Overview
overview
9Static
static
37aa9df6811...0a.exe
windows7-x64
97aa9df6811...0a.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3flashplaye...ax.msi
windows7-x64
9flashplaye...ax.msi
windows10-2004-x64
9uninstall_...er.exe
windows7-x64
7uninstall_...er.exe
windows10-2004-x64
7Analysis
-
max time kernel
198s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
7aa9df6811ccf7f560e7c2f34e26286d5366cbb81b0eed63e3271db785d10f0a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7aa9df6811ccf7f560e7c2f34e26286d5366cbb81b0eed63e3271db785d10f0a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral5
Sample
flashplayer20_0d0_228_winax.msi
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
flashplayer20_0d0_228_winax.msi
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
uninstall_flash_player.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
uninstall_flash_player.exe
Resource
win10v2004-20250314-en
General
-
Target
flashplayer20_0d0_228_winax.msi
-
Size
18.7MB
-
MD5
5bbdc07c6e6389b5d2ce86765911c879
-
SHA1
fa86f107111fc7def35742097bf0aa29c82d7638
-
SHA256
63cef518bff5b7a8cadd6b2a8c6b738ce3f2fdce231e95db920cbdd75e0f0bc6
-
SHA512
144b7d73094f19cfec404f1c10d133df43f5b67d39b404ecc2c82598bed55b0622dce13e24cfa39d0cbf552a296f4a132922d23e84130fe26480cf1b0dad0e73
-
SSDEEP
393216:AJhhV7thwzSIFadpgMKjSCHDqhadHDk2My5FiO93IYP:UnV76SIUMDSADqhaLMy5l3b
Malware Config
Signatures
-
resource yara_rule behavioral6/files/0x0009000000024235-121.dat cryptone -
Blocklisted process makes network request 5 IoCs
flow pid Process 2 3012 msiexec.exe 4 3012 msiexec.exe 6 3012 msiexec.exe 8 3012 msiexec.exe 14 3012 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FlashUtil32_20_0_0_228_ActiveX.exe InstallAX_20_0_0_228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FlashUtil32_20_0_0_228_ActiveX.exe\DisableExceptionChainValidation = "0" InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FlashPlayerApp.exe InstallAX_20_0_0_228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FlashPlayerApp.exe\DisableExceptionChainValidation = "0" InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FlashPlayerUpdateService.exe InstallAX_20_0_0_228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FlashPlayerUpdateService.exe\DisableExceptionChainValidation = "0" InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FlashUtil64_20_0_0_228_ActiveX.exe InstallFlashPlayer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FlashUtil64_20_0_0_228_ActiveX.exe\DisableExceptionChainValidation = "0" InstallFlashPlayer.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
pid Process 4428 InstallFlashPlayer.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\system32\Macromed\Flash\Flash64_20_0_0_228.ocx InstallFlashPlayer.exe File created C:\Windows\SysWOW64\Macromed\Flash\FlashUtil32_20_0_0_228_ActiveX.exe InstallAX_20_0_0_228.exe File created C:\Windows\SysWOW64\Macromed\Flash\activex.vch InstallAX_20_0_0_228.exe File opened for modification C:\Windows\SysWOW64\Macromed\Flash\FlashUtil32_20_0_0_228_ActiveX.exe InstallAX_20_0_0_228.exe File opened for modification C:\Windows\SysWOW64\Macromed\Flash\FlashInstall.log InstallAX_20_0_0_228.exe File created C:\Windows\system32\Macromed\Flash\FlashUtil64_20_0_0_228_ActiveX.exe InstallFlashPlayer.exe File created C:\Windows\system32\Macromed\Flash\activex.vch InstallFlashPlayer.exe File created C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe InstallAX_20_0_0_228.exe File created C:\Windows\system32\Macromed\Flash\FlashUtil64_20_0_0_228_ActiveX.dll InstallFlashPlayer.exe File opened for modification C:\Windows\system32\Macromed\Flash\FlashInstall.log InstallFlashPlayer.exe File created C:\Windows\SysWOW64\Macromed\Flash\FlashUtil32_20_0_0_228_ActiveX.dll InstallAX_20_0_0_228.exe File opened for modification C:\Windows\SysWOW64\Macromed\Flash\Flash32_20_0_0_228.ocx InstallAX_20_0_0_228.exe File created C:\Windows\system32\Macromed\Flash\Flash64_20_0_0_228.ocx InstallFlashPlayer.exe File opened for modification C:\Windows\system32\Macromed\Flash\FlashUtil64_20_0_0_228_ActiveX.exe InstallFlashPlayer.exe File created C:\Windows\SysWOW64\Macromed\Flash\Flash32_20_0_0_228.ocx InstallAX_20_0_0_228.