Overview
overview
10Static
static
10r8p(4).exe
windows11-21h2-x64
10Styles/Vis...le.dll
windows11-21h2-x64
1Styles/Vis...le.dll
windows11-21h2-x64
1Styles/Vis...le.dll
windows11-21h2-x64
1Styles/Vis...le.dll
windows11-21h2-x64
1Styles/Vis...le.dll
windows11-21h2-x64
1Styles/Vis...le.dll
windows11-21h2-x64
1Styles/W7A...le.dll
windows11-21h2-x64
1Styles/W7A...le.dll
windows11-21h2-x64
1Styles/W7A...le.dll
windows11-21h2-x64
1Styles/W7A...le.dll
windows11-21h2-x64
1Styles/W7A...le.dll
windows11-21h2-x64
1Styles/W7A...le.dll
windows11-21h2-x64
1Styles/W7B...le.dll
windows11-21h2-x64
1Styles/W7B...le.dll
windows11-21h2-x64
1Styles/W7B...le.dll
windows11-21h2-x64
1Styles/W7B...le.dll
windows11-21h2-x64
1Styles/W7B...le.dll
windows11-21h2-x64
1Styles/W7B...le.dll
windows11-21h2-x64
1Styles/W7C...le.dll
windows11-21h2-x64
1Styles/W7C...le.dll
windows11-21h2-x64
1Styles/W7D...le.dll
windows11-21h2-x64
1Styles/W7D...le.dll
windows11-21h2-x64
1Styles/W7D...le.dll
windows11-21h2-x64
1Styles/W7D...le.dll
windows11-21h2-x64
1Styles/W7D...le.dll
windows11-21h2-x64
1Styles/W7D...le.dll
windows11-21h2-x64
1ThemeSwitcher.exe
windows11-21h2-x64
1duires.dll
windows11-21h2-x64
3instextras.exe
windows11-21h2-x64
7sym.exe
windows11-21h2-x64
7windhawk.exe
windows11-21h2-x64
3Analysis
-
max time kernel
1051s -
max time network
445s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-11-2024 08:48
Behavioral task
behavioral1
Sample
r8p(4).exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Styles/Vista-Redstone/Shell/NormalColor/en-US/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Styles/Vista-Redstone/Shell/NormalColor/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Styles/Vista-Redstone/style.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Styles/Vista-W11/Shell/NormalColor/en-US/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Styles/Vista-W11/Shell/NormalColor/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Styles/Vista-W11/style.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Styles/W7Aero-Redstone/shell/NormalColor/en-US/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Styles/W7Aero-Redstone/shell/NormalColor/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Styles/W7Aero-Redstone/style.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Styles/W7Aero-W11/shell/NormalColor/en-US/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Styles/W7Aero-W11/shell/NormalColor/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Styles/W7Aero-W11/style.dll
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Styles/W7Basic-Redstone/shell/NormalColor/en-US/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Styles/W7Basic-Redstone/shell/NormalColor/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Styles/W7Basic-Redstone/style.dll
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
Styles/W7Basic-W11/shell/NormalColor/en-US/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Styles/W7Basic-W11/shell/NormalColor/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
Styles/W7Basic-W11/style.dll
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
Styles/W7Classic-Redstone/style.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
Styles/W7Classic-W11/style.dll
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
Styles/W7Dark2-Redstone/shell/NormalColor/en-US/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
Styles/W7Dark2-Redstone/shell/NormalColor/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
Styles/W7Dark2-Redstone/style.dll
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
Styles/W7Dark2-W11/shell/NormalColor/en-US/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
Styles/W7Dark2-W11/shell/NormalColor/shellstyle.dll
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
Styles/W7Dark2-W11/style.dll
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
ThemeSwitcher.exe
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
duires.dll
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
instextras.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
sym.exe
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
windhawk.exe
Resource
win11-20241007-en
General
-
Target
r8p(4).exe
-
Size
146.8MB
-
MD5
dced470b41ea05b7a850b483199a5c1b
-
SHA1
c1a0489c8e46e54c25ee3ecfd400047304e0df34
-
SHA256
f18f14ec50247a31a03a220e132f9317e2ac12e3905e500ba046d394575b66ee
-
SHA512
c9eff7b793cb90f6b74e203f8b33fcbc929a51b2376619f41c563c3ad69ddf9ecfaadbea3198971fe3ab529b7737bc25c0f2f0e54b86e71ad3b9fc94c5ae99cc
-
SSDEEP
3145728:MVnAk6G3rsMkIbbWp7wSJu24gTAiRKed5YxWkJLG5CHstXd:Jk6WrsMJbW5/p4gTAiB5ChHMt
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\AppIso\FirewallRules\{6EF4679F-6D06-4376-A0A5-7A826C6B4544} = "v2.31|Action=Allow|Active=TRUE|Dir=In|Profile=Domain|Profile=Private|Profile=Public|RA42=IntrAnet|RA62=IntrAnet|Name=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Desc=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|LUAuth=O:LSD:(A;;CC;;;S-1-15-3-3)(A;;CC;;;WD)(A;;CC;;;AN)|LUOwn=S-1-5-21-3587106988-279496464-3440778474-1000|AppPkgId=S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|EmbedCtxt=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|" svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\AppIso\FirewallRules\{EF559C60-57C3-4BAB-BC86-68F96A3C7681} = "v2.31|Action=Allow|Active=TRUE|Dir=Out|Profile=Domain|Profile=Private|Profile=Public|RA42=IntrAnet|RA62=IntrAnet|Name=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Desc=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|LUAuth=O:LSD:(A;;CC;;;S-1-15-3-3)(A;;CC;;;WD)(A;;CC;;;AN)|LUOwn=S-1-5-21-3587106988-279496464-3440778474-1000|AppPkgId=S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|EmbedCtxt=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|" svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\AppIso\FirewallRules\{E42763C8-14B3-440A-9AF8-9AA1F467552E} = "v2.31|Action=Allow|Active=TRUE|Dir=In|Profile=Private|Profile=Public|RA42=RmtIntrAnet|RA62=RmtIntrAnet|Name=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Desc=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|LUAuth=O:LSD:(A;;CC;;;S-1-15-3-3)(A;;CC;;;WD)(A;;CC;;;AN)|LUOwn=S-1-5-21-3587106988-279496464-3440778474-1000|AppPkgId=S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|EmbedCtxt=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Security=Authenticate|" svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\AppIso\FirewallRules\{AE519E9D-103E-4FA5-9D0F-F148FDE26CDD} = "v2.31|Action=Allow|Active=TRUE|Dir=Out|Profile=Private|Profile=Public|RA42=RmtIntrAnet|RA62=RmtIntrAnet|Name=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Desc=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|LUAuth=O:LSD:(A;;CC;;;S-1-15-3-3)(A;;CC;;;WD)(A;;CC;;;AN)|LUOwn=S-1-5-21-3587106988-279496464-3440778474-1000|AppPkgId=S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|EmbedCtxt=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Security=Authenticate|" svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\AppIso\FirewallRules svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\AppIso\FirewallRules\{A133FF5E-DC82-4F5A-B2BA-ACB59C0F1621} = "v2.31|Action=Block|Active=TRUE|Dir=In|Name=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Desc=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|LUOwn=S-1-5-21-3587106988-279496464-3440778474-1000|AppPkgId=S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|EmbedCtxt=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|" svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\AppIso\FirewallRules\{BAA6A174-ECD1-4C14-B7C0-8A6B49A0FB9F} = "v2.31|Action=Block|Active=TRUE|Dir=Out|Name=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Desc=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|LUOwn=S-1-5-21-3587106988-279496464-3440778474-1000|AppPkgId=S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|EmbedCtxt=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|" svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\AppIso\FirewallRules\{17FCB4D4-7546-4AB8-8AB8-5A0B919280BB} = "v2.31|Action=Allow|Active=TRUE|Dir=Out|Profile=Domain|Profile=Private|Profile=Public|RA42=IntErnet|RA62=IntErnet|Name=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Desc=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|LUAuth=O:LSD:(A;;CC;;;S-1-15-3-1)(A;;CC;;;WD)(A;;CC;;;AN)|LUOwn=S-1-5-21-3587106988-279496464-3440778474-1000|AppPkgId=S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|EmbedCtxt=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|" svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{67B49050-B8AF-4EA7-BAF8-896F755F7F22} = "v2.31|Action=Allow|Active=TRUE|Dir=Out|Profile=Domain|Profile=Private|Profile=Public|Name=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Desc=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|LUOwn=S-1-5-21-3587106988-279496464-3440778474-1000|AppPkgId=S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|EmbedCtxt=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Platform=2:6:2|Platform2=GTEQ|" svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{4E4F5702-BAE2-457F-A569-A4E83ED7A71D} = "v2.31|Action=Allow|Active=TRUE|Dir=In|Profile=Domain|Profile=Private|Name=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Desc=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|LUOwn=S-1-5-21-3587106988-279496464-3440778474-1000|AppPkgId=S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|EmbedCtxt=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Platform=2:6:2|Platform2=GTEQ|" svchost.exe -
