3584 reg.exe 4552 reg.exe 1900 reg.exe 712 reg.exe 4332 reg.exe 3660 reg.exe 3144 reg.exe 4432 reg.exe 4480 reg.exe 1848 reg.exe 2316 reg.exe 4408 reg.exe 3520 reg.exe 964 reg.exe 1436 reg.exe 920 reg.exe 2472 reg.exe 4384 reg.exe 4768 reg.exe -
Runs .reg file with regedit 2 IoCs
pid Process 1428 regedit.exe 1188 regedit.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1512 schtasks.exe 3472 schtasks.exe 1784 schtasks.exe 3676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4520 a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe 4520 a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 4520 a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe Token: SeTakeOwnershipPrivilege 4640 takeown.exe Token: SeTakeOwnershipPrivilege 4512 takeown.exe Token: SeTakeOwnershipPrivilege 1424 takeown.exe Token: SeTakeOwnershipPrivilege 3776 takeown.exe Token: SeTakeOwnershipPrivilege 4584 takeown.exe Token: SeTakeOwnershipPrivilege 4464 takeown.exe Token: SeTakeOwnershipPrivilege 4140 takeown.exe Token: SeTakeOwnershipPrivilege 1208 takeown.exe Token: SeTakeOwnershipPrivilege 3368 takeown.exe Token: SeTakeOwnershipPrivilege 2500 takeown.exe Token: SeTakeOwnershipPrivilege 2528 takeown.exe Token: SeTakeOwnershipPrivilege 4704 takeown.exe Token: SeTakeOwnershipPrivilege 1636 takeown.exe Token: SeTakeOwnershipPrivilege 1604 takeown.exe Token: SeTakeOwnershipPrivilege 2708 takeown.exe Token: SeTakeOwnershipPrivilege 2228 takeown.exe Token: SeTakeOwnershipPrivilege 3712 takeown.exe Token: SeSecurityPrivilege 2636 mcbuilder.exe Token: SeShutdownPrivilege 4388 shutdown.exe Token: SeRemoteShutdownPrivilege 4388 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2368 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 408 4520 a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe 86 PID 4520 wrote to memory of 408 4520 a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe 86 PID 4520 wrote to memory of 408 4520 a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe 86 PID 408 wrote to memory of 4708 408 cmd.exe 88 PID 408 wrote to memory of 4708 408 cmd.exe 88 PID 408 wrote to memory of 4708 408 cmd.exe 88 PID 408 wrote to memory of 4588 408 cmd.exe 89 PID 408 wrote to memory of 4588 408 cmd.exe 89 PID 408 wrote to memory of 4588 408 cmd.exe 89 PID 4588 wrote to memory of 1668 4588 wrar391.exe 90 PID 4588 wrote to memory of 1668 4588 wrar391.exe 90 PID 4588 wrote to memory of 1668 4588 wrar391.exe 90 PID 408 wrote to memory of 2124 408 cmd.exe 91 PID 408 wrote to memory of 2124 408 cmd.exe 91 PID 408 wrote to memory of 2124 408 cmd.exe 91 PID 408 wrote to memory of 5024 408 cmd.exe 93 PID 408 wrote to memory of 5024 408 cmd.exe 93 PID 408 wrote to memory of 5024 408 cmd.exe 93 PID 408 wrote to memory of 3608 408 cmd.exe 170 PID 408 wrote to memory of 3608 408 cmd.exe 170 PID 408 wrote to memory of 3608 408 cmd.exe 170 PID 408 wrote to memory of 4572 408 cmd.exe 95 PID 408 wrote to memory of 4572 408 cmd.exe 95 PID 408 wrote to memory of 4572 408 cmd.exe 95 PID 408 wrote to memory of 684 408 cmd.exe 96 PID 408 wrote to memory of 684 408 cmd.exe 96 PID 408 wrote to memory of 684 408 cmd.exe 96 PID 408 wrote to memory of 3348 408 cmd.exe 172 PID 408 wrote to memory of 3348 408 cmd.exe 172 PID 408 wrote to memory of 3348 408 cmd.exe 172 PID 408 wrote to memory of 116 408 cmd.exe 98 PID 408 wrote to memory of 116 408 cmd.exe 98 PID 408 wrote to memory of 116 408 cmd.exe 98 PID 408 wrote to memory of 4388 408 cmd.exe 99 PID 408 wrote to memory of 4388 408 cmd.exe 99 PID 408 wrote to memory of 4388 408 cmd.exe 99 PID 408 wrote to memory of 2880 408 cmd.exe 100 PID 408 wrote to memory of 2880 408 cmd.exe 100 PID 408 wrote to memory of 2880 408 cmd.exe 100 PID 408 wrote to memory of 2368 408 cmd.exe 101 PID 408 wrote to