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Installer\e5791e2.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI9431.tmp msiexec.exe File created C:\Windows\Installer\{7B0961DB-15EB-41AF-85DA-C296924CA408}\ARPPRODUCTICON.exe msiexec.exe File opened for modification C:\Windows\Installer\{7B0961DB-15EB-41AF-85DA-C296924CA408}\ARPPRODUCTICON.exe msiexec.exe File created C:\Windows\Installer\e5791e0.msi msiexec.exe File opened for modification C:\Windows\Installer\e5791e0.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{7B0961DB-15EB-41AF-85DA-C296924CA408} msiexec.exe -
Executes dropped EXE 3 IoCs
pid Process 1704 InstallAX_20_0_0_228.exe 4428 InstallFlashPlayer.exe 3176 FlashPlayerUpdateService.exe -
Loads dropped DLL 14 IoCs
pid Process 396 MsiExec.exe 396 MsiExec.exe 1704 InstallAX_20_0_0_228.exe 1704 InstallAX_20_0_0_228.exe 1704 InstallAX_20_0_0_228.exe 4428 InstallFlashPlayer.exe 4428 InstallFlashPlayer.exe 4428 InstallFlashPlayer.exe 4428 InstallFlashPlayer.exe 1704 InstallAX_20_0_0_228.exe 1704 InstallAX_20_0_0_228.exe 1704 InstallAX_20_0_0_228.exe 396 MsiExec.exe 396 MsiExec.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA InstallAX_20_0_0_228.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA InstallFlashPlayer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 3012 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallAX_20_0_0_228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FlashPlayerUpdateService.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}\AppPath = "C:\\Windows\\SysWOW64\\Macromed\\Flash" InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB70-AE6D-11cf-96B8-444553540000} InstallAX_20_0_0_228.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\NAVIGATORPLUGINSLIST\SHOCKWAVE FLASH InstallAX_20_0_0_228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash\application/x-shockwave-flash InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000} InstallAX_20_0_0_228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Compatibility Flags = "0" InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32} InstallFlashPlayer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\NAVIGATORPLUGINSLIST\SHOCKWAVE FLASH InstallFlashPlayer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB70-AE6D-11cf-96B8-444553540000}\Compatibility Flags = "65536" InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash InstallAX_20_0_0_228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash\application/futuresplash InstallAX_20_0_0_228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}\AppPath = "C:\\Windows\\system32\\Macromed\\Flash" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}\AppName = "FlashUtil64_20_0_0_228_ActiveX.exe" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash\application/x-shockwave-flash InstallFlashPlayer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Compatibility Flags = "0" InstallFlashPlayer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}\Policy = "3" InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32} InstallAX_20_0_0_228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}\Policy = "3" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB70-AE6D-11cf-96B8-444553540000} InstallFlashPlayer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB70-AE6D-11cf-96B8-444553540000}\Compatibility Flags = "65536" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash\application/futuresplash InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000} InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}\AppName = "FlashUtil32_20_0_0_228_ActiveX.exe" InstallAX_20_0_0_228.exe -