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Parameters\AppCs\AppCs\S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000S-1-5-21-3587106988-279496464-3440778474-1000 = "v2.31|AppPkgId=S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|LUOwn=S-1-5-21-3587106988-279496464-3440778474-1000|C=S-1-15-3-1|C=S-1-15-3-3|C=S-1-15-3-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|M=microsoft.windows.startmenuexperiencehost_cw5n1h2txyewy|Name=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Desc=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|D=C:\\Windows\\SystemApps\\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\\|PFN=Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy|" svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Parameters\AppCs\AppCs svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Parameters\AppCs\AppCs\S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000S-1-5-21-3587106988-279496464-3440778474-1000 = "v2.31|AppPkgId=S-1-15-2-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|LUOwn=S-1-5-21-3587106988-279496464-3440778474-1000|C=S-1-15-3-1|C=S-1-15-3-3|C=S-1-15-3-515815643-2845804217-1874292103-218650560-777617685-4287762684-137415000|M=microsoft.windows.startmenuexperiencehost_cw5n1h2txyewy|Name=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|Desc=@{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.37_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PkgDisplayName}|" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Parameters\AppCs\PolicyVersion = "543" svchost.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2396 powershell.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winlogon.exe r8p(4).exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winlogon.exe\GlobalFlag = "256" r8p(4).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winlogon.exe\VerifierDlls = "SecureUxTheme.dll" r8p(4).exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
pid Process 1832 sym.exe 2392 sym.exe 5004 sym.exe 4616 sym.exe 728 sym.exe 3552 sym.exe 4228 sym.exe 4624 sym.exe 2500 sym.exe 1444 sym.exe 5008 sym.exe 992 sym.exe 492 sym.exe 5024 sym.exe 4520 sym.exe 2004 sym.exe 4420 sym.exe 1908 sym.exe 1816 sym.exe 1420 sym.exe 1808 sym.exe 1380 sym.exe 1900 sym.exe 2056 sym.exe 1228 sym.exe 4312 sym.exe 1404 sym.exe 4412 sym.exe 3656 sym.exe 1664 sym.exe 2252 sym.exe 2328 sym.exe 3944 sym.exe 3520 sym.exe 5012 sym.exe 1640 sym.exe 484 sym.exe 4220 sym.exe 2164 sym.exe 3844 sym.exe 1204 sym.exe 772 sym.exe 444 sym.exe 4348 sym.exe 2380 sym.exe 1364 sym.exe 4376 sym.exe 4396 sym.exe 4552 sym.exe 3688 sym.exe 1360 sym.exe 1384 sym.exe 712 sym.exe 332 sym.exe 1132 sym.exe 4904 sym.exe 3704 sym.exe 1764 sym.exe 3336 sym.exe 2224 sym.exe 2372 sym.exe 4220 sym.exe 3368 sym.exe 1096 sym.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 7 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-TWinUI%4Operational.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Kernel-EventTracing%4Admin.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-DxgKrnl-Admin.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-DxgKrnl-Operational.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-AppxPackaging%4Operational.evtx svchost.exe -
Loads dropped DLL 64 IoCs
pid Process 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 788 regsvr32.exe 4176 regsvr32.exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 3232 r8p(4).exe 2392 sym.exe 2392 sym.exe 2392 sym.exe 2392 sym.exe 2392 sym.exe 2392 sym.exe 2392 sym.exe 2392 sym.exe 2392 sym.exe 2392 sym.exe 2392 sym.exe 3232 r8p(4).exe 4616 sym.exe 4616 sym.exe 4616 sym.exe 4616 sym.exe 4616 sym.exe 4616 sym.exe 4616 sym.exe 4616 sym.exe 4616 sym.exe 4616 sym.exe 4616 sym.exe 4616 sym.exe 3232 r8p(4).exe 3552 sym.exe 3552 sym.exe 3552 sym.exe 3552 sym.exe 3552 sym.exe 3552 sym.exe 3552 sym.exe 3552 sym.exe 3552 sym.exe 3552 sym.exe 3552 sym.exe 3552 sym.exe 3232 r8p(4).exe 4624 sym.exe 4624 sym.exe 4624 sym.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 13 IoCs
description ioc Process File created C:\Windows\Revert8Plus\SoundSchemes\Savanna\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Sonata\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Calligraphy\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Cityscape\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Heritage\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Landscapes\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Quirky\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Raga\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Afternoon\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Characters\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Delta\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Festival\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Garden\Desktop.ini r8p(4).exe -
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData Windhawk.exe File created C:\Windows\system32\perfc009.dat WMIADAP.EXE File created C:\Windows\system32\PerfStringBackup.TMP WMIADAP.EXE File created C:\Windows\system32\perfc00A.dat WMIADAP.EXE File created C:\Windows\system32\perfh011.dat WMIADAP.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content Windhawk.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File created C:\Windows\system32\wbem\Performance\WmiApRpl_new.h WMIADAP.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft Windhawk.exe File created C:\Windows\system32\perfh007.dat WMIADAP.EXE File created C:\Windows\system32\perfc010.dat WMIADAP.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe File created C:\Windows\system32\perfh00A.dat WMIADAP.EXE File created C:\Windows\system32\perfh010.dat WMIADAP.EXE File created C:\Windows\system32\perfc011.dat WMIADAP.EXE File created C:\Windows\system32\duires.dll r8p(4).exe File created C:\Windows\system32\SecureUxTheme.dll r8p(4).exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 Windhawk.exe File created C:\Windows\system32\perfh009.dat WMIADAP.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 Windhawk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE Windhawk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 Windhawk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 Windhawk.exe File created C:\Windows\system32\wbem\Performance\WmiApRpl_new.ini WMIADAP.EXE File created C:\Windows\system32\perfc00C.dat WMIADAP.EXE File opened for modification C:\Windows\system32\PerfStringBackup.INI WMIADAP.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies Windhawk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache Windhawk.exe File created C:\Windows\system32\perfc007.dat WMIADAP.EXE File created C:\Windows\system32\perfh00C.dat WMIADAP.EXE -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Revert8Plus\Engine\ModsWritable\CPL\he-IL\display.dll.mui r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\gameux\ar-sa\gameux7.dll.mui r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Cityscape\Windows Battery Low.wav r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Landscapes\Windows Print complete.wav r8p(4).exe File created C:\Windows\Revert8Plus\Styles\W7Aero-W11\style.msstyles r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\classicfix-themecpl.dll r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\CPL\tr-TR\shell7.dll.mui r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Savanna\Desktop.ini r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\StartIsBack32.dll r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\symsrv.dll r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\ExplorerFrame21332.dll r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\gameux\sl-si\gameux7.dll.mui r8p(4).exe File created C:\Windows\Revert8Plus\Engine\Mods\64\local@r8p-w7-remove-ms-store-open-with_1.0.0_127284.dll r8p(4).exe File created C:\Windows\Revert8Plus\ThemeFiles\Redstone\r8p-w7-Landscapes.theme r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\glass8-1607.dll r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\VistaIcons\magnify.exe.dll r8p(4).exe File created C:\Windows\Revert8Plus\ModsSource\[email