memory of 2368 408 cmd.exe 101 PID 408 wrote to memory of 2368 408 cmd.exe 101 PID 408 wrote to memory of 2944 408 cmd.exe 102 PID 408 wrote to memory of 2944 408 cmd.exe 102 PID 408 wrote to memory of 2944 408 cmd.exe 102 PID 408 wrote to memory of 1120 408 cmd.exe 178 PID 408 wrote to memory of 1120 408 cmd.exe 178 PID 408 wrote to memory of 1120 408 cmd.exe 178 PID 408 wrote to memory of 400 408 cmd.exe 104 PID 408 wrote to memory of 400 408 cmd.exe 104 PID 408 wrote to memory of 400 408 cmd.exe 104 PID 408 wrote to memory of 2252 408 cmd.exe 180 PID 408 wrote to memory of 2252 408 cmd.exe 180 PID 408 wrote to memory of 2252 408 cmd.exe 180 PID 408 wrote to memory of 1612 408 cmd.exe 106 PID 408 wrote to memory of 1612 408 cmd.exe 106 PID 408 wrote to memory of 1612 408 cmd.exe 106 PID 408 wrote to memory of 1784 408 cmd.exe 182 PID 408 wrote to memory of 1784 408 cmd.exe 182 PID 408 wrote to memory of 1784 408 cmd.exe 182 PID 408 wrote to memory of 2132 408 cmd.exe 108 PID 408 wrote to memory of 2132 408 cmd.exe 108 PID 408 wrote to memory of 2132 408 cmd.exe 108 PID 408 wrote to memory of 4596 408 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe"C:\Users\Admin\AppData\Local\Temp\a94fa23474bd3f64442455765bd9249917c259020ee897ada5f948891b99c9bcN.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Install.bat" "2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\001 /V 1 /D "REGEDIT /S C:\Windows\register.reg" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\wrar391.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\wrar391.exe /s3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files (x86)\WinRAR\uninstall.exe"C:\Program Files (x86)\WinRAR\uninstall.exe" /setup4⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1668
-
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\flash.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\flash.exe /s3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:2124
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 IEMaximizer.dll /s3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5024
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Icons" /v 29 /d C:\Windows\System32\imageres.dll,196 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies File Icons
- Modifies Shortcut Icons
PID:3608
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "EditionID"3⤵PID:4572
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I "Starter"3⤵PID:684
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "EditionID"3⤵
- System Location Discovery: System Language Discovery
PID:3348
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I "HomeBasic"3⤵PID:116
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "EditionID"3⤵PID:4388
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I "HomePremium"3⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "EditionID"3⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I "Professional"3⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "EditionID"3⤵
- System Location Discovery: System Language Discovery
PID:1120
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I "Ultimate"3⤵
- System Location Discovery: System Language Discovery
PID:400
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2252
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I ACRSYS3⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1784
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I DSGLTD3⤵
- System Location Discovery: System Language Discovery
PID:2132
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4596
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I ALWARE3⤵PID:3040
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:3520
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I BENQ3⤵