Modifies data under HKEY_USERS 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" InstallAX_20_0_0_228.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ InstallAX_20_0_0_228.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" InstallAX_20_0_0_228.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" InstallAX_20_0_0_228.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" InstallAX_20_0_0_228.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" InstallFlashPlayer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" InstallFlashPlayer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" InstallFlashPlayer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" InstallFlashPlayer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" InstallAX_20_0_0_228.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" InstallAX_20_0_0_228.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ InstallFlashPlayer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix InstallAX_20_0_0_228.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.18\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" InstallAX_20_0_0_228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BD1690B7BE51FA1458AD2C6929C44A80\PackageCode = "9AC224B067146484FA04B5FAF5C85DD6" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.4\ = "Shockwave Flash Object" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mfp\ = "MacromediaFlashPaper.MacromediaFlashPaper" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\TypeLib InstallAX_20_0_0_228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.8\ = "Shockwave Flash Object" InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib InstallAX_20_0_0_228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MacromediaFlashPaper.MacromediaFlashPaper\ = "Macromedia Flash Paper" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.3 InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.3\CLSID InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.20\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ = "_IShockwaveFlashEvents" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/futuresplash\Extension = ".spl" InstallAX_20_0_0_228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\ = "FlashBroker" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.3\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib\ = "{D27CDB6B-AE6D-11cf-96B8-444553540000}" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000} InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.9 InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32 InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FlashFactory.FlashFactory.1\CLSID InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.6\ = "Shockwave Flash Object" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.9\ = "Shockwave Flash Object" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\ = "IFlashAccessibility" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MacromediaFlashPaper.MacromediaFlashPaper\ = "Macromedia Flash Paper" InstallAX_20_0_0_228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\ = "Shockwave Flash" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\0 InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mfp InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.1\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" InstallAX_20_0_0_228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BD1690B7BE51FA1458AD2C6929C44A80\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.14 InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}\ProxyStubClsid32 InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\ = "FlashBroker" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FlashFactory.FlashFactory.1\ = "Macromedia Flash Factory Object" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Implemented Categories\{31CAF6E4-D6AA-4090-A050-A5AC8972E9EF} InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\TypeLib\ = "{57A0E746-3863-4D20-A811-950C84F1DB9B}" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\0 InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\BD1690B7BE51FA1458AD2C6929C44A80 