protected] r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Calligraphy\Windows Print complete.wav r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Characters\Windows Feed Discovered.wav r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Quirky\Windows Print complete.wav r8p(4).exe File created C:\Windows\Revert8Plus\Cursors\aero_select.cur r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\gameux\el-gr\gameux7.dll.mui r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Landscapes\Windows Navigation Start.wav r8p(4).exe File created C:\Windows\Revert8Plus\Engine\1.5.1\64\windhawk.lib r8p(4).exe File created C:\Windows\Revert8Plus\Engine\Mods\64\local@r8p-w7classic-sib-config_1.0.0_611781.dll r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\W7Icons\fontext.dll r8p(4).exe File created C:\Windows\Revert8Plus\ModsSource\[email protected] r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Sonata\Windows Information Bar.wav r8p(4).exe File created C:\Windows\Revert8Plus\Cursors\aero_nesw.cur r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Garden\Windows Logoff Sound.wav r8p(4).exe File created C:\Windows\Revert8Plus\Engine\Mods\64\windhawk-mod-shim.dll r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\VistaIcons\SmartScreenSettings.exe.dll r8p(4).exe File created C:\Windows\Revert8Plus\Cursors\aero_ew.cur r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Raga\Windows Logoff Sound.wav r8p(4).exe File created C:\Windows\Revert8Plus\Wallpaper\Windows\Harmony.jpg r8p(4).exe File created C:\Windows\Revert8Plus\Engine\Symbols\twinui.pcshell.pdb\136C29961CF30C574958362491C73CFC1\twinui.pcshell.pdb sym.exe File created C:\Windows\Revert8Plus\Cursors\aero_move.cur r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\gameux\tr-tr\gameux7.dll.mui r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Calligraphy\Windows Ding.wav r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Raga\Windows Navigation Start.wav r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Savanna\Windows Logoff Sound.wav r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Sonata\Windows Default.wav r8p(4).exe File created C:\Windows\Revert8Plus\Engine\1.5.1\32\windhawk.dll r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Windows\Windows Error.wav r8p(4).exe File created C:\Windows\Revert8Plus\Engine\Mods\64\local@r8p-vista-sib-loader_1.0.0_238877.dll r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\W7Icons\UserAccountControlSettings.exe.dll r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\W7Icons\devmgr.dll r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Windows\Windows Recycle.wav r8p(4).exe File created C:\Windows\Revert8Plus\Styles\W7Basic-W11\shell\NormalColor\en-US\shellstyle.dll.mui r8p(4).exe File created C:\Windows\Revert8Plus\Engine\Symbols\uxtheme.pdb\CFE07DF3A2489E01E6F8D4D9196EA0AF1\uxtheme.pdb sym.exe File created C:\Windows\Revert8Plus\Engine\1.5.1\32\symsrv.yes r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\VistaIcons\batmeter.dll r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\CPL\sr-Latn-CS\recovery.dll.mui r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Delta\Windows Hardware Insert.wav r8p(4).exe File created C:\Windows\Resources\Themes\r8p-vista-Default.theme r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\CPL\bthprops.cpl r8p(4).exe File created C:\Windows\Revert8Plus\ModsSource\[email protected] r8p(4).exe File created C:\Windows\Revert8Plus\Styles\W7Dark2-W11\shell\NormalColor\en-US\shellstyle.dll.mui r8p(4).exe File created C:\Windows\Revert8Plus\Engine\Mods\32\local@r8p-w7-sib-loader_1.0.0_352950.dll r8p(4).exe File created C:\Windows\Revert8Plus\Engine\ModsWritable\W7Icons\SmartScreenSettings.exe.dll r8p(4).exe File created C:\Windows\Revert8Plus\ModsSource\[email protected] r8p(4).exe File created C:\Windows\Revert8Plus\SoundSchemes\Festival\Windows User Account Control.wav r8p(4).exe File created C:\Windows\Revert8Plus\Wallpaper\Landscapes\1.jpg r8p(4).exe File created C:\Windows\Revert8Plus\Engine\Mods\64\local@r8p-w7-accent-color-sync_1.53_198080.dll r8p(4).exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x001900000002ab11-1332.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windhawk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windhawk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r8p(4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Windhawk.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Windhawk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\RemoteSession winlogon.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Windhawk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\RemoteSession\Profile winlogon.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Windhawk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Windhawk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Windhawk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\RemoteSession\CLSID winlogon.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Windhawk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "183" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{ED228FDF-9EA8-4870-83b1-96b02CFE0D52}\LocalizedString = "@%SystemRoot%\\system32\\shell32.dll,-30579" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{ED228FDF-9EA8-4870-83b1-96b02CFE0D52}\InprocServer32\ThreadingModel = "Apartment" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{865e5e76-ad83-4dca-a109-50dc2113ce9b}\InProcServer32\ = "C:\\ProgramData\\Windhawk\\Engine\\ModsWritable\\StartIsBack64.dll" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\CopyPath\Command\DelegateExecute = "{E5C31EC8-C5E6-4E07-957E-944DB4AAD85E}" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\Properties\Command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{99E2B362-3E4E-4255-9B29-41A7F40777BB}\ShellFolder reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\runas\Command reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{709E2729-F883-441e-A877-ED3CEFC975E6}\ = "ProfileNotifyHandler Class" reg.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\CLSID\{031E4825-7B94-4dc3-B131-E946B44C8DD5} reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\CopyPath\Extended reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\OpenFolder\Command\DelegateExecute = "{E5C31EC8-C5E6-4E07-957E-944DB4AAD85E}" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\CopyPath\Extended reg.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{542EEE1B-A254-46F7-B980-35BECF6076A4}\Instance\InitPropertyBag\ResourceID = "1001" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\Open\MuiVerb = "@twinui.dll,-1321" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c71c41f1-ddad-42dc-a8fc-f5bfc61df958} reg.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\MicrosoftWindows.Client.CBS_cw5n1h2txyewy svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{99E2B362-3E4E-4255-9B29-41A7F40777BA}\InProcServer32\ = "C:\\ProgramData\\Windhawk\\Engine\\ModsWritable\\StartIsBack64.dll" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\Properties\Command reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133773441497184451" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\Open reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{865e5e76-ad83-4dca-a109-50dc2113ce9b}\ShellFolder\Attributes = "672137216" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E5C31EC8-C5E6-4E07-957E-944DB4AAD85E}\InProcServer32 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\OpenFolder\MuiVerb = "@shell32.dll,-32960" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2e7583c7-7eba-4a1a-8468-d03d28477e6f}\InProcServer32\ = "%SystemRoot%\\Revert8Plus\\Engine\\ModsWritable\\gameux\\migration\\gameuxmig.dll" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{709E2729-F883-441e-A877-ED3CEFC975E6} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD1405D2-30CF-4877-8468-1EE1C52C759F} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c71c41f1-ddad-42dc-a8fc-f5bfc61df958}\InProcServer32 reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{99E2B362-3E4E-4255-9B29-41A7F40777BB}\ShellFolder\Attributes = "2684354560" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{ED228FDF-9EA8-4870-83b1-96b02CFE0D52}\InprocServer32\ = "C:\\Windows\\Revert8Plus\\Engine\\ModsWritable\\gameux\\gameux7.dll" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{99E2B362-3E4E-4255-9B29-41A7F40777BB}\InProcServer32\ = "C:\\ProgramData\\Windhawk\\Engine\\ModsWritable\\StartIsBack64.dll" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\Open\Command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\OpenFolder\Command reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{542EEE1B-A254-46F7-B980-35BECF6076A4}\InprocServer32\ = "@%SystemRoot%\\Revert8Plus\\R8PCPL.