- System Location Discovery: System Language Discovery
PID:4592
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:964
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I DELL3⤵
- System Location Discovery: System Language Discovery
PID:4624
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:712
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I ASUS3⤵PID:4896
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:3144
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I FOUNDR3⤵
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1312
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I FSC3⤵
- System Location Discovery: System Language Discovery
PID:1332
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3980
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I FUJ3⤵PID:3296
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:4432
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I HPQ3⤵PID:4636
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1436
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I LENOVO3⤵PID:4008
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:1084
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I MEDION3⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:4480
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I MSI3⤵PID:3008
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:4888
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I NOKIA3⤵PID:4804
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4408
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I SECCSD3⤵PID:4428
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3584
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I Sony3⤵
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2768
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I TOSASU3⤵PID:2764
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1996
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I TOSCPL3⤵
- System Location Discovery: System Language Discovery
PID:1076
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:1848
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I TOSINV3⤵PID:3200
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:4552
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I TOSQCI3⤵PID:1372
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:920
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I AVERATEC3⤵PID:4048
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:2452
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I JOOYON3⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:2472
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I LG3⤵PID:2140
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:4384
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I NEC3⤵
- System Location Discovery: System Language Discovery
PID:4260
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3680
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I SHARP3⤵
- System Location Discovery: System Language Discovery
PID:5080
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:2316
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I TCL3⤵PID:4104
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4768
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I HASEE3⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:1492
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I GBT3⤵PID:4292
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:4332
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I haier3⤵PID:2596
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- Modifies registry key
PID:3660
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I QUANMX3⤵PID:3264
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1900
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I THTFPC3⤵PID:976