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\LocalizedString = "@C:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_20_0_0_228_ActiveX.exe,-101" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.8\CLSID InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\TypeLib\ = "{D27CDB6B-AE6D-11CF-96B8-444553540000}" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.10\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\EnableFullPage InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\0\win64 InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.11\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.15\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" InstallAX_20_0_0_228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.9\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}\TypeLib InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{57A0E746-3863-4D20-A811-950C84F1DB9B}\1.1\0\win64 InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mfp\Content Type = "application/x-shockwave-flash" InstallAX_20_0_0_228.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.10\CLSID InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.10\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-shockwave-flash InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D} InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.4 InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.8\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" InstallFlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\TypeLib\ = "{57A0E746-3863-4D20-A811-950C84F1DB9B}" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.14\CLSID InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} InstallAX_20_0_0_228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FlashFactory.FlashFactory\CurVer\ = "FlashFactory.FlashFactory.1" InstallFlashPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.8 InstallFlashPlayer.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3740 msiexec.exe 3740 msiexec.exe 1704 InstallAX_20_0_0_228.exe 1704 InstallAX_20_0_0_228.exe 4428 InstallFlashPlayer.exe 4428 InstallFlashPlayer.exe 4428 InstallFlashPlayer.exe 4428 InstallFlashPlayer.exe 1704 InstallAX_20_0_0_228.exe 1704 InstallAX_20_0_0_228.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3012 msiexec.exe Token: SeIncreaseQuotaPrivilege 3012 msiexec.exe Token: SeSecurityPrivilege 3740 msiexec.exe Token: SeCreateTokenPrivilege 3012 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3012 msiexec.exe Token: SeLockMemoryPrivilege 3012 msiexec.exe Token: SeIncreaseQuotaPrivilege 3012 msiexec.exe Token: SeMachineAccountPrivilege 3012 msiexec.exe Token: SeTcbPrivilege 3012 msiexec.exe Token: SeSecurityPrivilege 3012 msiexec.exe Token: SeTakeOwnershipPrivilege 3012 msiexec.exe Token: SeLoadDriverPrivilege 3012 msiexec.exe Token: SeSystemProfilePrivilege 3012 msiexec.exe Token: SeSystemtimePrivilege 3012 msiexec.exe Token: SeProfSingleProcessPrivilege 3012 msiexec.exe Token: SeIncBasePriorityPrivilege 3012 msiexec.exe Token: SeCreatePagefilePrivilege 3012 msiexec.exe Token: SeCreatePermanentPrivilege 3012 msiexec.exe Token: SeBackupPrivilege 3012 msiexec.exe Token: SeRestorePrivilege 3012 msiexec.exe Token: SeShutdownPrivilege 3012 msiexec.exe Token: SeDebugPrivilege 3012 msiexec.exe Token: SeAuditPrivilege 3012 msiexec.exe Token: SeSystemEnvironmentPrivilege 3012 msiexec.exe Token: SeChangeNotifyPrivilege 3012 msiexec.exe Token: SeRemoteShutdownPrivilege 3012 msiexec.exe Token: SeUndockPrivilege 3012 msiexec.exe Token: SeSyncAgentPrivilege 3012 msiexec.exe Token: SeEnableDelegationPrivilege 3012 msiexec.exe Token: SeManageVolumePrivilege 3012 msiexec.exe Token: SeImpersonatePrivilege 3012 msiexec.exe Token: SeCreateGlobalPrivilege 3012 msiexec.exe Token: SeCreateTokenPrivilege 3012 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3012 msiexec.exe Token: SeLockMemoryPrivilege 3012 msiexec.exe Token: SeIncreaseQuotaPrivilege 