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{a2a9545d-a0c2-42b4-9708-a0b2badd77c9}\InprocServer32\ThreadingModel = "Apartment" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{99E2B362-3E4E-4255-9B29-41A7F40777BA}\InProcServer32\ = "C:\\ProgramData\\Windhawk\\Engine\\ModsWritable\\StartIsBack64.dll" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E7B2FB72-D728-49B3-A5F2-18EBF5F1349E} reg.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\CLSID\{031E4825-7B94-4dc3-B131-E946B44C8DD5} reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{865e5e76-ad83-4dca-a109-50dc2113ce9b}\InProcServer32\ThreadingModel = "Apartment" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{06EEE695-542D-46F6-AEAB-FA2F1B2102D3}\InprocServer32 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{865e5e76-ad83-4dca-a109-50dc2113ce9b}\InProcServer32 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\Delete\Command reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{99E2B362-3E4E-4255-9B29-41A7F40777BA}\ShellFolder\Attributes = "2684354560" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{542EEE1B-A254-46F7-B980-35BECF6076A4}\ShellFolder\Attributes = "2684354560" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F382DA49-9148-4a22-AF78-C378DFC32D02}\ = "MS_InstalledGameProv Class" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{865e5e76-ad83-4dca-a109-50dc2113ce9b}\ = "StartIsBack All Programs Folder" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E5C31EC8-C5E6-4E07-957E-944DB4AAD85E}\InProcServer32\ = "C:\\ProgramData\\Windhawk\\Engine\\ModsWritable\\StartIsBack64.dll" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\shellex\ContextMenuHandlers\{a2a9545d-a0c2-42b4-9708-a0b2badd77c9} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\Properties reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}\ = "Taskbar Pin" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{99E2B362-3E4E-4255-9B29-41A7F40777BB}\InProcServer32\ThreadingModel = "Apartment" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E5C31EC8-C5E6-4E07-957E-944DB4AAD85E}\InProcServer32\ThreadingModel = "Apartment" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD1405D2-30CF-4877-8468-1EE1C52C759F}\ShellFolder\Attributes = "2684354560" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\OpenFolder\MuiVerb = "@shell32.dll,-32960" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\Delete\Position = "Bottom" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133773441517579107" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{709E2729-F883-441e-A877-ED3CEFC975E6}\InprocServer32\ = "C:\\Windows\\Revert8Plus\\Engine\\ModsWritable\\gameux\\gameux7.dll" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\Shell\Delete\SeparatorBefore = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\StartIsBack.ImmersiveApplication\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{542EEE1B-A254-46F7-B980-35BECF6076A4}\Instance\InitPropertyBag regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{709E2729-F883-441e-A877-ED3CEFC975E6}\InprocServer32 reg.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2396 powershell.exe 2396 powershell.exe 4424 wmiprvse.exe 4424 wmiprvse.exe 4424 wmiprvse.exe 4424 wmiprvse.exe 4424 wmiprvse.exe 4424 wmiprvse.exe 4424 wmiprvse.exe 4424 wmiprvse.exe 4424 wmiprvse.exe 4424 wmiprvse.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3232 r8p(4).exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 1668 Process not Found 1356 Process not Found 772 Process not Found 3040 Process not Found 1484 Process not Found 344 Process not Found 3340 Process not Found 1664 Process not Found 1252 Process not Found 2000 Process not Found 1992 Process not Found 4060 Process not Found 1416 Process not Found 1944 Process not Found 2492 Process not Found 1348 Process not Found 4996 Process not Found 3992 Process not Found 3972 Process not Found 3608 Process not Found 2340 Process not Found 1424 Process not Found 3384 Process not Found 4480 Process not Found 2792 Process not Found 3100 Process not Found 5004 Process not Found 2716 Process not Found 3600 Process not Found 3724 Process not Found 1736 Process not Found 3396 Process not Found 4932 Process not Found 3596 Process not Found 1568 Process not Found 3704 Process not Found 4836 Process not Found 488 Process not Found 3376 Process not Found 1444 Process not Found 2724 Process not Found 2224 Process not Found 4496 Process not Found 1044 Process not Found 1536 Process not Found 3460 Process not Found 4512 Process not Found 4544 Process not Found 2456 Process not Found 744 Process not Found 652 Process not Found 2288 Process not Found 1552 Process not Found 1640 Process not Found 4568 Process not Found 4000 Process not Found 4292 Process not Found 2124 Process not Found 3204 Process not Found 872 Process not Found 576 Process not Found 4628 Process not Found 4560 Process not Found 2480 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1984 WMIC.exe Token: SeSecurityPrivilege 1984 WMIC.exe Token: SeTakeOwnershipPrivilege 1984 WMIC.exe Token: SeLoadDriverPrivilege 1984 WMIC.exe Token: SeSystemProfilePrivilege 1984 WMIC.exe Token: SeSystemtimePrivilege 1984 WMIC.exe Token: SeProfSingleProcessPrivilege 1984 WMIC.exe Token: SeIncBasePriorityPrivilege 1984 WMIC.exe Token: SeCreatePagefilePrivilege 1984 WMIC.exe Token: SeBackupPrivilege 1984 WMIC.exe Token: SeRestorePrivilege 1984 WMIC.exe Token: SeShutdownPrivilege 1984 WMIC.exe Token: SeDebugPrivilege 1984 WMIC.exe Token: SeSystemEnvironmentPrivilege 1984 WMIC.exe Token: SeRemoteShutdownPrivilege 1984 WMIC.exe Token: SeUndockPrivilege 1984 WMIC.exe Token: SeManageVolumePrivilege 1984 WMIC.exe Token: 33 1984 WMIC.exe Token: 34 1984 WMIC.exe Token: 35 1984 WMIC.exe Token: 36 1984 WMIC.exe Token: SeIncreaseQuotaPrivilege 1984 WMIC.exe Token: SeSecurityPrivilege 1984 WMIC.exe Token: SeTakeOwnershipPrivilege 1984 WMIC.exe Token: SeLoadDriverPrivilege 1984 WMIC.exe Token: SeSystemProfilePrivilege 1984 WMIC.exe Token: SeSystemtimePrivilege 1984 WMIC.exe Token: SeProfSingleProcessPrivilege 1984 WMIC.exe Token: SeIncBasePriorityPrivilege 1984 WMIC.exe Token: SeCreatePagefilePrivilege 1984 WMIC.exe Token: SeBackupPrivilege 1984 WMIC.exe Token: SeRestorePrivilege 1984 WMIC.exe Token: SeShutdownPrivilege 1984 WMIC.exe Token: SeDebugPrivilege 1984 WMIC.exe Token: SeSystemEnvironmentPrivilege 1984 WMIC.exe Token: SeRemoteShutdownPrivilege 1984 WMIC.exe Token: SeUndockPrivilege 1984 WMIC.exe Token: SeManageVolumePrivilege 1984 WMIC.exe Token: 33 1984 WMIC.exe Token: 34 1984 WMIC.exe Token: 35 1984 WMIC.exe Token: 36 1984 WMIC.exe Token: SeDebugPrivilege 2396 powershell.exe Token: 35 3232 r8p(4).exe Token: 35 3232 r8p(4).exe Token: 35 3232 r8p(4).exe Token: SeDebugPrivilege 5100 Windhawk.exe Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeCreateGlobalPrivilege 1804 dwm.exe Token: SeChangeNotifyPrivilege 1804 dwm.exe Token: 33 1804 dwm.exe Token: SeIncBasePriorityPrivilege 1804 dwm.exe Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeCreateGlobalPrivilege 4480 dwm.exe Token: SeChangeNotifyPrivilege 4480 dwm.exe Token: 33 4480 dwm.exe Token: SeIncBasePriorityPrivilege 4480 dwm.exe Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1060 Windhawk.exe 1060 Windhawk.exe 1060 Windhawk.exe 1060 Windhawk.exe 3356 Explorer.EXE 3356 Explorer.EXE -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 1060 Windhawk.exe 1060 Windhawk.exe 1060 Windhawk.exe 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3356 Explorer.EXE 1116 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 1052 3232 r8p(4).exe 79 PID 3232 wrote to memory of 1052 3232 r8p(4).exe 79 PID 3232 wrote to memory of 1052 3232 r8p(4).exe 79 PID 1052 wrote to memory of 1984 1052 cmd.exe 81 PID 1052 wrote to memory of 1984 1052 cmd.exe 81 PID 1052 wrote to memory of 1984 1052 cmd.exe 81 PID 1052 wrote to memory of 1420 1052 cmd.exe 82 PID 1052 wrote to memory of 1420 1052 cmd.exe 82 PID 1052 wrote to memory of 1420 1052 cmd.exe 82 PID 1052 wrote to memory of 2688 1052 cmd.exe 83 PID 1052 wrote to memory of 2688 1052 cmd.exe 83 PID 1052 wrote to memory of 2688 1052 cmd.exe 83 PID 1052 wrote to memory of 3856 1052 cmd.exe 84 PID 1052 wrote to memory of 3856 1052 cmd.exe 84 PID 1052 wrote to memory of 3856 1052 cmd.exe 84 PID 3232 wrote to memory of 2396 3232 r8p(4).exe 85 PID 3232 wrote to memory of 2396 3232 r8p(4).exe 85 PID 3232 wrote to memory of 2396 3232 r8p(4).exe 85 PID 3232 wrote to memory of 788 3232 r8p(4).exe 87 PID 3232 wrote to memory of 788 3232 r8p(4).exe 87 PID 3232 wrote to memory of 788 3232 r8p(4).exe 87 PID 788 wrote to memory of 4176 788 regsvr32.exe 88 PID 788 wrote to memory of 4176 788 regsvr32.exe 88 PID 3232 wrote to memory of 3620 3232 r8p(4).exe 89 PID 3232 wrote to memory of 3620 3232 r8p(4).exe 89 PID 3232 wrote to memory of 4596 3232 r8p(4).exe 91 PID 3232 wrote to memory of 4596 