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\HARDWARE\ACPI\RSDT3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4832
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I TRIGEM3⤵
- System Location Discovery: System Language Discovery
PID:1164
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\System32\slmgr.vbs -ipk3⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\GD.exedata\N7\Tasks\GD.exe /y3⤵
- Executes dropped EXE
PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\GD.exedata\N7\Tasks\GD.exe /m3⤵
- Executes dropped EXE
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\N7\Tasks\GD.exedata\N7\Tasks\GD.exe /d3⤵
- Executes dropped EXE
PID:3348
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\N7\AD.cmd3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\N7\AD.cmd /deny everyone:f3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1532
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\N7\BD.cmd3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3212
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\N7\BD.cmd /deny everyone:f3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:552
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\N7\GD.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2464
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\N7\GD.exe /deny everyone:f3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1120
-
-
C:\Windows\SysWOW64\sc.exesc config sppsvc start= demand3⤵
- Launches sc.exe
PID:3596
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask" /f3⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask1" /xml data\N7\Tasks\SvcRestartTask1.xml /ru System /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask2" /xml data\N7\Tasks\SvcRestartTask2.xml /ru System /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1784
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask3" /xml data\N7\Tasks\SvcRestartTask3.xml /ru System /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3676
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask4" /xml data\N7\Tasks\SvcRestartTask4.xml /ru System /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1512
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe interface tcp set global autotuninglevel=highlyrestricted3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2868
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s data\Option\Prefetch1.reg3⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1428
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\Temp /r /d y3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4848
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\Temp /t /grant everyone:f3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3980
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System32\slmgr.vbs3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32\slmgr.vbs /grant everyone:f3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4432
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System32\systemcpl.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32\systemcpl.dll /grant everyone:f3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System32\sppcomapi.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32\sppcomapi.dll /grant everyone:f3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3832
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System32\winver.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32\winver.exe /grant everyone:f3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4836
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System32\user32.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32\user32.dll /grant everyone:f3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4412