3012 msiexec.exe Token: SeMachineAccountPrivilege 3012 msiexec.exe Token: SeTcbPrivilege 3012 msiexec.exe Token: SeSecurityPrivilege 3012 msiexec.exe Token: SeTakeOwnershipPrivilege 3012 msiexec.exe Token: SeLoadDriverPrivilege 3012 msiexec.exe Token: SeSystemProfilePrivilege 3012 msiexec.exe Token: SeSystemtimePrivilege 3012 msiexec.exe Token: SeProfSingleProcessPrivilege 3012 msiexec.exe Token: SeIncBasePriorityPrivilege 3012 msiexec.exe Token: SeCreatePagefilePrivilege 3012 msiexec.exe Token: SeCreatePermanentPrivilege 3012 msiexec.exe Token: SeBackupPrivilege 3012 msiexec.exe Token: SeRestorePrivilege 3012 msiexec.exe Token: SeShutdownPrivilege 3012 msiexec.exe Token: SeDebugPrivilege 3012 msiexec.exe Token: SeAuditPrivilege 3012 msiexec.exe Token: SeSystemEnvironmentPrivilege 3012 msiexec.exe Token: SeChangeNotifyPrivilege 3012 msiexec.exe Token: SeRemoteShutdownPrivilege 3012 msiexec.exe Token: SeUndockPrivilege 3012 msiexec.exe Token: SeSyncAgentPrivilege 3012 msiexec.exe Token: SeEnableDelegationPrivilege 3012 msiexec.exe Token: SeManageVolumePrivilege 3012 msiexec.exe Token: SeImpersonatePrivilege 3012 msiexec.exe Token: SeCreateGlobalPrivilege 3012 msiexec.exe Token: SeCreateTokenPrivilege 3012 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3012 msiexec.exe Token: SeLockMemoryPrivilege 3012 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3012 msiexec.exe 3012 msiexec.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1704 InstallAX_20_0_0_228.exe 4428 InstallFlashPlayer.exe 4428 InstallFlashPlayer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3740 wrote to memory of 396 3740 msiexec.exe 90 PID 3740 wrote to memory of 396 3740 msiexec.exe 90 PID 3740 wrote to memory of 396 3740 msiexec.exe 90 PID 3740 wrote to memory of 4908 3740 msiexec.exe 94 PID 3740 wrote to memory of 4908 3740 msiexec.exe 94 PID 3740 wrote to memory of 5204 3740 msiexec.exe 96 PID 3740 wrote to memory of 5204 3740 msiexec.exe 96 PID 3740 wrote to memory of 5204 3740 msiexec.exe 96 PID 3740 wrote to memory of 1704 3740 msiexec.exe 97 PID 3740 wrote to memory of 1704 3740 msiexec.exe 97 PID 3740 wrote to memory of 1704 3740 msiexec.exe 97 PID 1704 wrote to memory of 4428 1704 InstallAX_20_0_0_228.exe 98 PID 1704 wrote to memory of 4428 1704 InstallAX_20_0_0_228.exe 98 PID 4428 wrote to memory of 1440 4428 InstallFlashPlayer.exe 99 PID 4428 wrote to memory of 1440 4428 InstallFlashPlayer.exe 99 PID 1704 wrote to memory of 3176 1704 InstallAX_20_0_0_228.exe 101 PID 1704 wrote to memory of 3176 1704 InstallAX_20_0_0_228.exe 101 PID 1704 wrote to memory of 3176 1704 InstallAX_20_0_0_228.exe 101 PID 1704 wrote to memory of 1436 1704 InstallAX_20_0_0_228.exe 103 PID 1704 wrote to memory of 1436 1704 InstallAX_20_0_0_228.exe 103 PID 1704 wrote to memory of 1436 1704 InstallAX_20_0_0_228.exe 103 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\flashplayer20_0d0_228_winax.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3012
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 287214E80E90B53BE966133326914184 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:396
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4908
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 911D89E07084BFC8CFB6501D9BA907142⤵
- System Location Discovery: System Language Discovery
PID:5204
-
-
C:\Users\Admin\AppData\Local\Temp\InstallAX_20_0_0_228.exe"C:\Users\Admin\AppData\Local\Temp\InstallAX_20_0_0_228.exe" -install -msi2⤵
- Event Triggered Execution: Image File Execution Options Injection
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\{8D12B03C-7513-464D-B1FB-0B4D43AC7954}\InstallFlashPlayer.exe"C:\Users\Admin\AppData\Local\Temp\{8D12B03C-7513-464D-B1FB-0B4D43AC7954}\InstallFlashPlayer.exe" -install -skipARPEntry -iv 2 -au 42949672953⤵
- Event Triggered Execution: Image File Execution Options Injection
- Network Service Discovery
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\{8D12B03C-7513-464D-B1FB-0B4D43AC7954}\InstallFlashPlayer.exe" >> NUL4⤵PID:1440