3232 r8p(4).exe 91 PID 3232 wrote to memory of 1232 3232 r8p(4).exe 93 PID 3232 wrote to memory of 1232 3232 r8p(4).exe 93 PID 3232 wrote to memory of 3980 3232 r8p(4).exe 95 PID 3232 wrote to memory of 3980 3232 r8p(4).exe 95 PID 3232 wrote to memory of 920 3232 r8p(4).exe 97 PID 3232 wrote to memory of 920 3232 r8p(4).exe 97 PID 3232 wrote to memory of 2240 3232 r8p(4).exe 100 PID 3232 wrote to memory of 2240 3232 r8p(4).exe 100 PID 3232 wrote to memory of 4728 3232 r8p(4).exe 102 PID 3232 wrote to memory of 4728 3232 r8p(4).exe 102 PID 3232 wrote to memory of 2364 3232 r8p(4).exe 104 PID 3232 wrote to memory of 2364 3232 r8p(4).exe 104 PID 3232 wrote to memory of 4416 3232 r8p(4).exe 106 PID 3232 wrote to memory of 4416 3232 r8p(4).exe 106 PID 3232 wrote to memory of 1832 3232 r8p(4).exe 108 PID 3232 wrote to memory of 1832 3232 r8p(4).exe 108 PID 1832 wrote to memory of 2392 1832 sym.exe 110 PID 1832 wrote to memory of 2392 1832 sym.exe 110 PID 3232 wrote to memory of 5004 3232 r8p(4).exe 111 PID 3232 wrote to memory of 5004 3232 r8p(4).exe 111 PID 5004 wrote to memory of 4616 5004 sym.exe 113 PID 5004 wrote to memory of 4616 5004 sym.exe 113 PID 3232 wrote to memory of 728 3232 r8p(4).exe 114 PID 3232 wrote to memory of 728 3232 r8p(4).exe 114 PID 728 wrote to memory of 3552 728 sym.exe 116 PID 728 wrote to memory of 3552 728 sym.exe 116 PID 3232 wrote to memory of 4228 3232 r8p(4).exe 117 PID 3232 wrote to memory of 4228 3232 r8p(4).exe 117 PID 4228 wrote to memory of 4624 4228 sym.exe 119 PID 4228 wrote to memory of 4624 4228 sym.exe 119 PID 3232 wrote to memory of 2500 3232 r8p(4).exe 120 PID 3232 wrote to memory of 2500 3232 r8p(4).exe 120 PID 2500 wrote to memory of 1444 2500 sym.exe 122 PID 2500 wrote to memory of 1444 2500 sym.exe 122 PID 3232 wrote to memory of 5008 3232 r8p(4).exe 123 PID 3232 wrote to memory of 5008 3232 r8p(4).exe 123 PID 5008 wrote to memory of 992 5008 sym.exe 125
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Modifies data under HKEY_USERS
PID:640 -
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:816
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:472
-
-
C:\Windows\system32\rundll32.exerundll32 C:\programdata\Windhawk\Engine\ModsWritable\OpenGlassDComp.dll,StartupService2⤵PID:4736
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Modifies data under HKEY_USERS
PID:3956
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Modifies data under HKEY_USERS
PID:1996
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Modifies data under HKEY_USERS
PID:4984
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Modifies data under HKEY_USERS
PID:2480
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Modifies data under HKEY_USERS
PID:396
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Modifies data under HKEY_USERS
PID:5112
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa39cc855 /state1:0x41c64e6d2⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1116
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:696
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Modifies registry class
PID:832 -
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3148
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca2⤵PID:3808
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3888
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3984
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4052
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}2⤵PID:4204
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:1672
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:2388
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:1932
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:1004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:560
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1288
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2648
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1436
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1572
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1792
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1960
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004EC2⤵PID:2304
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1896
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1904
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵
- Modifies firewall policy service
- Modifies security service
PID:2180
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵
- Drops file in System32 directory
PID:2576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2660
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2756
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /R /T2⤵
- Drops file in System32 directory
PID:4832
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2776
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\r8p(4).exe"C:\Users\Admin\AppData\Local\Temp\r8p(4).exe"2⤵
- Event Triggered Execution: Image File Execution Options Injection
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\cmd.execmd /c wmic /namespace:\\root\SecurityCenter2 path AntiVirusProduct get displayName|findstr .|findstr /v displayName|findstr /v /c:"Windows Defender"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 path AntiVirusProduct get displayName4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\SysWOW64\findstr.exefindstr .4⤵
- System Location Discovery: System Language Discovery
PID:1420
-
-
C:\Windows\SysWOW64\findstr.exefindstr /v displayName4⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Windows\SysWOW64\findstr.exefindstr /v /c:"Windows Defender"4⤵
- System Location Discovery: System Language Discovery
PID:3856
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:\Windows\Revert8Plus";Add-MpPreference -ExclusionPath "C:\ProgramData\Windhawk";Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\Windows Aero";Add-MpPreference -ExclusionPath "C:\Windows\Temp\r8p.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\Revert8Plus\R8PCPL.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\system32\regsvr32.exe/s "C:\Windows\Revert8Plus\R8PCPL.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:4176
-
-
-
C:\Windows\system32\reg.exe"C:\Windows\SysNative\reg.exe" import "C:\Windows\Revert8Plus\Registry\dwm.reg"3⤵PID:3620
-
-
C:\Windows\system32\reg.exe"C:\Windows\SysNative\reg.exe" import "C:\Windows\Revert8Plus\Registry\gameux.reg"3⤵
- Modifies registry class
PID:4596
-
-
C:\Windows\system32\reg.exe"C:\Windows\SysNative\reg.exe" import "C:\Windows\Revert8Plus\Registry\redirection-vista.reg"3⤵
- Modifies registry class
PID:1232
-
-
C:\Windows\system32\reg.exe"C:\Windows\SysNative\reg.exe" import "C:\Windows\Revert8Plus\Registry\redirection-w7.reg"3⤵
- Modifies registry class
PID:3980
-
-
C:\Windows\system32\reg.exe"C:\Windows\SysNative\reg.exe" import "C:\Windows\Revert8Plus\Registry\sib-vista.reg"3⤵PID:920
-
-
C:\Windows\system32\reg.exe"C:\Windows\SysNative\reg.exe" import "C:\Windows\Revert8Plus\Registry\sib-w7.reg"3⤵
- Modifies registry class
PID:2240
-
-
C:\Windows\system32\reg.exe"C:\Windows\SysNative\reg.exe" import "C:\Windows\Revert8Plus\Registry\sib-w7basic.reg"3⤵
- Modifies registry class
PID:4728
-
-
C:\Windows\system32\reg.exe"C:\Windows\SysNative\reg.exe" import "C:\Windows\Revert8Plus\Registry\sib-w7classic.reg"3⤵
- Modifies registry class
PID:2364
-
-
C:\Windows\system32\reg.exe"C:\Windows\SysNative\reg.exe" import "C:\Windows\Revert8Plus\Registry\windhawk.reg"3⤵PID:4416
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\ActionCenter.dll"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\ActionCenter.dll"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2392
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\Revert8Plus\Engine\ModsWritable\AltTab.dll"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\Revert8Plus\Engine\ModsWritable\AltTab.dll"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4616
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\ApplicationFrame.dll"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\ApplicationFrame.dll"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3552
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\DUI70.dll"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\DUI70.dll"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4624
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\consent.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\consent.exe"4⤵
- Executes dropped EXE
PID:1444
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\comctl32.dll"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\comctl32.dll"4⤵
- Executes dropped EXE
PID:992
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\SysWOW64\comctl32.dll"3⤵
- Executes dropped EXE
PID:492 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\SysWOW64\comctl32.dll"4⤵
- Executes dropped EXE