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ko-kr\shell32.dll.mui"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\SysWOW64\ko-kr\shell32.dll.mui"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ko-kr\themecpl.dll.mui"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\SysWOW64\ko-kr\themecpl.dll.mui"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ko-kr\Display.dll.mui"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\SysWOW64\ko-kr\Display.dll.mui"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\winsxs\x86_microsoft-windows-shell32.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_2bba41a8e9e5ffdb"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\winsxs\amd64_microsoft-windows-shell32.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_87d8dd2ca2437111"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\winsxs\x86_microsoft-windows-themecpl.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_60d6493e5ec01332"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\winsxs\amd64_microsoft-windows-themecpl.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_bcf4e4c2171d8468"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\winsxs\x86_microsoft-windows-display.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_6d88dfdedf2ef7a4"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\winsxs\amd64_microsoft-windows-display.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_c9a77b62978c68da"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s data\Shortcut\MuiCache.reg3⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Runs .reg file with regedit
PID:1188
-
-
C:\Windows\SysWOW64\mcbuilder.exeC:\Windows\System32\mcbuilder.exe3⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del C:\Windows\Prefetch\*.* 1>nul"3⤵
- System Location Discovery: System Language Discovery
PID:3536
-
-
C:\Windows\SysWOW64\shutdown.exeSHUTDOWN -R -F -T 003⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38e2855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2368
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5e8ec8d1e5f0e78752a8b82822bb75f76
SHA1eae3513a3e56e8b99761a0cd44c1f9828e2da293
SHA2567c1fe0d8f6c802da18aa0f37902c1559a29c5073246e28258eb89f7983aaa643
SHA512d7b84eb535762ca6b422e2cab59fcc3c02cd07b03ff432f68212aa5c8eac879567ffcb21ed3aacd655d58d18307f9f343df4013a9fbeb5d168184ddd69089ee8
-
Filesize
117KB
MD549799aa663bf45a3c37dd739a5116d81
SHA1ac088d8134ccbd9d1df3794c16f9778a3d588c56
SHA256369e163608ecc4edec6a476ae5935b16230210de2f637b1eff03565214277632
SHA512c525396822b23d4a11866239cdce33aa1c8e5d373f0ccb36a2196e5dcd9a9e5b287caa8aeb542e079b397018a45973c01ab3326a5228d2f607bdbffbd1446cd6
-
Filesize
309KB
MD566a2ed9fa095a68fdbed52151d096bbf
SHA149d8a6375078deb929070643dd205b276a77d82c
SHA256bd58f7952f7e92ef7ae0367f1ec0090473ab4587e27e83d4856c650325bb71da
SHA5123dc4c603ba044c7fcaa5d4187ffa10952771f5694ca114c69057f99d3fdc56b79647d833285083419842822e64329115a26066866fdd814268d6392689c07c63
-
Filesize
999KB
MD531ae4919723e41ae26a0ca390489c508
SHA1c36b00ad8bc7486a95935c4fb1bb45a70b4e4f92
SHA25668937e03154d4957e7280ad29951047509ddbd0a00210570478270a84cc12096
SHA512bd0c5e32159929ba1b0f966fed8a9d96ffed8ad080c359e65c39705025328627682f3d6ba507a5d1b96f9d5ad72ebdd6e68fd0a021cc39d31f9ac6918ab78a96
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
2KB
MD5172c78e78366f8dcbe4c4a5546bad60b
SHA167022b142bd1a0248206d1d10da3d51f88b4e1ef
SHA2564a99e456460a326f2659706f031efe268d0dfabfb40f77d84dde6a5ba0e6e664
SHA5124dc34aad5783835ac64328b9b351af8f1dfa6372ea5403582d62bc48398e5d56a169aef4fcce24e28ec04c64fbee1352ff433645f0e8faae438dd392e15fa6a4
-
Filesize
48KB
MD58bda56f78a481b0b82cbee68b0e21e6b
SHA1738c4cac60703a918b7be5f3024b93662f2803e1
SHA25698d17e31e263dce151255413a73dc8db0d6ba9a3325cc9b243a516caa3b5d7d9