-
-
-
C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exeC:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe -install3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3176
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\InstallAX_20_0_0_228.exe" >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:1436
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:4488
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Privilege Escalation
Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
1System Binary Proxy Execution
1Msiexec
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5bfecc0ea12a7adbbb3443ae7e4972b9c
SHA1d7aecf5531d6daceb8dff6d1ee62cc8b0de8c09e
SHA256c57689cb72acd452b6b2dac5ef0b7b33920b70aaa36f1b0c87833396b6bc5ba3
SHA5127c569d33ea2cf53f09e7ed654cea11c8f157681a020f8ccea85b8454f76eb769cf13b992782727979204dfd0a81f8b3c1c184886692d19913c9e6291329e1ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0972B7C417F696E06E186AEB26286F01_3EAEAB67121169D5C037E4B1278DEA7C
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
16KB
MD5f3c162704d3b510ad6e20ed70e5f7652
SHA14e9091c9c519fe60e1509364f9120a4c1f1f5bdb
SHA25606cbf2c10e9e9fccc983aca05d438a3d11a3f8fb3a28ca000fe579b0b8e18a03
SHA51297cca43da45a1f3b236ab455f72a4784174fac1a2ea513751008b1a42774e14a9eb8c302e9c8f090198953846affd4886178ef9af27b6ba3f8434d9c695c04ba
-
Filesize
834B
MD55cb16e48b582bf86a4b396fcbc235981
SHA13e7cbf189fbbff1efb9b04c398ceb902e816f15b
SHA256ba479af493eeefdf7de4c86890f5d87886bc0bc92522d39dd09eb21f85cf23f9
SHA51255210eb21fd974bb189063d4e377c37b2cf1c2e0d7ec056dee48f8619cfe04a7a8c1ba329abcfa7edb4785fac08375df4c8261e98dc3a8294f0f4fc29cf61eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0972B7C417F696E06E186AEB26286F01_3EAEAB67121169D5C037E4B1278DEA7C
Filesize398B
MD56fdb48a57be46e4f3c1035c246c73df6
SHA182b8fa6254f1c927469ddbc95bf5185856ca1fdb
SHA256f65a4d8b0eb33e35b01563f99e00aca32823402e8c05070b43b52cc6e3c5c094
SHA512019ac9a9d9378a100d732d38272a7eebbb437897932e96f3ba30929abd6b0ad61b156dad0ea03727448bbbace6b419fed45face4d689cef777f953450aaca94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3D0AC26322348780E90E022EA217C58C
Filesize170B
MD51e145528d1632aff1e4315098698cbb6
SHA17263229a595d0d11c5cb2273a8458a11b59599dc
SHA2566567362cadb97df5a84aa4bdb05a8fbbeda8d6c6c8185e1c3f909d461e2b712b
SHA512d08de7b967bef3ed7f77724eb354008cf87b63f04b48f71494b8afa6e40f3945f1276fcaa059b431ed4217d756ea8b116fb836e5b6d48d1f03ba2238358f8334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8828F39C7C0CE9A14B25C7EB321181BA_3DF94EB797096674F7793A562A778C5F
Filesize392B
MD5002609d900297bd93f2698e40af5f49c
SHA1b54baa5e3b23206df9c73179aa4bd969c046763f
SHA2564d0f740c645b4cf67e2807af36b4d83214e3f10773402be566b5378dfeec5804
SHA512107247cdc696f8326113ed5580c97c4c838b01bef61ad972ccef92e44cf45def5cf1c2ab01ced9e826e562f653690b57a12535ea3978e686d322e17d9b13486b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A3D5BF1283C2E63D8C8A8C72F0051F5A
Filesize178B
MD51c60a3cf57fea5dfed94d8a6479237ac
SHA116efd633736e36e2852b960055bc9b516381ec70
SHA2560c7d8618d90830c6757017c003e84c0991094600ecb45269f733275051c41943
SHA512ff1241831160521b58d8670a2560561cd135cfcf638c44a8404eda9e75236d100c5b75faaccb84b73251c7f7e3560121b57d30ee55864e0d9a9424496e31f363
-
Filesize
17.5MB
MD58028ab3fa3c7f3c3468a714db788f2b1
SHA12035f1356438d7ed28db46b3e2a4eeb11ade4579
SHA2562998f50b750ad49dc49b9a46e8c1a69a6fe636a3f0f10705deab9a4ea31d7209
SHA5126c6dd8bd10a6a543eada17e54e4a7ef7fdcb5f080041be275e377fa15f63a730d210f04bcb0880222e38ca28932c531128f5e537a03b7b95ee56a6742bf25e6d
-
Filesize
57KB
MD5c23d4d5a87e08f8a822ad5a8dbd69592
SHA1317df555bc309dace46ae5c5589bec53ea8f137e
SHA2566d149866246e79919bde5a0b45569ea41327c32ee250f37ad8216275a641bb27
SHA512fa584655ae241004af44774a1f43508e53e95028ce96b39f8b5c62742f38acdf2b1df8871b468ac70c6043ca0e7ae8241bad2db6bc4f700d78471f12bb809e6b
-
Filesize
141KB
MD5edb88affffd67bca3523b41d3e2e4810
SHA10055b93907665fed56d22a7614a581a87d060ead