PID:5024
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\dwmcore.dll"3⤵
- Executes dropped EXE
PID:4520 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\dwmcore.dll"4⤵
- Executes dropped EXE
PID:2004
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\explorer.exe"3⤵
- Executes dropped EXE
PID:4420 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\explorer.exe"4⤵
- Executes dropped EXE
PID:1908
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\Revert8Plus\Engine\ModsWritable\explorer.exe"3⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\Revert8Plus\Engine\ModsWritable\explorer.exe"4⤵
- Executes dropped EXE
PID:1420
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\ExplorerFrame.dll"3⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\ExplorerFrame.dll"4⤵
- Executes dropped EXE
PID:1380
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\SysWOW64\ExplorerFrame.dll"3⤵
- Executes dropped EXE
PID:1900 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\SysWOW64\ExplorerFrame.dll"4⤵
- Executes dropped EXE
PID:2056
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\pnidui.dll"3⤵
- Executes dropped EXE
PID:1228 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\pnidui.dll"4⤵
- Executes dropped EXE
PID:4312
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\shell32.dll"3⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\shell32.dll"4⤵
- Executes dropped EXE
PID:4412
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\SysWOW64\shell32.dll"3⤵
- Executes dropped EXE
PID:3656 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\SysWOW64\shell32.dll"4⤵
- Executes dropped EXE
PID:1664
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\SndVolSSO.dll"3⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\SndVolSSO.dll"4⤵
- Executes dropped EXE
PID:2328
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\stobject.dll"3⤵
- Executes dropped EXE
PID:3944 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\stobject.dll"4⤵
- Executes dropped EXE
PID:3520
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\ThemeUI.dll"3⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\ThemeUI.dll"4⤵
- Executes dropped EXE
PID:1640
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\timedate.cpl"3⤵
- Executes dropped EXE
PID:484 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\timedate.cpl"4⤵
- Executes dropped EXE
PID:4220
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\twinui.pcshell.dll"3⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\twinui.pcshell.dll"4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3844
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\twinui.dll"3⤵
- Executes dropped EXE
PID:1204 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\twinui.dll"4⤵
- Executes dropped EXE
PID:772
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\uDWM.dll"3⤵
- Executes dropped EXE
PID:444 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\uDWM.dll"4⤵
- Executes dropped EXE
PID:4348
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\user32.dll"3⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\user32.dll"4⤵
- Executes dropped EXE
PID:1364
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\SysWOW64\user32.dll"3⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\SysWOW64\user32.dll"4⤵
- Executes dropped EXE
PID:4396
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\UXInit.dll"3⤵
- Executes dropped EXE
PID:4552 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\UXInit.dll"4⤵
- Executes dropped EXE
PID:3688
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\UxTheme.dll"3⤵
- Executes dropped EXE
PID:1360 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\UxTheme.dll"4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1384
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\van.dll"3⤵
- Executes dropped EXE
PID:712 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\van.dll"4⤵
- Executes dropped EXE
PID:332
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\Windows.Storage.dll"3⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\Windows.Storage.dll"4⤵
- Executes dropped EXE
PID:4904
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\SysWOW64\Windows.Storage.dll"3⤵
- Executes dropped EXE
PID:3704 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\SysWOW64\Windows.Storage.dll"4⤵
- Executes dropped EXE
PID:1764
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\winlogon.exe"3⤵
- Executes dropped EXE
PID:3336 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\winlogon.exe"4⤵
- Executes dropped EXE
PID:2224
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\ntdll.dll"3⤵
- Executes dropped EXE
PID:2372 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\ntdll.dll"4⤵
- Executes dropped EXE
PID:4220
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\SysWOW64\ntdll.dll"3⤵
- Executes dropped EXE
PID:3368 -
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\SysWOW64\ntdll.dll"4⤵
- Executes dropped EXE
PID:1096
-
-
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\sndvol.exe"3⤵PID:964
-
C:\Windows\Revert8Plus\sym.exe"C:\Windows\Revert8Plus\sym.exe" "C:\Windows\Revert8Plus\Engine\Symbols" "C:\Windows\System32\sndvol.exe"4⤵PID:3548
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:2548
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:2624
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4172
-
C:\ProgramData\Windhawk\Windhawk.exe"C:\ProgramData\Windhawk\Windhawk.exe" -service1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5100 -
C:\ProgramData\Windhawk\Windhawk.exe"C:\ProgramData\Windhawk\Windhawk.exe" -tray-only2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1060
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:2728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:1076
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000134 0000008c1⤵PID:4480
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000128 0000008c1⤵PID:396
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000e0 0000008c1⤵PID:3848
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000110 0000008c1⤵PID:2480
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000f8 0000008c1⤵PID:1932
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000100 0000008c1⤵PID:4984
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000104 0000008c1⤵PID:1996
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000c0 0000008c1⤵PID:5112
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000f8 0000008c1⤵PID:3356
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
82KB
MD537eace4b806b32f829de08db3803b707
SHA18a4e2bb2d04685856d1de95b00f3ffc6ea1e76b9
SHA2561be51ef2b5acbe490217aa1ff12618d24b95df6136c6844714b9ca997b4c7f9b
SHA5121591a263de16373ee84594943a0993721b1e1a2f56140d348a646347a8e9760930df4f632adcee9c9870f9c20d7818a3a8c61b956723bf94777e0b7fb7689b2d
-
Filesize
247KB
MD5e4e032221aca4033f9d730f19dc3b21a
SHA1584a3b4bc26a323ce268a64aad90c746731f9a48
SHA25623bdd07b84d2dbcb077624d6dcbfc66ab13a9ef5f9eebe31dc0ffece21b9e50c
SHA5124a350ba9e8481b66e7047c9e6c68e6729f8074a29ef803ed8452c04d6d61f8f70300d5788c4c3164b0c8fb63e7c9715236c0952c3166b606e1c7d7fff36b7c4c
-
Filesize
63KB
MD5ba682dfcdd600a4bb43a51a0d696a64c
SHA1df85ad909e9641f8fcaa0f8f5622c88d904e9e20
SHA2562ad55e11bddb5b65cdf6e9e126d82a3b64551f7ad9d4cbf74a1058fd7e5993bd
SHA51279c607e58881d3c3dfb83886fe7aa4cddb5221c50499d33fe21e1efb0ffa1fd0d3f52cbe97b16b04fbe2b067d6eb5997ac66dec9d2a160d3cb6d44ffca0f5636
-
Filesize
155KB
MD53273720ddf2c5b75b072a1fb13476751
SHA15fe0a4f98e471eb801a57b8c987f0feb1781ca8b
SHA256663f1087c2ed664c5995a3ffa64546d2e33a0fce8a9121b48cc7c056b74a2948
SHA512919dbbfcc2f5913655d77f6c4ae9baa3a300153a5821dc9f23e0aceb89f69cb9fb86d6ce8f367b9301e0f7b6027e6b2f0911a2e73255ab5150a74b862f8af18e
-
Filesize
77KB
MD5485d998a2de412206f04fa028fe6ba90
SHA1286e29d4f91a46171ba1e3c8229e6de94b499f1d
SHA2568f9ede5044643413c3b072cd31a565956498ca07cdd17fb6a04483d388fdad76
SHA51268591522e9188f06ff81cd2b3506b40b9ad508d6e34f0111819bf5eff47ed9adf95ebfae5d05b685c4f53b186d15cc45e0d831d96be926f7a5762ee2f1341f1f
-
Filesize
172KB
MD5e5b1a076e9828985ea8ea07d22c6abd0
SHA12a2827938a490cd847ea4e67e945deb4eef8cbb1
SHA256591589dadc659d1ad4856d16cd25dc8e57eaa085bf68eb2929f8f93aba69db1b
SHA5120afd20f581efb08a7943a1984e469f1587c96252e44b3a05ca3dfb6c7b8b9d1b9fd609e03a292de6ec63b6373aeacc822e30d550b2f2d35bf7bf8dd6fc11f54f
-
Filesize
24KB
MD5b21b864e357ccd72f35f2814bd1e6012
SHA12ff0740c26137c6a81b96099c1f5209db33ac56a
SHA256ce9e2a30c20e6b83446d9ba83bb83c5570e1b1da0e87ff467d1b4fc090da6c53
SHA51229667eb0e070063ef28b7f8cc39225136065340ae358ad0136802770b2f48ac4bda5e60f2e2083f588859b7429b9ea3bad1596a380601e3b2b4bb74791df92a3
-
Filesize
1.4MB
MD56e706e4fa21d90109df6fce1b2595155
SHA15328dd26b361d36239facff79baca1bab426de68
SHA256ce9b9f16ce0d9abdbac3307115d91eaf279c5152336ccbe8830151b41c802998