SHA5128b5426b231bedeffb4e9f7c3896fd5cc56299830e6a6d0975d4b7c211cb1bc14ce48619867baec3a707199f5fd175eed6f6331b34a196d93929480ce100bbbe1
-
Filesize
18KB
MD59c671c46f977dd5967c95d110c022c6e
SHA142bafcbe214731c82e5199a7a6b918204ae8874e
SHA2567088a6d70b9b90638ff569cafcab4f15466f4157e48f59301e266c39fb7981d0
SHA51214080eccef9103323722d7abe4ad2e17920313ca3763be7238bf20cb76b0f55de64638b71dcff9a971b5b5bdbc0f4392bf214f6e1937c857157ea6cb3be33373
-
Filesize
9KB
MD563020cbe973fa1ad07d932f7b1ffe54b
SHA143e7cef771362ba633c0f8ef569b42dacb3c8f62
SHA256ba66da2025be4dfab3ffd08c4b4b2f5bc0511e9d784a993f4e6b9854a98cce3e
SHA512ee3c135d7e527f9b877e22fbcae20f667511600a1ffd1b11e40ffac032291ee3180480f407f2232689ceebc5d481759a7fe1804e88a6abdc4b1707775eda9dd8
-
Filesize
958B
MD554d60650b4eb2f3ef4e751b08ef7c625
SHA19a612c4387eb5ab685f216826ba7d678817291ca
SHA2566b1b29b19c4b1fde2503aa71f52c46643ad6267d835bbeef4fa2b4178ef50da2
SHA512e29c6a939eedbaee591f37b65e4658210eab081b752394deb20856e0f9913f5f437ce479a81ee27aea824c06cfec5b4984bc42d25988d2349ada54ae646129f3
-
Filesize
261B
MD564f19535d32b3df27bd0e4c8988eb90c
SHA179671f917cd93f5d44d5d63458474c433e279648
SHA256bbe6e8ed9a625ed8364374b92dff3c1dd032177ce797857f851aa081ef1e89ee
SHA512041d52db4602d446bcc92ce1380ae76e40e2108fac8fe031a46f4eb6cc654af5bdb4e1d5c48fa74bf83bd58b317e316080d91d2782dc412f1c636785163b761c
-
Filesize
188KB
MD5849c3feba650d42a5a7ac46062d59c54
SHA1a4396db103cd5841915a37a52cc827e90c4c368f
SHA256623adc6fa585a467cfe67ca27629bf1ae2a9056103f3edcc71ca07fd223b8512
SHA512a1b6ecfa25d31389dee930fea400ccb7085fbcb52f193d7a8fb768be7ccafe73747a7980caf56de2e1e762f4ef7660fb4659e74dd7288135e77cefa330edaa67
-
Filesize
3KB
MD54999ae501e729ed8c34a0f6984b8b83a
SHA1336f033bce30edcff75a696252ffcc19f368ba5f
SHA256476ca80be8e0921303fabfa69c941c1c3019754f70eb5f2ab0820af6f4e5d4a3
SHA512e2060469be064242539c55b6c7dbec22cbdce6d1feaad56ffec3d56b7045fab60df683c06afd54a73c45a5ebe9e1e8b5d1f8e73b897945da941ab3cf08eb8112
-
Filesize
3KB
MD501027180a6a26c5a2e3bf551f1dc7c44
SHA19b01c13025713a3fb00467e3d0176c742240c4f0
SHA256b2ffd969413c208f1a69812055182506c887c7769794ca686ce68e66a2e87bf6
SHA512bba113a44768731ad6e6a64839c07d026e03be14359749850bdd9549b9714f0336d6c27bab0d725913f1cbfdfbec694269d224807066ae68a50e1aa66c522f5d
-
Filesize
3KB
MD5a293dbb2f8d2b1cf104cc5069bdc72e0
SHA142ef5370901fbac970633f44d11312670a2b4781
SHA256a0ee763e8ca1a446d13a34cc14348c897b90053903fcf4bc415c6c20ecf3ef99
SHA5129331f66eccbefc19b66bd983bf26c830901a9bb5ca33fbeeb821fc36c1722484cf9301e0d732133738b134461c537bd4a350fbf2d4be5ea07bb668cff389b4e1
-
Filesize
3KB
MD5a34211b7e172d80ac6db1d1ab87fbb6d
SHA1a7979e0a0d2122430081c4a06d73526095b54580
SHA256bdd78e2045f43717423b66a338b0a5815359c13eedca5a6a70b79c3440682689
SHA512d0285a77f7dc2042f49da61ba0d3d336024375d43b0b64bdc3e94ce47ba96b9b415ddcd90da43fd99381a0f3082f6f418e47163b1d683dd062e006eb82c263b4
-
Filesize
395B
MD5bdad2ade38f1dc5981087777b338e327
SHA10699e002c935d9b46df7a35bc8f0ec8b031e1027
SHA256892d46ea5fd5547fa057fbbc09ef7ea8eca66d513cb80652310d9524b95dfc3f
SHA51298c5a1c0f1aa9f5255034a8d34e45a6a913e53f704dc185c7032933b8f9af0eec7bca87b5b806103bc84b62aaebc15f92efccc1c44bcc93a5eb2d3ccc9018d99
-
Filesize
1024B
MD569d9d1785ec1f5032538f2696210e2e2
SHA17dacc1c0fb5ca9e92fc1fcd90a23d74b75042c00
SHA256444d4dfb574dcc145067b19763befd65d0e6ad9a7bb1423c92ef4ff4f6638145
SHA51282839d76bc10dbc8849fc3879b3c776e218ed4d8496a40226116aa64798bdac41173a2dada4cc4478776c82af69cc5de541cd71fdc03eeb0301768dec0ef9e53
-
Filesize
410KB
MD5911eb55f9f74a6383983e0a6a8a2772d
SHA15f40c2e1ff4e6a544ed160b355b6673925d66741
SHA2563ab580c2f8d5588ced041a96b686c88987f8217283066e408d5092f0eac7c079
SHA5120cec6c11552936c9af72b9eb8ac7d12abfde1caea99471e421375926705a4427df4727b0645663c6a267d2957ad741e29c5f74950bfa6adeaf1754eb061b390a