SHA2564c3d85e7c49928af0f43623dcbed474a157ef50af3cba40b7fd7ac3fe3df2f15
SHA5122b9d99c57bfa9ab00d8582d55b18c5bf155a4ac83cf4c92247be23c35be818b082b3d6fe38fa905d304d2d8b957f3db73428da88e46acc3a7e3fee99d05e4daf
-
Filesize
63KB
MD5cfe58e8354671b48117292a34c6257eb
SHA1acef471e74b56509cbe8bd663960cba405451914
SHA2564347e7ebe1ad92d3f903401e1d2c6731190fa2d25eb7226fa559b33ef28123cb
SHA5123ec9bc479cb3cb431b08f2d8f4d67fdef0cb233e3a846c657be1a3930b77fba0dbf0bb745b70ccbee08bf7fe79c762c77b1dc11c1581861dfb320807bc121128
-
Filesize
496KB
MD5ba4ae84720ed3fb1e0f04481f03c928f
SHA13071b7b4fe8fce29dd6afbf2630d0396f795c6f4
SHA256c52f5f7ce908a9a3bab64ec8e765f53012f6bdcb8736b31fede77cb1dc268bdc
SHA51237baeb41c55b5cfb10c92cc3e682d1b229d5cbc9063fc70c74d9befcf655ef1939d244574e2f97e10226ff6c210e54a1eb1660a082bb8a34d112e59f39fe163a
-
Filesize
1.1MB
MD54b5578b92aa9b6c8e456606adf962bb3
SHA160bcace18b601036cdf6a659e502be7ae1fa28b2
SHA2569c3f2d1fa670a0ddd3781e7e8e86c4fb1b516fa9f3ae970f4d4c581e5939fdc1
SHA5123ff95d64c8afdc8c8ab974f513db873e99d0d3fde897db55574c13f7f38f37b2ad03a6354b8321e696c5790fe071133e0fe4b5ef2f7dbcbb76ea3f521abe898a
-
Filesize
9.1MB
MD52c307edcbbbd6ad698c4e47067aa8641
SHA14b5c6b933d71b56fa01ed53e74b257944708ae55
SHA256f34939585a10764d45a87c535873aec4e28a0e8016f581ff339436be034ba52a
SHA512bd3bae96ddf9a00eae39b3f954984f3b834b32d15e6537e747d049ecc8dcde31b9a35a906dcb77d2e3e97c36f895b4ef6f9188d5a981a882db3adaa5b988ecfa
-
Filesize
562KB
MD5f6c9330cc45fdd0caef7f5f8bdb51ff5
SHA1278fcfa827257e37f91e6f3005dd7774b50d29d9
SHA2562d5895550819a89d7a8346dac2ac3043baeea6705148456d8649969cf88bde79
SHA512ac1e5141956e3bc3f4167f3676a10a2ea674c89ca4eadac195411b62ebcf4f51dcf0e8dbd1bd3d5443d441aa9a228c8558f1789d8d2292ec7d14607fe28df01a
-
Filesize
858KB
MD5ab8b7d5e808226f8e4279f6a779dcf2d
SHA1213cebfa80f179468c79296a7e5d038bb3ed84a2
SHA25660048a8f9395ec1dd6160ee7bed035f106ae13cccd714cc2c40173cfb3fbd242
SHA512b43fbfb51a014be44f43b6abb252e3f1be74b825f0c18c1bf7775e0eafa7e1c602e46a46307e35bbe9ebafddbbf3cf384c4d366e8b8bfc11632c2ad2291cf43a
-
Filesize
18.7MB
MD55bbdc07c6e6389b5d2ce86765911c879
SHA1fa86f107111fc7def35742097bf0aa29c82d7638
SHA25663cef518bff5b7a8cadd6b2a8c6b738ce3f2fdce231e95db920cbdd75e0f0bc6
SHA512144b7d73094f19cfec404f1c10d133df43f5b67d39b404ecc2c82598bed55b0622dce13e24cfa39d0cbf552a296f4a132922d23e84130fe26480cf1b0dad0e73
-
Filesize
16.9MB
MD52f45875867bf0dc006d1a11e795abc8e
SHA1bf1de85b83200ad8e8913183226b76aabc122986
SHA25677e1e64227ba610f010f3742349114a4859daf57650ac676b220d1e1cf547450
SHA5127b848c65d07bbfee2f369c0ebb4571fc8af8c739a74852fe6dda9f4df9287ac45ffa40f0b9d07c39f85fc49b31d8e7ec8765b4707e5e7314b54a1005ced92961
-
Filesize
263KB
MD5bdd170a319b7a9f7b11f58e59f827a31
SHA105ce443e1f44449b07ad3d45a8ae4e3465697bf6
SHA256ca8355f72b3d8e000e60670f717508a8dbde163d26f0e6e6255f6dee2027124b
SHA512eca9431d7e40f88a8c51ba0533e63c001b340be81c330f61f082d85c55b4fee489eee85776494ee723b051f2b982b5669144b8f2d8d33b92e924ca02a870b0df
-
Filesize
23.6MB
MD5914fc3a3c30f3f5d7906308067b9ae2f
SHA16ab5f83269500809bbed37081dc7cdb8c08fecfc
SHA25693d92c4e66a91535bd1a2b17445c183ade43fb0a94bffb96e693704bdbd28c43
SHA5128c0f8d6815fae339624985b2977f1d5abd8f75a7109071428eb70b66770473cb3913a87394c6201e9046d25657e7c58851c9f8474aada1d5afcdfd9874ecfbd0
-
Filesize
24.1MB
MD537a1058964135c215a64a36cb488175a
SHA13517ef3d7da4cac9c51fd84f62bd66e960f6d4f0
SHA256d4c94d7bd9b0226b4ea4167d4ff5ef63cf7c54d2093f259cca2e72ce58b9d5f7
SHA512559d3b45dcd1b151ae02cf1d3ec72bf3ac824bf3f11da5246135e2abd3b8e6c6030c96d080db52aef8011929a54a65b3b6ddd577ef74b3756aa4702ef7deec7e
-
\??\Volume{a6f17796-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{84c42fd1-fa37-46fb-848c-6a052560a221}_OnDiskSnapshotProp
Filesize6KB
MD5fd16b5e7aa48643e25f52cb380fb2bc0
SHA1f04f491e54e31f45314ea900c95dd814e693be21
SHA25649d236887010cab340cd6310b161410286268f93bfe0a58bc033222216b62de4
SHA512e7d95861e4c011857f6259524ae40d34e43c27a1f77b1f8f3cd9f3a2356ad2fba8821afd9f20f822798cc6968f40387af8307c12ee49f62b328c9896da08ab96