SHA512c7e377e2854ad5b5c3fb23593817ad6345bf8a78d842ff2a45c3be135fad6bb27b67c5b6c01b26e7c1b1b12ea0814f4f6b6a522bbfa689b89fa50d3652799b34
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
768KB
MD519a2aba25456181d5fb572d88ac0e73e
SHA1656ca8cdfc9c3a6379536e2027e93408851483db
SHA2562e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337
-
Filesize
5.5MB
MD5d06da79bfd21bb355dc3e20e17d3776c
SHA1610712e77f80d2507ffe85129bfeb1ff72fa38bf
SHA2562835e0f24fb13ef019608b13817f3acf8735fbc5f786d00501c4a151226bdff1
SHA512e4dd839c18c95b847b813ffd0ca81823048d9b427e5dcf05f4fbe0d77b8f7c8a4bd1c67c106402cd1975bc20a8ec1406a38ad4764ab466ef03cb7eb1f431c38a
-
Filesize
29KB
MD5e07ae2f7f28305b81adfd256716ae8c6
SHA19222cd34c14a116e7b9b70a82f72fc523ef2b2f6
SHA256fb06ac13f8b444c3f7ae5d2af15710a4e60a126c3c61a1f1e1683f05f685626c
SHA512acb143194ca465936a48366265ae3e11a2256aeae333c576c8c74f8ed9b60987daff81647aef74e236b30687a28bc7e3aa21c6aedbfa47b1501658a2bfd117b4
-
Filesize
1.1MB
MD55cc36a5de45a2c16035ade016b4348eb
SHA135b159110e284b83b7065d2cff0b5ef4ccfa7bf1
SHA256f28ac3e3ad02f9e1d8b22df15fa30b2190b080261a9adc6855248548cd870d20
SHA5129cccbf81e80c32976b7b2e0e3978e8f7350cce542356131b24ebab34b256efd44643d41ee4b2994b9152c2e5af302aa182a1889c99605140f47494a501ef46c1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
15KB
MD5d74bb4447af48da081c7d9b499f3a023
SHA1dadf6e140e6fd8e49a1851cc144bb022e0adb185
SHA2565fd5d8aec97cffaad9b7df6371b348d436cf1401e86fab614dc4cb8575428e52
SHA5129a15de5c6b08914f5e5bbc1c318fb0e84da28a316cf51ccddca8dfb64cd67b7ad06acac307b41d5086a0740055d327007ff890807d6853bb2e767179a3b3d758
-
Filesize
8KB
MD50cb4305037fdbb31b1763beed3564f7f
SHA1b584fd7ebffc331b2a08c6c7c74ed1193f3fa22d
SHA2564f8ac32dd2cca85f9a018eb6a29bf0405af41a725a8a6ff6a7429704feef8d7b
SHA512e85449f23ac1742b59fb5299737cfdc1c0aae79c0c247f47fcc7887c433d085087d23e7bb521b9f63e470772e0b5e1e3b3afb9b9244f12b425d43d5205a21a4c
-
Filesize
1.1MB
MD57b89329c6d8693fb2f6a4330100490a0
SHA1851b605cdc1c390c4244db56659b6b9aa8abd22c
SHA2561620cdf739f459d1d83411f93648f29dcf947a910cc761e85ac79a69639d127d
SHA512ac07972987ee610a677ea049a8ec521a720f7352d8b93411a95fd4b35ec29bfd1d6ccf55b48f32cc84c3dceef05855f723a88708eb4cf23caec77e7f6596786a
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
Filesize
9KB
MD51d8f01a83ddd259bc339902c1d33c8f1
SHA19f7806af462c94c39e2ec6cc9c7ad05c44eba04e
SHA2564b7d17da290f41ebe244827cc295ce7e580da2f7e9f7cc3efc1abc6898e3c9ed
SHA51228bf647374b4b500a0f3dbced70c2b256f93940e2b39160512e6e486ac31d1d90945acecef578f61b0a501f27c7106b6ffc3deab2ec3bfb3d9af24c9449a1567
-
Filesize
7KB
MD5b4579bc396ace8cafd9e825ff63fe244
SHA132a87ed28a510e3b3c06a451d1f3d0ba9faf8d9c
SHA25601e72332362345c415a7edcb366d6a1b52be9ac6e946fb9da49785c140ba1a4b
SHA5123a76e0e259a0ca12275fed922ce6e01bdfd9e33ba85973e80101b8025ef9243f5e32461a113bbcc6aa75e40894bb5d3a42d6b21045517b6b3cf12d76b4cfa36a
-
Filesize
201KB
MD513942db88d8f74e67289130fdf16e1b9
SHA18b66fb4ec6db6266a7ecc002027dba4ae00a5fc7
SHA2561cb61978c9f4901bb107254030560bbd3e890e504178af49ea292bc6807c3fa5
SHA5126b2fea11ed13d2140e7e0f16df7fa23c36eefdd7f0068bb19dd65d7a158754479aecae041843e8c862d5f73da787a0e4cf711e2df8dee2eae6d01ec3f1819e92
-
Filesize
113KB
MD50b3671b005ac881485e2403317f6ecb4
SHA159eafb7fc980821448dd0f1c91f4cc2368f41442
SHA2562bf8d40a495dba2825b1048cd75062602a719d95cb987582b639cdbc49c3ead5
SHA512142b60909f8725112c8434e3c04b41632a6098bbe06809938b08bcc5b4cb11ec48770d22c8594421edab5ae18705494e9fe93266630351e3d0ee30979ba8bb82
-
Filesize
58KB
MD5fda58e7342584ef7b87e2c2823bcb385
SHA151e843ee176ad7afcf6d418f62fff9f474a1a32f
SHA256974895ed81cf6454a1c4474b720791800f0e4c42160a573bb4ed37c6ef13a0b0
SHA512580c53dd6f15e45b20f575e2a964bfbc43aa11a56536bc920c82f204821e11b40f656fa1b3d444a243ebccc784b73622f4a9eb92a0e17ac301a7fec2a49a42bd
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_1060_local@r8p-w7basic-dwm-unextend-frames
Filesize100B
MD52754b0d71e29a7894c5ba16ccaddadf0
SHA1b9bd604f9f7878d8543ae62161a23b997a840bac
SHA2562b407f86596931bb23f3d2c03c3c013c6366749cee52450d629db488048fcc9f
SHA5125b861b0f8f94d0d40a871919c379641c23e1fdd20d3b5268c6a96769165a7b5413865dc5ce9f6714404da78bd008f69201f99d253191de658ccb248df285778f
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_1672_local@r8p-vista-icon-resource-redirect
Filesize64B
MD5b998b95f9374f7836d6582dc6bf316ff
SHA1791be035cbf6c706879625182f32d46a7fad3ad6
SHA25607dc662decee3bb8ce58a4bf3fc34152664288c3e64d76e63d6da4437fde5dbe
SHA512612442e8f244a4a5d9aa2d57f1a66cca958a76b9344916b6a9bbc445a6090d372d3c2fab1ac6f4b0f94b84922f97a1784e672d2bdd8afaa3172b0e906dbde013
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_2304_local@r8p-vista-icon-resource-redirect
Filesize54B
MD5a6efba8a398206830ccc2af9d18abd06
SHA1eed92b5d2cd22e437c5822963286b0c762fbe4a0
SHA256b28224b97c811401c6539267eef9c5e4484ab6c12b120c5bd263e99151b90040
SHA5123b910e8da85b23bd9284fd997f3079b12b77baecb7bbc7868d669ed75825f017255b751a747d250e5fc4b11d4103cf1ff213290c08481d0ceea4fb99e7990e92
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_2624_local@r8p-vista-icon-resource-redirect
Filesize72B
MD5078f277de088948e2586e45f86e25217
SHA10eb014f1eb984d89a51277f98e22a8855421c998
SHA25616f557e11021a8fbdb6a73cd8daa276375817d095445196d0fc7281920c9bf24
SHA5124aa8ef5d955fcde3d9d6130681051d1e9a3f61f47fdd7211874a9f025893465d6cc4b81b5f678c72e348be2e3bf0ed180645273970cec7917226fe5fb6a4adba
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_2648_local@r8p-vista-icon-resource-redirect
Filesize52B
MD547ce5cc8ef5037c47e8329747291f58d
SHA11ff2f19a228f7aa5963d330e573bdcec4d9f6f02
SHA256cf776aa95e30b00d8de42b7ff73240c2e649b5c5ce4011e66ce00384beb01860
SHA512c6c98899f30a74940db95820440038c7dd9ee9ec1adf47fa2690526737e693355a16a6e4ef5f3e5e94f49b97cc099accf76c12d44178b695a4939262f66cabaf
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_2704_local@r8p-vista-icon-resource-redirect
Filesize52B
MD51d322b58ad45880eab1c25310f0de810
SHA1c25a769b7028f1aaf4786737330b92cb59d2f50f
SHA25652f9856bb2b529e49927c686d23ad1634244661767e407844bd3e9a5467fd853
SHA5123b3d5a4fdea0b443f62f68314585c7a523bcfabbf8233938edc3118dc827ff750ca88b686cc1bcf0021f02c4854ceb17f55f739e40526ae521e34f4b3384d201
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_3148_local@r8p-vista-icon-resource-redirect
Filesize56B
MD5d998d0750215b4cd033fbc188b3ed9d2
SHA1d594c4e4d2cb2fc641cd3316dc6ee80b72580a42
SHA25614f8c4fbf681f5d3e8fd82a4ce11e23fb84009305a728849cacfaa94a7d26eca
SHA512f15695c6c4815e68ff40912b7a8a5d0ba0722e7f8c7ea4c7440ed1b1560c539b2ab014272baf45ce606d406cb7533be6b603069ad99aa9ce52f09c7511bcc783
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_3232_local@r8p-vista-icon-resource-redirect
Filesize52B
MD508af8ae25b5f2dc50ab38462bd6ea886
SHA15b36ac115e2493c17edd91ef40b5d17b509fa02a
SHA25668eced46af34ce97d18052005a81282d09c6309bf305b7c2289add0d2f7359b4
SHA5126249a7d9088bcf10402f1a23d140a3f94ebac18e1364e218e3f25cfd93b9a97ef1c6569facad9a595c549e8f4852abe372e946d2f3cd3906daacfa21cd48fdca
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_3356_local@r8p-uifile-override
Filesize56B
MD5b80e1ebba4bf2c77f0a236ab6a268a7b
SHA1a004be8b8777f644bbe65f6897840724e67379a9
SHA256294865f8297419983edf4cf2335641c9a0436ec621bb20e92ec1ecb753add7f6
SHA51253e82251f847f2c4ac4c9daa955072e9de072eb1b5748c79595fe1c2c2b99a2efeb4bc04e5edaff0780c2692365c38c82052ccc68a18bdfd9b81d321e365bf96
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_3984_local@r8p-uifile-override
Filesize66B
MD53df4e77084d7b4a79705607b65cd2656
SHA1c99333f9e1cd631056b94e6a9197c2e3682a28fb
SHA25678cfefd5d7693e885c7ebb6a393e705a40360ec0cca6dce83acc2494066a4911
SHA512fd219eac871b452f90b055ca5d53bcbd9bb61ff57ff5cf040287b5ef136506cd4d66e5894d2dedd86012cf613e654e84d617e2c7cfe8e9f02b856de00ab22991
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_472_local@r8p-w7basic-basic-themer
Filesize46B
MD574e06930e5cf93604723de1cc4ff9294
SHA1a723ad0a12a68c5d654e560b99b5c3b95568e3d6
SHA2560330f7d59a2493099f64183a0252a1e6308dd4fb9bacabfb0ec7026f6605e12e
SHA51252ead50e7efca4786ef6a3bad80792454c792464280ace788e98a38c04fa46bd50b4b4e3b0b88c5c75c84768d3b1c36574cd3426f18174d24111e4a3911f8ba8
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_4736_local@r8p-vista-sib-config
Filesize56B
MD5adb0c2841eac9f16b57b33092035cace
SHA1136d7adde425ab8b94dd0d7281b1e9efed52ac3e
SHA2569012fcb710b287804543e19f8354ff3f0dcc85e95db7735a7105c49a9e236376
SHA512a00e8f5975226fd41006c163449c8be059d9746e2fba9e4216e62a933155867a92d1687d86e2c648ee2f40c75c431b34629b65fc66f585d92b264aaff41ed327
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_4832_local@r8p-vista-icon-resource-redirect
Filesize54B
MD5f142390c58dcdff182ace07e3f9598ab
SHA136b158a5f004d9d4bc8238a227a5bc9b99f75f69
SHA256f84b0ce448f2294bb1dff5f99a635e02733cec741d1571d8995e101e7e58eda3
SHA5121d83ff4e118f839737cad54d599ed38d16c8bb6d93873ea947090b6908ca887ca79d0fb4983e8adfef810f541eebeb748d77ddc96f58a95e1f70fd32c19dfeab
-