-
Filesize
985KB
MD5e573bd9ab55c8e333c202b9e255f972e
SHA1460bde795885134b48465dc73797db695af33e1f
SHA25679bec0da770265d1a525330b2e732e055edde617bcc2848c2742492f9dbc881e
SHA512bcae097591cbc66e20771ef69e6544e5f951e0821b8d2a4779e524c542e5ad1d75ff683a15a76f5577e1e1389f4058cd36da7d0c785c504b2305cc144dc7b4bf
-
Filesize
12KB
MD57941f0c4bd4004269b268e66752dac9b
SHA16accf1d9b5981eb12a22c530c3d37be9ca54c415
SHA25606c59055bd2d5bc2fc1950abb377b0aa33f74d8faab3ee074d54a2f8a93e38d2
SHA512c8a720341ffeb39939d18c7d9f1c298554db5768d34bb24bfdf6f9f66ddbfb1884b7b20c30229cacc674856acf032081d55be4738bd7be7e1acbd781b25272a9
-
Filesize
582B
MD5f2e7e95075c04b3bec89118952aeacf9
SHA1669fcdbe70dced5524c91b631d7241b9ec0e1d8d
SHA256a568d9604a56f35a3726636cd33c69ad48f607f55744565ba613addc432f1165
SHA512a3121c0ea0afdae0a231df264745f90ae7660107ff24145e87d722a61b8497bdffc45cb9e2f13e4b5c0e96f577ac08b105a57015b14f8cc8575343d341776b56
-
Filesize
862B
MD591bd16ffa806694171e89ce6bf40ce5f
SHA14d776c6e5b565a2002f8559f77b5320fa8420b72
SHA25606b91106a4169ee981a38915e694b6409f7c8cf11fef3ee845d218c32d71e509
SHA512c9ed43ad2d7b0c7373fab8f14bf3a50b8541d730598cda4ef6af36724ed6a65ae2e5a81567de196f30f90b073a48ac61b3fc72ca14908f63a45092f33e48e61d
-
Filesize
10KB
MD57e74f142b1aaca35c3c6cf28b6a40b86
SHA15fb838b42fd9268f95769a301ea214519f144768
SHA2563bb9a3802f2a5aae367d46d39d478f0cd15fd7b1208acbbb7fca5426fdc6aba8
SHA512c5f3b19330d8f61a721fe1f94d39477a3ed45406ce9cef92dd599dd860381081ed211fd37b13457c5a8b4ca6db466f22e91a1e72a67f3444804a076a67084019
-
Filesize
288KB
MD51ffdf30fd8c8a747fd9add1497530072
SHA163954a4f3703a07e126a4dc345ac6ea1ac090d77
SHA2567dc85b3a6324c3b5ad8b5b6be9ffb87b7cf15c6f0b0ff2376a8fa1242e791208
SHA51299729dc858d885c258af44ad3492456644eb84ce0a772137ce1a9d4ca0e5765eb1d5d49351c943e4e21456f9a5775404effdc5649a8cc53e4c972d5b05be0961
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\Shortcut\x64\winsxs\amd64_microsoft-windows-display.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_c9a77b62978c68da\Display.dll.mui
Filesize10KB
MD5827d5f1094f6fb7ac4252dbeb193e9e9
SHA110e3b1eb59cdda5aa79f5d78dfc5269d1c8c15c3
SHA256a6fd479ff612d294eb72597f434aed310ae06a6226de49368af077fe843a0bff
SHA512717ca7697c66c94d1874fae1202db37a2269a63df0235705def1e05289a2f56c400d0f55ae68333aa3386e2625857f844d38cf9eadea09850da36287cb5d18a0
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\Shortcut\x64\winsxs\amd64_microsoft-windows-themecpl.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_bcf4e4c2171d8468\themecpl.dll.mui
Filesize9KB
MD5c6e7e1674fd77fe944dc40ccf5fb8ab3
SHA170dfa87edeb19f11a4f8c423a32749c43df580b1
SHA2569bd7b658137b2320eb25af1fdfd3f439fb57a5893f6d8429bd785ee468e66e78
SHA512fd2ce2b54e1fa446461eda5f1c4c93e8de0fe2ea0b76d3f29afaf1fa8d01796ac3e865b5ee526d17b31a42bcab67e5a3b7abd2a1edcaba89e05f9d6f282e7d8e
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\data\Shortcut\x64\winsxs\x86_microsoft-windows-themecpl.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_60d6493e5ec01332\themecpl.dll.mui
Filesize9KB
MD5f7f931c5ac61c58a794b1cc7b064e095
SHA184adfebd384a8c0821188d0c724469835fe7f574
SHA256a94c0c8aeef54296a3662a744be2ab6f8c078a216c044aed047ac2555f1f71f5
SHA512819099165a84162bc9f91d5ef9da9c029c0606d4e43e4e29068af021960eb41ff3700358fc29760333c2879cb41a6a95ccb170d6a8638c2449917eca5cba0ca3
-
Filesize
288KB
MD5388ab00bc5a69f77f6ed8d1fd8ace855
SHA1549b86c3087e98c13cb7cf4b7e718c6fbb8e92cb
SHA256beeb3badd1b569dbcf601d5cd02527c8a57ede2c5a9f6d42e1a6d02f8cb1c12e
SHA512bf3319ffd33c6a6483351496382792129f5f23acaf55a9a380b056860913a2eb5957e4f9dd842972e0d15e0e18f6846ac0618df71362ac501036ad0c7dd6cec0
-
Filesize
1.9MB
MD5128ada8119b4f860e1aca1891e8abde2
SHA1f4ec0e95099e354fd01cd3bb27c202f54932dc70
SHA256016b77d19d9fde6f7d5b477eb7008df80c51ff02acb5f950c986e45a0c2a78d3