C:\Windows\Revert8Plus\Engine\ModsWritable\mod-task\5100_133773441462173777_5100_local@r8p-vista-aerexplorer
Filesize56B
MD5375218198b6f516a5e585c2223869533
SHA159786939c3e3c865584a75c031a58271806a618f
SHA25686b6c518c57ca13ee8af66c028cfc718e077da7bf0b1ca1c8326289e4a2b42e5
SHA5120fb3c5db0bffc6da75fe34c9dbd8b3080aac84cd67d559fc24895f97e15ddd7062b46f3e43f827ef273d1e3ceac2194fb346a0e881b9c8879da1b4d2241aa785
-
Filesize
46B
MD54d1464c9e110731186b6c0cf91545869
SHA13f4c55f1821f58081582439aad9502213fc2c691
SHA256a7b4e19743c9c96ab15d1a5ede861301e6baccf426c6e7637c0b8bd0ba3f98b0
SHA512f5b74abdcb0dfe0169f7464f8fb833fa804c7f3e4dea4ecd0a0a7a8e2f859bb20ca1afb9bd394b929f48adc76a88387f870d3a9fe5f3fd823029ac52876126b1
-
Filesize
1.3MB
MD59bc0cbdd5ced816678151377a42e00cb
SHA1e04bdf76726e73f405b4dbf532c016640ab4d1f7
SHA256fdf1cb7a110f91774cad71d8b3ff1ee97300f147b1d5c7ac4ff859aa00ee8129
SHA512ad3d646679b8bf1465bc68edd0ac98a0f8460577153bfb77dea165c320ab41108c679ff8802bbf9c0ea4712bde8cc2a4f6b67e92a547db40bf97c0473dc7d2ad
-
Filesize
3KB
MD5084d6f8d6d84f6bae01e5fd19e3bab5f
SHA18c201fed61ddaac7397c479e61b9d71705486ebe
SHA25601a2e20064c0dc81dfb2b521cb9fbd0172770ae5a4be15882fbb7b6b9024ab39
SHA512edf5b96839ac3c8acdd86d0a6ce7c216938c1bb4c992d934d72b6842c0796c4a4add29d60ed42c2f840007e661302ae617cad8e84c50b4ce54704b0dd013cb99
-
Filesize
3KB
MD562dfef91a9940c3a27bb3afc4a5bf503
SHA192230f525e36e83a80b76a2ab9516cc0c20303ba
SHA25614b1a0a326034e9cc1c8e51d5a21742674cb98bce9156b2b71310c222697cfee
SHA5126c51c7730e1bad54dfecb38e70c16dac2b9ff5cef91ce650544e02c98d07633999c0f7a95dd6648dfd632a493c55df3a94542162a21b8a4aff15c08ff6473a43
-
Filesize
44KB
MD55e505435dc4a098c95a18c5e0b14dfb1
SHA1f4dd63f5e877b440d54474c3bbce44bf0a13697f
SHA256014a1e2cd005ccbba2aed41576180fe84d8eddca81f65ce5a5b798e9c2c59113
SHA512df6c11996f3101f5434727cb11aa7a5e4bf5e8aaaeeaa5ea85b36dd6d89cf7fcfd8d30b4ad7e8c1fe5231bfcebf4afe4beb998c46aa6b01bc400cd956bb8914a
-
Filesize
43KB
MD50cc60dc4933463c382ca38c41a2ca3eb
SHA16c88399d35aaffcab1161a41239e16cd02c98eb9
SHA256274373cd8acd0a5359441581a0b3aa201aaf6a1d749ef1d21f1dadd55ff55535
SHA5121831dd415a5c11a02e79d76daf2261ab1a0b036b1f14345dd51c5d0106839c541af52d3b896382a3f5370b9d979563fb771669176a0cbd78bfeff8724e5bafa9
-
Filesize
4KB
MD58dbfa54c810f4a14808707d66dd5393c
SHA16b76560baa11cfdc17a70858fb8c5514d8aa5be1
SHA2563064ad7deb064ff74e9661c7f1f6cac69e9ccb7a47df9aceab08f8b6152eda65
SHA5125bac15d5f0efdbba3bf19cb7f6451323347425b4fbcaaddea0058a95a40b2b6183cc8a3c5d34cd32502f9ece544492c7d10e0c8693ca53e8389df6c1d953fa51
-
Filesize
15KB
MD558bd812a391d8e6b714e21a36c6c865f
SHA1970c806b8f5166a8118fb58502a96b7e8f720bc8
SHA2563ce433616d9122698acb564136d326a0eebde754f55055c6a7b1343d0ab2cac7
SHA512de46270e52ae391fff8b7c5efdec02eb8246fd1d6de8e8ad98b979c7159dba16c763affead11ed50024faa951dcebfca9950f12242ee05c5f0d75fc7e8d22f18
-
Filesize
15KB
MD55e7d57b25bd06fe5229edd612ed69717
SHA14c79a5e063848f161c14f92cca8093e8227ff659
SHA2561b99af9870dcb0d5d5495296a95e0c1f39aefa31489b2800eb3ac687bd772c8b
SHA5123a6dc479e5eef84d09ce73a2728a37c349deb689fdfd7b0f52e0fd28094e864132daa95172e2a1d5a9772671834dc064896bbb16e81059c3d1db439a7d706da9
-
Filesize
15KB
MD5daceeae7152ac7d010259e7f0ea10191
SHA13e334d90da21f6dd721e6d0ea5a3c63f5000e2fd
SHA25612461bc0333e57b101dfc9155963e54029331350da019da3438619854748bf3a
SHA512612924353018270eeb18173dc8b416fa8c98a61710c9da1801102da9cc72e7d151625e0962738955ade74bbe20d31d1111ae77cd6e3a3cc387cac0466d9d7871
-
Filesize
55KB
MD5d7b8bf5339a26e604bf4e3cebe0ff388
SHA1e5d1d680159e61759aa731a4cb5758f97204c275
SHA256647b074d9681da3e507905c85863ab10844010b746ab09ec74e5ab96c20af2a5
SHA51255cb70db10c0cc82bf0800123c4aed967f07fdc9478c5b827c66a5a81d3bf44555f0f58c0507fe198f7329118af7e3b8c825b919f8b6362b44af4800fc4bfbc5
-
Filesize
1KB
MD5794f1975f13b0fb6c554d96006237cad
SHA14a3989d06826b5e8ed30325e3a2527f62de6ae5d
SHA256b77586f906749b00246a8d8ce73e48ea42ac69355524afe3b1183e1ac6d8d201
SHA512c4e91baea7b0621765c5da6254be846acef4f90570950e02c8ca733b255afc5ee1ec3378ef479c6bf22205a780d22c5b14b264b55f5f471c66dbce7b84d332b5
-
Filesize
69KB
MD52f5484ed6bea507bf069407cd769c8c1
SHA1843e91796049be18ae8f5be66a152199de4d712e
SHA256339869ea975c67deef8afdaa6638b72b825f5899141fe68861aa4afd74cd516f
SHA5129dfb8ed01fd231687ad8f1fe6ead0aa7b39542d1ee86a63ff44bab8d50f535397115ef338feb25b45c9f8ac8da4dd816af03c201b2a2163a39b8e87524d06bca
-
Filesize
1.1MB
MD524216c145d6aaf56d8de25acb32b5416
SHA1d4f8a4a60e4f38a7d1be3e499d606f18fd417045
SHA256c9a11ffbdda45340a8f48740b6f562950e57bee0c05e10a8978d1a3b93380f82
SHA51201346babee37e3ec1df171a13fe5de008554dbb682c7a407852ded255378225328cde2f313de6e04f5113d486ff2f7efd2b88184b09fd9c3a40fb041f3f78a15
-
Filesize
7.3MB
MD531e6cde417b805fefaa58afd59715161
SHA10d6202b37f0cb0534876099a5ed1426e4c0f1a0d
SHA256a3d83b63326cfcdc66a9e7078e8515732f198673652063a22498e96efbb597ef
SHA5127fddc59eae04f0b211ce42e17261ef09301e697e005914ba86b5bc178ae2dae1218f17a4501144202feffcf74c80e34c0909cf5459a11422370d4c2e958f0df0
-
Filesize
148KB
MD56e71c59a539ba8c2d46c4c8f478edf8c
SHA1868558341297d83b247f8be13b375541eb58b886
SHA2564e4e1300a939cc5d58d0c6914410d5ad8eaf876571011fa1c6f0ce27bf59822d
SHA5121a86ab970d99430334ba14cc14d75cb902f267e9e15019afcb64400ec6e4335adae3687a5916ccfec5fd0c82c89bfeeac2aed0c6aad693f35e7326f8fb158f9e
-
Filesize
153KB
MD56c65a113c1d1dcbc5f7603db0134dcb7
SHA11eb93cc7aeb12860b63129a69b812b694748a816
SHA25653d617778c1ba174c22b47fd2d84035aa28c58bdcab6c3f3224f3777d1d8e7ee
SHA51267c438c141f7d6509db1d0bb17b312b66be8947a623580cc49fcb3000f7e402dda856ab1d422a68bbb25392d00902fef2bd31ce9cc491769205cdd7b31edf605
-
Filesize
152KB
MD5ac22e4ddfcafca323b25a78120008e1d
SHA11a22e811a017e48900633aaf28c8e3d0f647dcfb
SHA2564ce9124ff763431485fd5dd8d2725f9baed086e9b94513f6ba7337ffe6f13308
SHA512c1cd3db4455cd599ba8ce9e735a75622fdc6d7dca02409bdb1af00e2c47559191f64414a011bbfa11990eb7d0e67ec10edd8bdba9fdcb06ad3b4cb784f6d1bcf
-
Filesize
146KB
MD531f061dd23766fb40b15c9754bbc5a61
SHA11d6e9a4b87576e771c2c2157919236195aacf4d8
SHA2562e69db7389943a3ed9aee54788510f229b1462c6281e2a3e54d8b7e83fa1a0df
SHA51249af16e7d50be8025b3ecf6d4c965339ca4d4db29d3e606318c94f8f0e68d7914c57cb9ee78f5b8d35f5772c0b6e008b3196932785625019d28e6fe5d6ad7369
-
Filesize
126KB
MD55afbd30597a275ad6d5e98187742c01b
SHA14e9a82a388532a0fcb3671047504384e040b48a1
SHA25626ee1d72642d1d79b307581e6027a259696d5e3299d9d6685153a68b8c58b61b
SHA5126d2514d6a12809a7db4901b586b57e03b6e5b0cc4ecd1baeb4f5188ca033773f7ca077fa8e8beadcf82724fd16d9136c0fc252a0163b71a0ff0eae3363f2c0cf
-
Filesize
724KB
MD53bd8043ff69087c78cf81f0aa082664f
SHA1c669871201f05f6153dfa3f6a78d4609d818568e
SHA256d1b8be34dfdff53435bcd3f176f7aa9f17aa8f1145c42edee1ed1eec9faf02b2
SHA512a51d2bb5641aaff1ab091a1c331b6e515bb333d2dfa9f09662d35b2315e6fbd14932102167075cd8bdacf7c8f57fe7313f7b1639090070851c2ecf7662384d6d
-
Filesize
686KB
MD5efeeda97e31eb12669293d78feaff451
SHA1f3680730a9ed165f49be4a2b1be8477196f15afb
SHA256a0ae9b96680526dd73b3469504eaeb3882c655e3f4557b9e120de1ddd8edb834
SHA512452da0e9a2c17de87d5a0db150acf299310d684c50c4f16daa5f1c298267d76d990000a0bf4e5ffb2afe5769e74bfcdf351e8d68b933a432a9130cdcdd81f1b2
-
Filesize
783KB
MD5ef8cce0162906b208cff1441fe71f927
SHA17a3f2d0dcb39698a6ec9190ea69f2ea01d76935e
SHA256ba9df27d32c3fa43d6840146e28e5266908124efde25a4bf459d908c232a88a7
SHA51235b3dbb9f5cd8b30aa0a26fdb29c562ae65ab9823ba477f082960a19d354a68729008e3c0cfce2f8cce66f6f5bab9fed7d6cbe62628c7a751bc4770a4560f5e8
-
Filesize
785KB
MD5f5fd5898bda4a68842ec6c6a9088adec
SHA1f974a58b258b438e79eb4bea3ae54a91f516a10a
SHA256e962a408ff9a789b92bc1429637cb30e00fc47bfa3b06a7fd7b22646e1f5b872
SHA512932e551597139b85b4faecfa9156e7e98d33b5dad4bd6f4c40504ced7b032c8fed223b81f056654a75c66a8326c51b28fef102ad55d5b224722f90c778b6ed98
-
Filesize
772KB
MD5a583c28c05f94a635bd67fee2d905a27
SHA1a4af858c69297cb8a59cade7da6e5a36b43e7548
SHA256c70b892d93e93c37c826ba97459e8fb724e6c5cf6dc2288613430fc59c0c1eb0
SHA51206626f291b69e044e8e44fa46576c0287e4df434cd07b0bdb1b162fed25ddef652e5ad8d08d984f2d7d4c027c8ee032eef485f7269f0a83e11c1fa61f80a5d67
-
Filesize
468KB
MD533cbb4d0e471fd527da2ded235fe9636
SHA1aa9d9b062511eb38a1faf9a740f8fb709b02a7dd
SHA25673174de99ccd45c2a8d818742ed313a55321186162005c0f2567e162954943a5
SHA512a4c17182347bc3c5cce76562f26b27ac62e84c8589dd91d2840a452b6c593656f3d3a2fd5b7f207f32be0f5a0494bc44987fb70e6e8f3a756a0703df20baa93f
-
Filesize
3KB
MD5b133a676d139032a27de3d9619e70091
SHA11248aa89938a13640252a79113930ede2f26f1fa
SHA256ae2b6236d3eeb4822835714ae9444e5dcd21bc60f7a909f2962c43bc743c7b15
SHA512c6b99e13d854ce7a6874497473614ee4bd81c490802783db1349ab851cd80d1dc06df8c1f6e434aba873a5bbf6125cc64104709064e19a9dc1c66dcde3f898f5
-
Filesize
29KB
MD5ffdeea82ba4a5a65585103dd2a922dfe
SHA1094c3794503245cc7dfa9e222d3504f449a5400b
SHA256c20b11dff802aa472265f4e9f330244ec4aca81b0009f6efcb2cf8a36086f390
SHA5127570527fdae4818f0fc780f9f141ab6a2d313cc6b3fdb1f7d7ff05d994ad77d3f8d168b1d77c2555d25dc487d24c18f2cc0eab505d1dd758d709f2576aac1a8a