SHA51233df2213fb8580fa2f377f0f9a5d8c526a0e018998bd64e85a0b3db6aedc5536224b87097e8af75f3845e45ce0032174f08346b154e5de94578cfbfba9c4375f
-
Filesize
509B
MD5a508f08707b56a83b2e17c88694cf9f6
SHA1eb767de79732e94769d146ddd70dbd94db390ab5
SHA256510929488b7ef3827fde8860369cd867b2b02d48c7e4bbb86db48eb833bcee4a
SHA51245a0b54bbd5281a9e392aa051c5e601e015496da4f4c5aef841e9eb10bbee03dbec88f3d6c901f29f5962fb05cd16efdd7cb19fa6bd99718a6e57cf77b8af83e
-
Filesize
1.4MB
MD59fd58d13b4543c52685d4f77bebb34c1
SHA19b227de95bfbf859abeb22502a447948f2e6f5ac
SHA2567548334ef0a06989c22003af8a9bfd9a74e8026fa422bbc7dfeddc42d2221712
SHA512f580500c0154f606bed5a914ec86ebbe72c0064892c980ee8e9d65b53ea5e37da9523616901c168846aca91f4b7ce4cf5a30bd67406c739939b8bbc9f3ef930e
-
Filesize
17KB
MD52b8574f6a8f5de9042baa43c069d20ba
SHA107959da0c6b7715b51f70f1b0aea1f56ba7a4559
SHA25638654eef0ee3715f4b1268f4b4176a6b487a0a9e53a27a4ec0b84550ea173564
SHA512f034f71b6a18ee8024d40acd3c097d95c8fd8e128d75075cc452e71898c1c0322f21b54bd39ca72d053d7261ffbab0c5c1f820602d52fc85806513a6fe317e88
-
Filesize
10KB
MD516ae54e23736352739d7ab156b1965ba
SHA114f8f04bed2d6adc07565d5c064f6931b128568f
SHA256c11ffa087c6848f3870e6336d151f0ba6298c0e1e30ccddf2da25a06d36a61fc
SHA51215dbfcdc5dc34cb20066120045e3250f8df9e50b91de043f2ada33ac0235907d98668e248828a7ed9c75e25dfb5103b7248867530ce73ee36f6a35c30b4afa9f
-
Filesize
4KB
MD568d73a95c628836b67ea5a717d74b38c
SHA1935372db4a66f9dfd6c938724197787688e141b0
SHA25621a373c52aaecce52b41aebe6d0224f53760fc3e5c575e821175eee3a1f7f226
SHA5120e804deab4e647213132add4173c1d2c554c628816f56e21e274a40e185d90254e29c8bfc6fbfdfea2a492d43d23c0bfa4b276252a3f5e1993ab80ff832c4914
-
Filesize
8KB
MD5071b6233c92f69ffa1c24243328c3b94
SHA1bb583c00e87cdc65e6254c7148d37afc1bbb3095
SHA2565f6c63cb0ba539d692c5461730f057d0ec6c60639d772fbdc3753c3c6e746c43
SHA5127fc2db406350488ee86ccffe1e99a91e0f509ef0429063336bf6f96aab07127df352db77fe9d00ddc3aa2db7886dfbac08b6acf6a5c647859956111ca47c24f1
-
Filesize
319B
MD5daefed22cbba32c7ee5937807699b553
SHA120c33b1a6cbd66db296cbda2d296506a8817c192
SHA2567cbce31ecc67b6aec0bfaabeaca9bd0575a3094dc189907154729b144cc265b6
SHA5120b422520b03530ffe189a010e6f6361765dbfcfc30ba35faf59afec5a2b32badf08fbb827bea5d124c541da9dfc8fb5dbf9869fde22b92dec8cddda5088e61a8
-
Filesize
3.8MB
MD53e5c5ed3eaec55aba27f68440360ae05
SHA1af372129cd7e6fa3b99cd5b6ebfba034afc8de65
SHA25657937c093124bd488a449d855076a5bd359ecf9ded8533838833032e7efaca45
SHA5125d484bce66eda05b545a161c82b848403b11801399d6ac3475e504e593d1d3a8eb7107180454f6cf02b1e7092ba506c322a6931c22508ce22d9a24db74603361
-
Filesize
288KB
MD50ea010da48315b44d3befceca3ddda0f
SHA119bd13e64a03f0d4ab0b90a266cb25b40ebc580c
SHA2563cf494e14bee4d4370db50d3700a8b338c4b78e6001a3beb395c817bb9910fc7
SHA512fc5ea974c78ae45def1388a7098e4167d55c924ec91211b568677a312d22786c12fee19e6bf2ca529934db378773397510f0a2710c76f4b9c659c5f231fdb2ec
-
Filesize
288KB
MD56bbc2ca29605dc83bd8f86eee2a98539
SHA11e0c4b316426be15c289c1a9e486e9b3e3095f0e
SHA256e037bafa4dcca2f458b91bbbb1b6eae0604c0ab89d2622dabcf06c8c2328887f
SHA5129fc7139eef0a35f3c754251871b512d2fdf5f063ded8171f7a27fef0b465d0396437c04506c210adc3d82b2a1b8604e766220957aa5a09792c25e96ef352a6d9
-
Filesize
107KB
MD5574e64a8373ee84bef032e205725527e
SHA14e3f5b2f3330f3735cd019f764ef856f5208ac13
SHA256f188be045a388b2c028592cd61399d6d082099c35c05b620e396faa5a20ff04a
SHA512dad8d2a1e6ba7d9c0bb447dba365b3d41c09925b1bb5566dd9ac7ab9fcfea4c4e906ef0d01c7666e2b8f85249281d3cb08b34f518b799670d2203eeb08a1b857
-
Filesize
1.6MB
MD55870ea0d6ba8dd6e2008466bdd00e0f4
SHA1d41bf60d0dedff90e3cfc1b41b7e1a73df39a7d5
SHA2565a7dac8c8b5d7cf1115246dfaf994e7f50e16a7eac1488642396f5e23fddfe0d
SHA5120c620d5e7383adcf979feccc3b1bad584a5cec8b3d74d0ace8bb786f1f04ba87fa70d59d041dc3833977d44a75f2070181d4054c7c0b9c4ce2d66249b4b3c837